[1] 何蒲, 于戈, 张岩峰, 等. 区块链技术与应用前瞻综述[J]. 计算机科学, 2017, 44(4): 1-7.
HE P, YU G, ZHANG Y F, et al. Survey on blockchain technology and its application prospect[J]. Journal of Computer Science, 2017, 44(4): 1-7.
[2] 贺海武, 延安, 陈泽华. 基于区块链的智能合约技术与应用综述[J]. 计算机研究与发展, 2018, 55(11): 2452-2466.
HE H W, YAN A, CHEN Z H. Survey of smart contract technology and application based on blockchain[J]. Journal of Computer Research and Development, 2018, 55(11): 2452-2466.
[3] ZOU W, LO D, KOCHHAR P S, et al. Smart contract development: challenges and opportunities[J]. IEEE Transactions on Software Engineering, 2021, 47(10): 2084-2106.
[4] 钱鹏, 刘振广, 何钦铭, 等. 智能合约安全漏洞检测技术研究综述[J]. 软件学报, 2022, 33(8): 3059-3085.
QIAN P, LIU Z G, HE Q M, et al. Smart contract vulnerability detection techniques: a survey[J]. Journal of Software, 2022, 33(8): 3059-3085.
[5] TIKHOMIROV S, VOSKRESENSKAYA E, IVANITSKIY I, et al. SmartCheck: static analysis of Ethereum smart contracts[C]//2018 IEEE/ACM 1st International Workshop on Emerging Trends in Software Engineering for Blockchain, 2018: 9-16.
[6] KRUPP J, ROSSOW C. TEETHER: gnawing at Ethereum to automatically exploit smart contracts[C]//Proceedings of the 27th USENIX Conference on Security Symposium, 2018: 1317-1333.
[7] MOSSBERG M, MANZANO F, HENNENFENT E, et al. Manticore: a user-friendly symbolic execution framework for binaries and smart contracts[C]//2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2020: 1186-1189.
[8] FEIST J, GRIECO G, GROCE A. Slither: a static analysis framework for smart contracts[C]//2019 IEEE/ACM 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB), 2019: 8-15.
[9] 赵伟, 张问银, 王九如, 等. 基于符号执行的智能合约漏洞检测方案[J]. 计算机应用, 2020, 40(4): 947-953.
ZHAO W, ZHANG W Y, WANG J R, et al. Smart contract vulnerability detection scheme based on symbol execution[J]. Journal of Computer Applications, 2020, 40(4): 947-953.
[10] 陈霄汉, 赵相福, 张登记, 等. SlightDetection: 一种以太坊智能合约安全漏洞的静态分析工具[J]. 应用科学学报, 2022, 40(4): 695-712.
CHEN X H, ZHAO X F, ZHANG D J, et al. SlightDetection: a static analysis tool for smart contracts security vulnerabilities on Ethereum[J]. Journal of Applied Sciences, 2022, 40(4): 695-712.
[11] LUU L, CHU D H, OLICKEL H, et al. Making smart contracts smarter[C]//the 2016 ACM SIGSAC Conference, 2016: 254-269.
[12] 胡凯, 白晓敏, 高灵超, 等. 智能合约的形式化验证方法[J]. 信息安全研究, 2016, 2(12): 1080-1089.
HU K, BAI X M, GAO L C, et al. Formal verification method of smart contract[J]. Journal of Information Security Research, 2016, 2(12): 1080-1089.
[13] BARTOLETTI M, ZUNINO R. BitML: a calculus for Bitcoin smart contracts[C]//the 2018 ACM SIGSAC Conference, 2018: 83-100.
[14] TSANKOV P, DAN A, DRACHSLER-COHEN D, et al. Securify: practical security analysis of smart contracts[C]// Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018: 67-82.
[15] RODLER M, LI W, KARAME G O, et al. Sereum: protecting existing smart contracts against re-entrancy attacks[C]//Network and Distributed System Security Symposium, 2019: 24-27.
[16] LIAO J W, TSAI T T, HE C K, et al. SoliAudit: smart contract vulnerability assessment based on machine learning and fuzz testing[C]//2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS), 2019: 458-465.
[17] HE N Y, ZHANG R Y, WANG H Y, et al. EOSAFE: security analysis of EOSIO smart contracts[C]//30th USENIX Security Symposium (USENIX Security 21), 2021: 1271-1288.
[18] BARBONI M, MORICHETTA A, POLINI A. SuMo: a mutation testing strategy for solidity smart contracts[C]//2nd IEEE/ACM International Conference on Automation of Software Test (AST 2021), 2021: 50-59.
[19] BO J, LIU Y, CHAN W K. ContractFuzzer: fuzzing smart contracts for vulnerability detection[C]//Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018: 259-269.
[20] HUANG Y, JIANG B, CHAN W K. EOSFuzzer: fuzzing EOSIO smart contracts for vulnerability detection[C]//2018 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE), 2018: 259-269.
[21] DING M, LI P, LI S, et al. HFContractFuzzer: fuzzing hyperledger fabric smart contracts for vulnerability detection[C]//2018 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE), Montpellier, France, 2018: 259-269.
[22] LIU C, LIU H, CAO Z, et al. ReGuard: finding reentrancy bugs in smart contracts[C]//2018 IEEE/ACM 40th International Conference on Software Engineering: Companion (ICSE-Companion), 2018: 65-68.
[23] LI Z X, WU H R, XU J H, et al. MuSC: a tool for mutation testing of Ethereum smart contract[C]//34th IEEE/ACM International Conference on Automated Software Engineering, 2019: 1198-1201.
[24] ZHUANG Y, LIU Z, QIAN P, et al. Smart contract vulnerability detection using graph neural network[C]//29th International Joint Conference on Artificial Intelligence (IJCAI 2020), 2020: 3283-3290.
[25] ASHIZAWA N, YANAI N, CRUZ J P, et al. Eth2Vec: learning contract-wide code representations for vulnerability detection on Ethereum smart contracts[C]//Proceedings of the 3rd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2021: 47-59.
[26] 张光华, 刘永升, 王鹤, 等. 基于 BiLSTM 和注意力机制的智能合约漏洞检测方案[J]. 信息网络安全, 2022, 22(9): 46-54.
ZHANG G H, LIU Y S, WANG H, et al. Smart contract vulnerability detection scheme based on BiLSTM and attention mechanism[J]. Netinfo Security, 2022, 22(9): 46-54.
[27] TANN J W, XING J H, GUPTA S S, et al. Towards safer smart contracts: a sequence learning approach to detecting vulnerabilities[J].arXiv:1811.06632, 2018.
[28] ASHOURI M. Etherolic: a practical security analyzer for smart contracts[C]//Proceedings of the 35th Annual ACM Symposium on Applied Computing, 2020.
[29] LIU H , LIU C, ZHAO W, et al. S-gram: towards semantic-aware security auditing for ethereum smart contracts[C]//2018 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE), 2018: 814-819.
[30] 范吉立, 李晓华, 聂铁铮, 等. 区块链系统中智能合约技术综述[J]. 计算机科学, 2019, 46(11): 7-16.
FAN J L, LI X H, NIE T Z, et al. Survey on smart contract based on blockchain system[J]. Journal of Computer Science, 2019, 46(11): 7-16.
[31] WIGAN D. Smart contract doubts rise on DAO hack[J]. International Financing Review, 2016(2139): 54. |