2022安全与软工顶会中区块链智能合约相关论文

2022安全与软工顶会中区块链智能合约相关论文


前言

主要整理了2022年四大安全顶会和六个软工顶会中,有关区块链智能合约的相关论文。
搜索方式是:在 dblp 中该顶会的页面列表直接使用 Ctrl + F 搜索 block 、smart contract,所以如若名字中没有,可能会有遗漏。(按照以往的经验,基本不太会有什么遗漏。)

搜集包含的顶会有:
安全顶会:S&P、USENIX Security、CCS、NDSS
软工顶会:TOSEM、TSE、ISSTA、FSE、ASE、ICSE

安全顶会

S&P

1、MatRiCT+: More Efficient Post-Quantum Private Blockchain Payments
2、Quantifying Blockchain Extractable Value: How dark is the forest?
3、SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds
4、Universal Atomic Swaps: Secure Exchange of Coins Across All Blockchains
5、Using Throughput-Centric Byzantine Broadcast to Tolerate Malicious Majority in Blockchains
6、ZeeStar: Private Smart Contracts by Homomorphic Encryption and Zero-knowledge Proofs

USENIX Security

CCS

1、Bolt-Dumbo Transformer: Asynchronous Consensus As Fast As the Pipelined BFT
2、Bullshark: DAG BFT Protocols Made Practical
3、Constant Latency in Sleepy Consensus
4、Dumbo-NG: Fast Asynchronous BFT Consensus with Throughput-Oblivious Latency
5、ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes
6、Minotaur: Multi-Resource Blockchain Consensus
7、PACE: Fully Parallelizable BFT from Reproposable Byzantine Agreement
8、Practical Settlement Bounds for Proof-of-Work Blockchains
9、Empirical Analysis of EIP-1559: Transaction Fees, Waiting Times, and Consensus Security
10、Foundations of Coin Mixing Services
11、PEReDi: Privacy-Enhanced, Regulated and Distributed Central Bank Digital Currencies
12、Platypus: A Central Bank Digital Currency with Unlinkable Transactions and Privacy-Preserving Regulation
13、Understanding Security Issues in the NFT Ecosystem
14、Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration
15、GearBox: Optimal-size Shard Committees by Leveraging the Safety-Liveness Dichotomy
16、Sleepy Channels: Bi-directional Payment Channels without Watchtowers
17、Thora: Atomic and Privacy-Preserving Multi-Channel Updates
18、The Generals’ Scuttlebutt: Byzantine-Resilient Gossip Protocols
19、Towards Automated Safety Vetting of Smart Contracts in Decentralized Applications
20、VRust: Automated Vulnerability Detection for Solana Smart Contracts
21、Zapper: Smart Contracts with Data and Identity Privacy
22、i-TiRE: Incremental Timed-Release Encryption or How to use Timed-Release Encryption on Blockchains?
23、zkBridge: Trustless Cross-chain Bridges Made Practical

NDSS

软工顶会

TOSEM

1、A Study on Blockchain Architecture Design Decisions and Their Security Attacks and Threats
2、Super-optimization of Smart Contracts
3、Why Do Smart Contracts Self-Destruct? Investigating the Selfdestruct Function on Ethereum
4、Time-travel Investigation Toward Building a Scalable Attack Detection Framework on Ethereum

TSE

1、DefectChecker: Automated Smart Contract Defect Detection by Analyzing EVM Bytecode
2、Defining Smart Contract Defects on Ethereum
3、SigRec: Automatic Recovery of Function Signatures in Smart Contracts

ISSTA

1、eTainter: Detecting Gas-Related Vulnerabilities in Smart
2、Finding Permission Bugs in Smart Contracts with Role Mining
3、Park: Accelerating Smart Contract Vulnerability Detection via Parallel-Fork Symbolic Execution
4、SmartDagger: A Bytecode-Based Static Analysis Approach for Detecting Cross-Contract Vulnerability
5、WASAI: Uncovering Vulnerabilities in Wasm Smart Contracts

FSE

1、An Empirical Study of Blockchain System Vulnerabilities: Modules, Types, and Patterns
2、Declarative Smart Contracts
3、MANDO-GURU: Vulnerability Detection for Smart Contract Source Code by Heterogeneous Graph Embeddings
4、SolSEE: a source-level symbolic execution engine for solidity

ASE

1、Effectively Generating Vulnerable Transaction Sequences in Smart Contracts with Reinforcement Learning-guided Fuzzing
2、Identifying Solidity Smart Contract API Documentation Errors

ICSE

1、Utilizing Parallelism in Smart Contracts on Decentralized Blockchains by Taming Application-Inherent Conflicts

等有时间会挑一些智能合约漏洞检测的paper写阅读报告。

本图文内容来源于网友网络收集整理提供,作为学习参考使用,版权属于原作者。
THE END
分享
二维码
)">
< <上一篇
下一篇>>