[1]Szabo N. Smart contracts[EBOL]. (19940610)[20230130]. http:www.fon.hum.uva.nlrobCoursesInfor mationInSpeechCDROMLiteratureLOTwinterschool2006szabo.best.vwh.netsmart.contracts.html[2]Wood G. Ethereum: A secure decentralised generalised transaction ledger[JOL]. Ethereum Project Yellow Paper, 2014 [20230709]. https:cryptodeep.rudocpaper.pdf[3]Zheng Z, Xie S, Dai H, et al. An overview of blockchain technology: Architecture, consensus, and future trends[C] Proc of the 2017 IEEE Int Congress on Big Data. Piscataway, NJ: IEEE, 2017: 557564[4]郭上铜, 王瑞锦, 张凤荔. 区块链技术原理与应用综述[J]. 计算机科学, 2021, 48(2): 271281[5]钱鹏, 刘振广, 何钦铭, 等. 智能合约安全漏洞检测技术研究综述[J]. 软件学报, 2022, 33(8): 30593085[6]Arias L, Spagnuolo F, Giordano F, et al. OpenZeppelin[EBOL]. [20230203]. https:http:github.comOpen ZeppelinopenzeppelinSolidity[7]付梦琳, 吴礼发, 洪征, 等. 智能合约安全漏洞挖掘技术研究[J]. 计算机应用, 2019, 39(7): 19591966[8]张潆藜, 马佳利, 刘子昂, 等. 以太坊Solidity智能合约漏洞检测方法综述[J]. 计算机科学, 2022, 49(3): 5261[9]黄凯峰, 张胜利, 金石. 区块链智能合约安全研究[J]. 信息安全研究, 2019, 5(3): 192206[10]韩璇, 袁勇, 王飞跃. 区块链安全问题: 研究现状与展望[J]. 自动化学报, 2019, 45(1): 206225[11]Atzei N, Bartoletti M, Cimoli T. A survey of attacks on ethereum smart contracts (sok)[C] Proc of Int Conf on Principles of Security and Trust. Berlin: Springer, 2017: 164186[12]郑忠斌, 王朝栋, 蔡佳浩. 智能合约的安全研究现状与检测方法分析综述[J]. 信息安全与通信保密, 2020(7): 93105[13]袁勇, 倪晓春, 曾帅, 等. 区块链共识算法的发展现状与展望[J]. 自动化学报, 2018, 44(11): 20112022[14]倪远东, 张超, 殷婷婷. 智能合约安全漏洞研究综述[J]. 信息安全学报, 2020, 5(3): 7899[15]胡凯, 白晓敏, 高灵超, 等. 智能合约的形式化验证方法[J]. 信息安全研究, 2016, 2(12): 10801089[16]Fey G. Assessing system vulnerability using formal verification techniques[G] LNCS 7119: Proc of Mathematical and Engineering Methods in Computer Science. Berlin: Springer, 2012: 4756[17]Kalra S, Goel S, Dhawan M, et al. ZEUS:Analyzing safety of smart contracts[C] Proc of the 25th Annual Network and Distributed System Security Symp. 2018 [20230709]. https:sukritkalra.github.iodatapaperszeus.pdf[18]Tsankov P, Dan A, DrachslerCohen D, et al. Securify: Practical security analysis of smart contracts[C] Proc of the 2018 ACM SIGSAC Conf on Computer and Communications Security.New York: ACM, 2018: 6782[19]VaaS. Automated formal verification platform for smart contract[EBOL]. 2019 [20230709]. https:www.lianantech.com[20]Luu L, Chu D H, Olickel H, et al. Making smart contracts smarter[C] Proc of the 2016 ACM SIGSAC Conf on Computer and Communications Security. New York: ACM, 2016: 254269[21]Mossberg M, Manzano F, Hennenfent E, et al. Manticore: A userfriendly symbolic execution framework for binaries and smart contracts[C] Proc of the 34th IEEEACM Int Conf on Automated Software Engineering. Piscataway, NJ: IEEE, 2019: 11861189[22]Mueller B. MythrilReversing and bug hunting framework for the Ethereum blockchain[JOL].2017[20210831]. https:pypi.orgprojectmythril[23]Nikoli I, Kolluri A, Sergey I, et al. Finding the greedy, prodigal, and suicidal contracts at scale[C] Proc of the 34th Annual Computer Security Applications Conf. New York:ACM, 2018: 653663[24]Jiang B, Liu Y, Chan W K. Contractfuzzer: Fuzzing smart contracts for vulnerability detection[C] Proc of the 33rd ACMIEEE Int Conf on Automated Software Engineering. Piscataway, NJ: IEEE, 2018: 259269[25]Liu C, Liu H, Cao Z, et al. Reguard:Finding reentrancy bugs in smart contracts[C] Proc of the 40th Int Conf on Software Engineering: Companion. New York: ACM, 2018: 6568[26]Gao J, Liu H, Liu C, et al. Easyflow: Keep ethereum away from overflow[C] Proc of the 41st IEEEACM Int Conf on Software Engineering: Companion. Piscataway, NJ: IEEE, 2019: 2326[27]李朝君, 蒋凡. 符号执行中高语句覆盖率的路径调度[J]. 计算机工程与应用, 2010, 46(14): 6668[28]高凤娟, 王豫, 司徒凌云, 等. 基于深度学习的混合模糊测试方法[J]. 软件学报, 2021, 32(4): 9881005
|