A Permenev, D Dimitrov, P Tsankov… - … IEEE symposium on …, 2020 - ieeexplore.ieee.org
We present VerX, the first automated verifier able to prove functional properties of Ethereum smart contracts. VerX addresses an important problem as all real-world contracts must …
Recently, a number of existing blockchain systems have witnessed major bugs and vulnerabilities within smart contracts. Although the literature features a number of proposals …
H Huang, Y Guo, Q Shi, P Yao, R Wu… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
Unlike coverage-based fuzzing that gives equal attention to every part of a code, directed fuzzing aims to direct a fuzzer to a specific target in the code, eg, the code with potential …
The EOSIO blockchain, one of the representative Delegated Proof-of-Stake (DPoS) blockchain platforms, has grown rapidly recently. Meanwhile, a number of vulnerabilities …
K Lu, H Hu - Proceedings of the 2019 ACM SIGSAC Conference on …, 2019 - dl.acm.org
System software commonly uses indirect calls to realize dynamic program behaviors. However, indirect-calls also bring challenges to constructing a precise control-flow graph …
Neural program embeddings have demonstrated considerable promise in a range of program analysis tasks, including clone identification, program repair, code completion, and …
J He, G Sivanrupan, P Tsankov, M Vechev - Proceedings of the 2021 …, 2021 - dl.acm.org
Symbolic execution is a powerful technique that can generate tests steering program execution into desired paths. However, the scalability of symbolic execution is often limited …
To date, various hybrid fuzzers have been proposed for maximal program vulnerability exposure by integrating the power of fuzzing strategies and concolic executors. While the …
D He, J Lu, J Xue - 36th European Conference on Object …, 2022 - drops.dagstuhl.de
Existing whole-program context-sensitive pointer analysis frameworks for Java, which were open-sourced over one decade ago, were designed and implemented to support only …