4.7 Article

Rethinking Smart Contract Fuzzing: Fuzzing With Invocation Ordering and Important Branch Revisiting

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Artificial Intelligence

Combining Graph Neural Networks With Expert Knowledge for Smart Contract Vulnerability Detection

Zhenguang Liu et al.

Summary: Smart contract vulnerability detection has gained significant attention recently. Existing methods heavily rely on expert-defined rules, which are labor-intensive and non-scalable. This paper proposes a method using graph neural networks and expert knowledge for smart contract vulnerability detection. Experimental results show improved accuracy compared to state-of-the-art methods on different types of vulnerabilities.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2023)

Review Computer Science, Information Systems

Systematic Review of Security Vulnerabilities in Ethereum Blockchain Smart Contract

Satpal Singh Kushwaha et al.

Summary: This paper provides a systematic review of security vulnerabilities in the Ethereum blockchain. It discusses vulnerabilities in Ethereum smart contracts, detection tools, real-life attacks, and preventive mechanisms. It highlights various issues associated with Ethereum blockchain-based smart contracts and explores future research directions.

IEEE ACCESS (2022)

Article Automation & Control Systems

V-Fuzz: Vulnerability Prediction-Assisted Evolutionary Fuzzing for Binary Programs

Yuwei Li et al.

Summary: This article introduces an evolutionary fuzzing framework called V-Fuzz, which efficiently identifies vulnerabilities in binary programs using a vulnerability prediction model and an evolutionary algorithm. Experimental results demonstrate that V-Fuzz is effective in finding bugs and has discovered new vulnerabilities.

IEEE TRANSACTIONS ON CYBERNETICS (2022)

Proceedings Paper Computer Science, Information Systems

CONFUZZIUS: A Data Dependency-Aware Hybrid Fuzzer for Smart Contracts

Christof Ferreira Torres et al.

Summary: Smart contracts are Turing-complete programs executed on a blockchain that cannot be modified once deployed, making them attractive targets for attackers. Various bug detection tools have been proposed, with symbolic execution often leading to false positives and fuzzers more effective at finding shallow bugs. Hybrid fuzzing, combining symbolic execution and fuzzing, has shown promising results in improving bug detection and code coverage in smart contracts.

2021 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2021) (2021)

Proceedings Paper Computer Science, Information Systems

Making Smart Contracts Smarter

Syed Badruddoja et al.

Summary: Blockchain technology and artificial intelligence, each with its own strengths and weaknesses, can complement each other and combine to develop a decentralized machine learning architecture that promises to improve application security, automation, and dynamism.

2021 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY (ICBC) (2021)

Proceedings Paper Computer Science, Software Engineering

Targeted Greybox Fuzzing with Static Lookahead Analysis

Valentin Wustholz et al.

2020 ACM/IEEE 42ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2020) (2020)

Article Computer Science, Information Systems

Towards Automated Reentrancy Detection for Smart Contracts Based on Sequential Models

Peng Qian et al.

IEEE ACCESS (2020)

Article Computer Science, Software Engineering

Coverage-Based Greybox Fuzzing as Markov Chain

Marcel Bohme et al.

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING (2019)

Proceedings Paper Computer Science, Artificial Intelligence

Digital Resource Rights Confirmation and Infringement Tracking Based on Smart Contracts

Peng Qian et al.

PROCEEDINGS OF 2019 6TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (CCIS) (2019)

Proceedings Paper Computer Science, Artificial Intelligence

A Novel Neural Source Code Representation Based on Abstract Syntax Tree

Jian Zhang et al.

2019 IEEE/ACM 41ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2019) (2019)

Proceedings Paper Computer Science, Cybernetics

CryptoAR Wallet: A Blockchain Cryptocurrency Wallet Application that Uses Augmented Reality for On-chain User Data Display

You-Ping Chen et al.

PROCEEDINGS OF THE 21ST INTERNATIONAL CONFERENCE ON HUMAN-COMPUTER INTERACTION WITH MOBILE DEVICES AND SERVICES (MOBILEHCI'19) (2019)

Proceedings Paper Computer Science, Information Systems

Learning to Fuzz from Symbolic Execution with Application to Smart Contracts

Jingxuan He et al.

PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19) (2019)

Proceedings Paper Computer Science, Theory & Methods

Fuzzing File Systems via Two-Dimensional Input Space Exploration

Wen Xu et al.

2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019) (2019)

Proceedings Paper Computer Science, Software Engineering

Slither: A Static Analysis Framework For Smart Contracts

Josselin Feist et al.

2019 IEEE/ACM 2ND INTERNATIONAL WORKSHOP ON EMERGING TRENDS IN SOFTWARE ENGINEERING FOR BLOCKCHAIN (WETSEB 2019) (2019)

Article Computer Science, Hardware & Architecture

Fuzzing: State of the Art

Hongliang Liang et al.

IEEE TRANSACTIONS ON RELIABILITY (2018)

Proceedings Paper Computer Science, Theory & Methods

A Semantic Framework for the Security Analysis of Ethereum Smart Contracts

Ilya Grishchenko et al.

PRINCIPLES OF SECURITY AND TRUST, POST 2018 (2018)

Proceedings Paper Computer Science, Information Systems

KEVM: A Complete Formal Semantics of the Ethereum Virtual Machine

Everett Hildenbrandt et al.

IEEE 31ST COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2018) (2018)

Proceedings Paper Computer Science, Theory & Methods

SECURIFY: Practical Security Analysis of Smart Contracts

Petar Tsankov et al.

PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) (2018)

Proceedings Paper Computer Science, Theory & Methods

Hawkeye: Towards a Desired Directed Grey-box Fuzzer

Hongxu Chen et al.

PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) (2018)

Proceedings Paper Computer Science, Theory & Methods

CollAFL: Path Sensitive Fuzzing

Shuitao Gan et al.

2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2018)

Proceedings Paper Computer Science, Theory & Methods

Angora: Efficient Fuzzing by Principled Search

Peng Chen et al.

2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2018)

Proceedings Paper Computer Science, Information Systems

OSIRIS: Hunting for Integer Bugs in Ethereum Smart Contracts

Christof Ferreira Torres et al.

34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018) (2018)

Article Computer Science, Information Systems

Blockchain challenges and opportunities: a survey

Zibin Zheng et al.

INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES (2018)

Proceedings Paper Computer Science, Software Engineering

A Survey of Attacks on Ethereum Smart Contracts (SoK)

Nicola Atzei et al.

PRINCIPLES OF SECURITY AND TRUST (POST 2017) (2017)

Proceedings Paper Computer Science, Information Systems

Directed Greybox Fuzzing

Marcel Bohme et al.

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Article Business, Finance

Blockchain: Emergent Industry Adoption and Implications for Accounting

Julia Kokina et al.

JOURNAL OF EMERGING TECHNOLOGIES IN ACCOUNTING (2017)

Proceedings Paper Computer Science, Software Engineering

Formal Verification of Smart Contracts Short Paper

Karthikeyan Bhargavan et al.

PROCEEDINGS OF THE 2016 ACM WORKSHOP ON PROGRAMMING LANGUAGES AND ANALYSIS FOR SECURITY (PLAS'16) (2016)

Article Computer Science, Software Engineering

Can traditional fault prediction models be used for vulnerability prediction?

Yonghee Shin et al.

EMPIRICAL SOFTWARE ENGINEERING (2013)