An overview on smart contracts: Challenges, advances and platforms

Z Zheng, S Xie, HN Dai, W Chen, X Chen… - Future Generation …, 2020 - Elsevier
Smart contract technology is reshaping conventional industry and business processes.
Being embedded in blockchains, smart contracts enable the contractual terms of an …

A survey on ethereum systems security: Vulnerabilities, attacks, and defenses

H Chen, M Pendleton, L Njilla, S Xu - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Blockchain technology is believed by many to be a game changer in many application
domains. While the first generation of blockchain technology (ie, Blockchain 1.0) is almost …

Contractfuzzer: Fuzzing smart contracts for vulnerability detection

B Jiang, Y Liu, WK Chan - Proceedings of the 33rd ACM/IEEE …, 2018 - dl.acm.org
Decentralized cryptocurrencies feature the use of blockchain to transfer values among peers
on networks without central agency. Smart contracts are programs running on top of the …

A survey of attacks on ethereum smart contracts (sok)

N Atzei, M Bartoletti, T Cimoli - Principles of Security and Trust: 6th …, 2017 - Springer
Smart contracts are computer programs that can be correctly executed by a network of
mutually distrusting nodes, without the need of an external trusted authority. Since smart …

Formal verification of smart contracts: Short paper

K Bhargavan, A Delignat-Lavaud, C Fournet… - Proceedings of the …, 2016 - dl.acm.org
Ethereum is a framework for cryptocurrencies which uses blockchain technology to provide
an open global computing platform, called the Ethereum Virtual Machine (EVM). EVM …

Security, performance, and applications of smart contracts: A systematic survey

S Rouhani, R Deters - IEEE Access, 2019 - ieeexplore.ieee.org
Blockchain is the promising technology of recent years, which has attracted remarkable
attention in both academic studies and practical industrial applications. The smart contract is …

RustBelt: Securing the foundations of the Rust programming language

R Jung, JH Jourdan, R Krebbers, D Dreyer - Proceedings of the ACM on …, 2017 - dl.acm.org
Rust is a new systems programming language that promises to overcome the seemingly
fundamental tradeoff between high-level safety guarantees and low-level control over …

SoK: Computer-aided cryptography

M Barbosa, G Barthe, K Bhargavan… - … IEEE symposium on …, 2021 - ieeexplore.ieee.org
Computer-aided cryptography is an active area of research that develops and applies
formal, machine-checkable approaches to the design, analysis, and implementation of …

Verified models and reference implementations for the TLS 1.3 standard candidate

K Bhargavan, B Blanchet… - 2017 IEEE Symposium on …, 2017 - ieeexplore.ieee.org
TLS 1.3 is the next version of the Transport Layer Security (TLS) protocol. Its clean-slate
design is a reaction both to the increasing demand for low-latency HTTPS connections and …

HACL*: A verified modern cryptographic library

JK Zinzindohoué, K Bhargavan, J Protzenko… - Proceedings of the …, 2017 - dl.acm.org
HACL* is a verified portable C cryptographic library that implements modern cryptographic
primitives such as the ChaCha20 and Salsa20 encryption algorithms, Poly1305 and HMAC …