The art of the scam: Demystifying honeypots in ethereum smart contracts

CF Torres, M Steichen - 28th USENIX Security Symposium (USENIX …, 2019 - usenix.org
Modern blockchains, such as Ethereum, enable the execution of so-called smart contracts–
programs that are executed across a decentralised network of nodes. As smart contracts …

Release the Kraken: new KRACKs in the 802.11 Standard

M Vanhoef, F Piessens - Proceedings of the 2018 ACM SIGSAC …, 2018 - dl.acm.org
We improve key reinstallation attacks (KRACKs) against 802.11 by generalizing known
attacks, systematically analyzing all handshakes, bypassing 802.11's official …

Combining bmc and fuzzing techniques for finding software vulnerabilities in concurrent programs

FK Aljaafari, R Menezes, E Manino, F Shmarov… - IEEE …, 2022 - ieeexplore.ieee.org
Finding software vulnerabilities in concurrent programs is a challenging task due to the size
of the state-space exploration, as the number of interleavings grows exponentially with the …

Wireless encryption and WPA2 weaknesses

K Moissinac, D Ramos, G Rendon… - 2021 IEEE 11th Annual …, 2021 - ieeexplore.ieee.org
Encryption is prevalent in many forms of modern communications. Still, wireless
communications security holds higher priority since any device can easily intercept the data …

Demystifying and Detecting Cryptographic Defects in Ethereum Smart Contracts

J Zhang, Y Shen, J Chen, J Su, Y Wang, T Chen… - arXiv preprint arXiv …, 2024 - arxiv.org
Ethereum has officially provided a set of system-level cryptographic APIs to enhance smart
contracts with cryptographic capabilities. These APIs have been utilized in over 10% of …

From theory to code: identifying logical flaws in cryptographic implementations in C/C++

S Rahaman, H Cai, O Chowdhury… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
Cryptographic protocols are often expected to be provably secure. However, this security
guarantee often falls short in practice due to various implementation flaws. We propose a …

模型学习与符号执行结合的安全协议代码分析技术

张协力, 祝跃飞, 顾纯祥, 陈熹 - 网络与信息安全学报, 2021 - infocomm-journal.com
符号执行技术从理论上可以全面分析程序执行空间, 但对安全协议这样的大型程序,
路径空间爆炸和约束求解困难的局限性导致其在实践上不可行. 结合安全协议程序自身特点 …

[PDF][PDF] Combining BMC and Fuzzing Techniques for Finding Software Vulnerabilities in Concurrent Programs

FK Aljaafari, R Menezes, E Manino, F Shmarov… - Ieee …, 2022 - lirias.kuleuven.be
Finding software vulnerabilities in concurrent programs is a challenging task due to the size
of the state-space exploration, as the number of interleavings grows exponentially with the …

A Formal Verification Method for Security Protocol Implementations Based on Model Learning and Tamarin

X Zhang, Y Zhu, C Gu, X Miao - Journal of Physics: Conference …, 2021 - iopscience.iop.org
The verification of security protocol implementations is notoriously difficult and important. In
this paper, combining with the model learning using Tamarin, a formal verification tool of …

Verifying Software Vulnerabilities in IoT Cryptographic Protocols

F Aljaafari, LC Cordeiro, MA Mustafa - arXiv preprint arXiv:2001.09837, 2020 - arxiv.org
Internet of Things (IoT) is a system that consists of a large number of smart devices
connected through a network. The number of these devices is increasing rapidly, which …