• 2022安全与软工顶会中区块链智能合约相关论文



    前言

    主要整理了2022年四大安全顶会和六个软工顶会中,有关区块链智能合约的相关论文。
    搜索方式是:在 dblp 中该顶会的页面列表直接使用 Ctrl + F 搜索 block 、smart contract,所以如若名字中没有,可能会有遗漏。(按照以往的经验,基本不太会有什么遗漏。)

    搜集包含的顶会有:
    安全顶会:S&P、USENIX Security、CCS、NDSS
    软工顶会:TOSEM、TSE、ISSTA、FSE、ASE、ICSE

    安全顶会

    S&P

    1、MatRiCT+: More Efficient Post-Quantum Private Blockchain Payments
    2、Quantifying Blockchain Extractable Value: How dark is the forest?
    3、SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds
    4、Universal Atomic Swaps: Secure Exchange of Coins Across All Blockchains
    5、Using Throughput-Centric Byzantine Broadcast to Tolerate Malicious Majority in Blockchains
    6、ZeeStar: Private Smart Contracts by Homomorphic Encryption and Zero-knowledge Proofs

    USENIX Security

    CCS

    1、Bolt-Dumbo Transformer: Asynchronous Consensus As Fast As the Pipelined BFT
    2、Bullshark: DAG BFT Protocols Made Practical
    3、Constant Latency in Sleepy Consensus
    4、Dumbo-NG: Fast Asynchronous BFT Consensus with Throughput-Oblivious Latency
    5、ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes
    6、Minotaur: Multi-Resource Blockchain Consensus
    7、PACE: Fully Parallelizable BFT from Reproposable Byzantine Agreement
    8、Practical Settlement Bounds for Proof-of-Work Blockchains
    9、Empirical Analysis of EIP-1559: Transaction Fees, Waiting Times, and Consensus Security
    10、Foundations of Coin Mixing Services
    11、PEReDi: Privacy-Enhanced, Regulated and Distributed Central Bank Digital Currencies
    12、Platypus: A Central Bank Digital Currency with Unlinkable Transactions and Privacy-Preserving Regulation
    13、Understanding Security Issues in the NFT Ecosystem
    14、Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration
    15、GearBox: Optimal-size Shard Committees by Leveraging the Safety-Liveness Dichotomy
    16、Sleepy Channels: Bi-directional Payment Channels without Watchtowers
    17、Thora: Atomic and Privacy-Preserving Multi-Channel Updates
    18、The Generals’ Scuttlebutt: Byzantine-Resilient Gossip Protocols
    19、Towards Automated Safety Vetting of Smart Contracts in Decentralized Applications
    20、VRust: Automated Vulnerability Detection for Solana Smart Contracts
    21、Zapper: Smart Contracts with Data and Identity Privacy
    22、i-TiRE: Incremental Timed-Release Encryption or How to use Timed-Release Encryption on Blockchains?
    23、zkBridge: Trustless Cross-chain Bridges Made Practical

    NDSS

    软工顶会

    TOSEM

    1、A Study on Blockchain Architecture Design Decisions and Their Security Attacks and Threats
    2、Super-optimization of Smart Contracts
    3、Why Do Smart Contracts Self-Destruct? Investigating the Selfdestruct Function on Ethereum
    4、Time-travel Investigation Toward Building a Scalable Attack Detection Framework on Ethereum

    TSE

    1、DefectChecker: Automated Smart Contract Defect Detection by Analyzing EVM Bytecode
    2、Defining Smart Contract Defects on Ethereum
    3、SigRec: Automatic Recovery of Function Signatures in Smart Contracts

    ISSTA

    1、eTainter: Detecting Gas-Related Vulnerabilities in Smart
    2、Finding Permission Bugs in Smart Contracts with Role Mining
    3、Park: Accelerating Smart Contract Vulnerability Detection via Parallel-Fork Symbolic Execution
    4、SmartDagger: A Bytecode-Based Static Analysis Approach for Detecting Cross-Contract Vulnerability
    5、WASAI: Uncovering Vulnerabilities in Wasm Smart Contracts

    FSE

    1、An Empirical Study of Blockchain System Vulnerabilities: Modules, Types, and Patterns
    2、Declarative Smart Contracts
    3、MANDO-GURU: Vulnerability Detection for Smart Contract Source Code by Heterogeneous Graph Embeddings
    4、SolSEE: a source-level symbolic execution engine for solidity

    ASE

    1、Effectively Generating Vulnerable Transaction Sequences in Smart Contracts with Reinforcement Learning-guided Fuzzing
    2、Identifying Solidity Smart Contract API Documentation Errors

    ICSE

    1、Utilizing Parallelism in Smart Contracts on Decentralized Blockchains by Taming Application-Inherent Conflicts

    等有时间会挑一些智能合约漏洞检测的paper写阅读报告。

  • 相关阅读:
    基于Java毕业设计休闲网络宾馆管理源码+系统+mysql+lw文档+部署软件
    MVSNet论文笔记
    关于IDEA创建maven web 项目时遇到的坑及避坑指南(注解失效等)
    【FDTD 反射、透射、吸收 软件操作】
    2023/10/25
    异常篇——异常处理
    进程中的权限是如何操作的
    Java处理数据成为树状结构
    求解哈夫曼树HuffmanTree以及C语言实现
    轮胎的分类区分
  • 原文地址:https://blog.csdn.net/qq_45438600/article/details/127831677