Related references
Note: Only part of the references are listed.SigRec: Automatic Recovery of Function Signatures in Smart Contracts
Ting Chen et al.
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING (2022)
SCSGuard: Deep Scam Detection for Ethereum Smart Contracts
Huiwen Hu et al.
IEEE INFOCOM 2022 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS) (2022)
Elipmoc: Advanced Decompilation of Ethereum Smart Contracts
Neville Grech et al.
PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL (2022)
SolGuard: Preventing external call issues in smart contract-based multi-agent robotic systems
Purathani Praitheeshan et al.
INFORMATION SCIENCES (2021)
Practical Smart Contract Sharding with Ownership and Commutativity Analysis
George Pirlea et al.
PROCEEDINGS OF THE 42ND ACM SIGPLAN INTERNATIONAL CONFERENCE ON PROGRAMMING LANGUAGE DESIGN AND IMPLEMENTATION (PLDI '21) (2021)
Understanding Graph Embedding Methods and Their Applications
Mengjia Xu
SIAM REVIEW (2021)
A Blockchain-Based Smart Contract System for Healthcare Management
Asma Khatoon
ELECTRONICS (2020)
Java decompiler diversity and its application to meta-decompilation
Nicolas Harrand et al.
JOURNAL OF SYSTEMS AND SOFTWARE (2020)
Source Code Obfuscation for Smart Contracts
Meng Zhang et al.
2020 27TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2020) (2020)
SERAPH: Enabling Cross-Platform Security Analysis For EVM and WASM Smart Contracts
Zhiqiang Yang et al.
2020 ACM/IEEE 42ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: COMPANION PROCEEDINGS (ICSE-COMPANION 2020) (2020)
Ethainter: A Smart Contract Security Analyzer for Composite Vulnerabilities
Lexi Brent et al.
PROCEEDINGS OF THE 41ST ACM SIGPLAN CONFERENCE ON PROGRAMMING LANGUAGE DESIGN AND IMPLEMENTATION (PLDI '20) (2020)
Semantic Understanding of Smart Contracts: Executable Operational Semantics of Solidity
Jiao Jiao et al.
2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020) (2020)
Etherolic: A Practical Security Analyzer for Smart Contracts
Mohammadreza Ashouri
PROCEEDINGS OF THE 35TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING (SAC'20) (2020)
SMARTSHIELD: Automatic Smart Contract Protection Made Easy
Yuyao Zhang et al.
PROCEEDINGS OF THE 2020 IEEE 27TH INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION, AND REENGINEERING (SANER '20) (2020)
Reentrancy Vulnerability Identification in Ethereum Smart Contracts
Noama Fatima Samreen et al.
PROCEEDINGS OF THE 2020 IEEE 3RD INTERNATIONAL WORKSHOP ON BLOCKCHAIN ORIENTED SOFTWARE ENGINEERING (IWBOSE '20) (2020)
A Hybrid Formal Verification System in Coq for Ensuring the Reliability and Security of Ethereum-Based Service Smart Contracts
Zheng Yang et al.
IEEE ACCESS (2020)
Security Smells in Smart Contracts
Mehmet Demir et al.
2019 COMPANION OF THE 19TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS-C 2019) (2019)
Gigahorse: Thorough, Declarative Decompilation of Smart Contracts
Neville Grech et al.
2019 IEEE/ACM 41ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2019) (2019)
SoliAudit: Smart Contract Vulnerability Assessment Based on Machine Learning and Fuzz Testing
Jian-Wei Liao et al.
2019 SIXTH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY (IOTSMS) (2019)
SmartEmbed: A Tool for Clone and Bug Detection in Smart Contracts through Structural Code Embedding
Zhipeng Gao et al.
2019 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME 2019) (2019)
Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization
Steven H. H. Ding et al.
2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019) (2019)
SAFEVM: A Safety Verifier for Ethereum Smart Contracts
Elvira Albert et al.
PROCEEDINGS OF THE 28TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS (ISSTA '19) (2019)
A Comprehensive Survey of Graph Embedding: Problems, Techniques, and Applications
HongYun Cai et al.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2018)
A Comparison of Fuzzy Hashes: Evaluation, Guidelines, and Future Suggestions
Amanda Lee et al.
PROCEEDINGS OF THE SOUTHEAST CONFERENCE ACM SE'17 (2017)
Blockchains and Smart Contracts for the Internet of Things
Konstantinos Christidis et al.
IEEE ACCESS (2016)
A large study on the effect of code obfuscation on the quality of java code
Mariano Ceccato et al.
EMPIRICAL SOFTWARE ENGINEERING (2015)
A refined decompiler to generate C code with high readability
Gengbiao Chen et al.
SOFTWARE-PRACTICE & EXPERIENCE (2013)
Interrater reliability: the kappa statistic
Mary L. McHugh
BIOCHEMIA MEDICA (2012)
Three control flow obfuscation methods for Java software
T. W. Hou et al.
IEE PROCEEDINGS-SOFTWARE (2006)