3.8 Proceedings Paper

An Empirical Study of Smart Contract Decompilers

Related references

Note: Only part of the references are listed.
Article Computer Science, Software Engineering

SigRec: Automatic Recovery of Function Signatures in Smart Contracts

Ting Chen et al.

Summary: This paper proposes a novel solution to automatically recover function signatures from smart contract bytecode by leveraging the Ethereum virtual machine. By exploiting how smart contracts determine the functions to be invoked, the approach locates and extracts function ids and utilizes type-aware symbolic execution to identify the number and types of parameters. The experimental results demonstrate that the proposed method outperforms existing tools in accuracy and efficiency, and the recovered function signatures are useful in various applications such as attack detection, fuzzing, and reverse engineering.

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING (2022)

Proceedings Paper Computer Science, Information Systems

SCSGuard: Deep Scam Detection for Ethereum Smart Contracts

Huiwen Hu et al.

Summary: Smart contract is a crucial component of blockchain systems, enabling automated peer-to-peer transactions and decentralized services. In this study, a novel deep learning scam detection framework called SCSGuard is proposed, which utilizes the bytecodes of smart contracts as features to determine their fraudulent nature. Experimental results demonstrate that SCSGuard achieves high levels of accuracy, precision, and recall, making it potentially useful for detecting new phishing smart contracts.

IEEE INFOCOM 2022 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS) (2022)

Article Computer Science, Software Engineering

Elipmoc: Advanced Decompilation of Ethereum Smart Contracts

Neville Grech et al.

Summary: Elipmoc is a decompiler for smart contract analysis, utilizing high-precision techniques to achieve scalability, precision, and completeness. It outperforms other tools in terms of resolving operands and achieving higher code decompilation coverage.

PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL (2022)

Article Computer Science, Information Systems

SolGuard: Preventing external call issues in smart contract-based multi-agent robotic systems

Purathani Praitheeshan et al.

Summary: In the study, vulnerabilities in Solidity smart contracts running on the Ethereum platform were identified due to programming issues, leading to the development of the SolGuard plugin to address these critical issues. Empirical evaluation showed that SolGuard outperformed baseline tools in terms of efficiency and accuracy.

INFORMATION SCIENCES (2021)

Proceedings Paper Computer Science, Software Engineering

Practical Smart Contract Sharding with Ownership and Commutativity Analysis

George Pirlea et al.

Summary: The research proposed a new method to efficiently shard smart contracts, which can process state operations that can be exchanged and define the results deterministically, and illustrate the necessity of executing non-exchangable operations. The method infers ownership and commutativity summaries for smart contracts through a static program analysis tool CoSplit, translating them into sharding signatures to increase the transaction processing throughput of the system for real-world smart contracts.

PROCEEDINGS OF THE 42ND ACM SIGPLAN INTERNATIONAL CONFERENCE ON PROGRAMMING LANGUAGE DESIGN AND IMPLEMENTATION (PLDI '21) (2021)

Article Mathematics, Applied

Understanding Graph Embedding Methods and Their Applications

Mengjia Xu

Summary: Graph embedding techniques convert high-dimensional sparse graphs into low-dimensional, dense vector spaces, making it easier to quantify node similarity and use in various graph analytics tasks.

SIAM REVIEW (2021)

Article Computer Science, Information Systems

A Blockchain-Based Smart Contract System for Healthcare Management

Asma Khatoon

ELECTRONICS (2020)

Article Computer Science, Software Engineering

Java decompiler diversity and its application to meta-decompilation

Nicolas Harrand et al.

JOURNAL OF SYSTEMS AND SOFTWARE (2020)

Proceedings Paper Computer Science, Software Engineering

Source Code Obfuscation for Smart Contracts

Meng Zhang et al.

2020 27TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2020) (2020)

Proceedings Paper Computer Science, Software Engineering

SERAPH: Enabling Cross-Platform Security Analysis For EVM and WASM Smart Contracts

Zhiqiang Yang et al.

2020 ACM/IEEE 42ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: COMPANION PROCEEDINGS (ICSE-COMPANION 2020) (2020)

Proceedings Paper Computer Science, Software Engineering

Ethainter: A Smart Contract Security Analyzer for Composite Vulnerabilities

Lexi Brent et al.

PROCEEDINGS OF THE 41ST ACM SIGPLAN CONFERENCE ON PROGRAMMING LANGUAGE DESIGN AND IMPLEMENTATION (PLDI '20) (2020)

Proceedings Paper Computer Science, Information Systems

Semantic Understanding of Smart Contracts: Executable Operational Semantics of Solidity

Jiao Jiao et al.

2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020) (2020)

Proceedings Paper Computer Science, Artificial Intelligence

Etherolic: A Practical Security Analyzer for Smart Contracts

Mohammadreza Ashouri

PROCEEDINGS OF THE 35TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING (SAC'20) (2020)

Proceedings Paper Computer Science, Software Engineering

SMARTSHIELD: Automatic Smart Contract Protection Made Easy

Yuyao Zhang et al.

PROCEEDINGS OF THE 2020 IEEE 27TH INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION, AND REENGINEERING (SANER '20) (2020)

Proceedings Paper Computer Science, Software Engineering

Reentrancy Vulnerability Identification in Ethereum Smart Contracts

Noama Fatima Samreen et al.

PROCEEDINGS OF THE 2020 IEEE 3RD INTERNATIONAL WORKSHOP ON BLOCKCHAIN ORIENTED SOFTWARE ENGINEERING (IWBOSE '20) (2020)

Proceedings Paper Computer Science, Software Engineering

Security Smells in Smart Contracts

Mehmet Demir et al.

2019 COMPANION OF THE 19TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS-C 2019) (2019)

Proceedings Paper Computer Science, Artificial Intelligence

Gigahorse: Thorough, Declarative Decompilation of Smart Contracts

Neville Grech et al.

2019 IEEE/ACM 41ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2019) (2019)

Proceedings Paper Computer Science, Theory & Methods

SoliAudit: Smart Contract Vulnerability Assessment Based on Machine Learning and Fuzz Testing

Jian-Wei Liao et al.

2019 SIXTH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY (IOTSMS) (2019)

Proceedings Paper Computer Science, Software Engineering

SmartEmbed: A Tool for Clone and Bug Detection in Smart Contracts through Structural Code Embedding

Zhipeng Gao et al.

2019 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME 2019) (2019)

Proceedings Paper Computer Science, Theory & Methods

Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization

Steven H. H. Ding et al.

2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019) (2019)

Proceedings Paper Computer Science, Software Engineering

SAFEVM: A Safety Verifier for Ethereum Smart Contracts

Elvira Albert et al.

PROCEEDINGS OF THE 28TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS (ISSTA '19) (2019)

Article Computer Science, Artificial Intelligence

A Comprehensive Survey of Graph Embedding: Problems, Techniques, and Applications

HongYun Cai et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2018)

Proceedings Paper Computer Science, Theory & Methods

A Comparison of Fuzzy Hashes: Evaluation, Guidelines, and Future Suggestions

Amanda Lee et al.

PROCEEDINGS OF THE SOUTHEAST CONFERENCE ACM SE'17 (2017)

Article Computer Science, Information Systems

Blockchains and Smart Contracts for the Internet of Things

Konstantinos Christidis et al.

IEEE ACCESS (2016)

Article Computer Science, Software Engineering

A large study on the effect of code obfuscation on the quality of java code

Mariano Ceccato et al.

EMPIRICAL SOFTWARE ENGINEERING (2015)

Article Computer Science, Software Engineering

A refined decompiler to generate C code with high readability

Gengbiao Chen et al.

SOFTWARE-PRACTICE & EXPERIENCE (2013)

Article Medical Laboratory Technology

Interrater reliability: the kappa statistic

Mary L. McHugh

BIOCHEMIA MEDICA (2012)

Article Computer Science, Software Engineering

Three control flow obfuscation methods for Java software

T. W. Hou et al.

IEE PROCEEDINGS-SOFTWARE (2006)