• 2022安全与软工顶会中区块链智能合约相关论文



    前言

    主要整理了2022年四大安全顶会和六个软工顶会中,有关区块链智能合约的相关论文。
    搜索方式是:在 dblp 中该顶会的页面列表直接使用 Ctrl + F 搜索 block 、smart contract,所以如若名字中没有,可能会有遗漏。(按照以往的经验,基本不太会有什么遗漏。)

    搜集包含的顶会有:
    安全顶会:S&P、USENIX Security、CCS、NDSS
    软工顶会:TOSEM、TSE、ISSTA、FSE、ASE、ICSE

    安全顶会

    S&P

    1、MatRiCT+: More Efficient Post-Quantum Private Blockchain Payments
    2、Quantifying Blockchain Extractable Value: How dark is the forest?
    3、SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds
    4、Universal Atomic Swaps: Secure Exchange of Coins Across All Blockchains
    5、Using Throughput-Centric Byzantine Broadcast to Tolerate Malicious Majority in Blockchains
    6、ZeeStar: Private Smart Contracts by Homomorphic Encryption and Zero-knowledge Proofs

    USENIX Security

    CCS

    1、Bolt-Dumbo Transformer: Asynchronous Consensus As Fast As the Pipelined BFT
    2、Bullshark: DAG BFT Protocols Made Practical
    3、Constant Latency in Sleepy Consensus
    4、Dumbo-NG: Fast Asynchronous BFT Consensus with Throughput-Oblivious Latency
    5、ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes
    6、Minotaur: Multi-Resource Blockchain Consensus
    7、PACE: Fully Parallelizable BFT from Reproposable Byzantine Agreement
    8、Practical Settlement Bounds for Proof-of-Work Blockchains
    9、Empirical Analysis of EIP-1559: Transaction Fees, Waiting Times, and Consensus Security
    10、Foundations of Coin Mixing Services
    11、PEReDi: Privacy-Enhanced, Regulated and Distributed Central Bank Digital Currencies
    12、Platypus: A Central Bank Digital Currency with Unlinkable Transactions and Privacy-Preserving Regulation
    13、Understanding Security Issues in the NFT Ecosystem
    14、Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration
    15、GearBox: Optimal-size Shard Committees by Leveraging the Safety-Liveness Dichotomy
    16、Sleepy Channels: Bi-directional Payment Channels without Watchtowers
    17、Thora: Atomic and Privacy-Preserving Multi-Channel Updates
    18、The Generals’ Scuttlebutt: Byzantine-Resilient Gossip Protocols
    19、Towards Automated Safety Vetting of Smart Contracts in Decentralized Applications
    20、VRust: Automated Vulnerability Detection for Solana Smart Contracts
    21、Zapper: Smart Contracts with Data and Identity Privacy
    22、i-TiRE: Incremental Timed-Release Encryption or How to use Timed-Release Encryption on Blockchains?
    23、zkBridge: Trustless Cross-chain Bridges Made Practical

    NDSS

    软工顶会

    TOSEM

    1、A Study on Blockchain Architecture Design Decisions and Their Security Attacks and Threats
    2、Super-optimization of Smart Contracts
    3、Why Do Smart Contracts Self-Destruct? Investigating the Selfdestruct Function on Ethereum
    4、Time-travel Investigation Toward Building a Scalable Attack Detection Framework on Ethereum

    TSE

    1、DefectChecker: Automated Smart Contract Defect Detection by Analyzing EVM Bytecode
    2、Defining Smart Contract Defects on Ethereum
    3、SigRec: Automatic Recovery of Function Signatures in Smart Contracts

    ISSTA

    1、eTainter: Detecting Gas-Related Vulnerabilities in Smart
    2、Finding Permission Bugs in Smart Contracts with Role Mining
    3、Park: Accelerating Smart Contract Vulnerability Detection via Parallel-Fork Symbolic Execution
    4、SmartDagger: A Bytecode-Based Static Analysis Approach for Detecting Cross-Contract Vulnerability
    5、WASAI: Uncovering Vulnerabilities in Wasm Smart Contracts

    FSE

    1、An Empirical Study of Blockchain System Vulnerabilities: Modules, Types, and Patterns
    2、Declarative Smart Contracts
    3、MANDO-GURU: Vulnerability Detection for Smart Contract Source Code by Heterogeneous Graph Embeddings
    4、SolSEE: a source-level symbolic execution engine for solidity

    ASE

    1、Effectively Generating Vulnerable Transaction Sequences in Smart Contracts with Reinforcement Learning-guided Fuzzing
    2、Identifying Solidity Smart Contract API Documentation Errors

    ICSE

    1、Utilizing Parallelism in Smart Contracts on Decentralized Blockchains by Taming Application-Inherent Conflicts

    等有时间会挑一些智能合约漏洞检测的paper写阅读报告。

  • 相关阅读:
    一文带你了解 Spring 的 @Enable 开头的注解
    ES 搜索引擎
    2023.11.14 hivesql的容器,数组与映射
    PyTorch 中张量运算广播
    动态内存(进阶四)
    VScode中配置python环境
    卸载与安装JDK
    GitHub发布安全漏洞“死对头”CodeQL,“解放”程序员双手
    51单片机复位电容计算与分析(附带Proteus电路图)
    电脑桌面删除的文件回收站没有,电脑上桌面删除文件在回收站找不到怎么办
  • 原文地址:https://blog.csdn.net/qq_45438600/article/details/127831677