Open Access
Issue |
ITM Web Conf.
Volume 73, 2025
International Workshop on Advanced Applications of Deep Learning in Image Processing (IWADI 2024)
|
|
---|---|---|
Article Number | 03014 | |
Number of page(s) | 11 | |
Section | Blockchain, AI, and Technology Integration | |
DOI | https://doi.org/10.1051/itmconf/20257303014 | |
Published online | 17 February 2025 |
- M. Swan. Blockchain: Blueprint for a New Economy. O’Reilly Media, Inc. (2015) [Google Scholar]
- Z. Zheng, S. Xie, H. N. Dai, et al. Blockchain challenges and opportunities: A survey. Int’l Journal of Web and Grid Services (2018) [Google Scholar]
- L. S. Sankar, M. Sindhu & M. Sethumadhavan. Survey of consensus protocols on blockchain applications. In: Proc. of the 4th Int’l Conf. on Advanced Computing and Communication Systems (ICACCS), IEEE (2017) [Google Scholar]
- V. Buterin. A next-generation smart contract and decentralized application platform. Ethereum White Paper (2014) [Google Scholar]
- L. W. Ouyang, S. Wang, Y. Yuan, et al. Smart contracts: Architecture and research progresses. Acta Automatica Sinica (2019) [Google Scholar]
- N. Szabo. Smart contracts: Building blocks for digital markets. Journal of Transhumanist Thought (1996) [Google Scholar]
- Bcsec. https://bcsec.org; Slowmist. (2018) [Google Scholar]
- The DAO. https://www.investopedia.com/tech/what-dao/ (2024) [Google Scholar]
- Hard-Fork. https://www.investopedia.com/terms/h/hard-fork.asp (2020) [Google Scholar]
- Z. Zheng, N. Zhang, J. Su, et al. Turn the rudder: A beacon of reentrancy detection for smart contracts on ethereum. In: 2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE), IEEE, pp. 295-306 (2023) [Google Scholar]
- E. Hildenbrandt, M. Saxena, N. Rodrigues, et al. Kevm: A complete formal semantics of the ethereum virtual machine. In: 2018 IEEE 31st Computer Security Foundations Symposium (CSF), IEEE, pp. 204-217 (2018) [Google Scholar]
- BeautyChain integer overflow. https://etherscan.io/token/0xc5d105e63711398af9bbff092d4b6769c82f793d (2018) [Google Scholar]
- SafeMath. https://docs.statechannels.org/contract-api/natspec/SafeMath (2020) [Google Scholar]
- H. B. N. A. Leandro. A Survey of Security Issues in Smart Contracts. http://arXiv:2001.03452 (2020) [Google Scholar]
- N. Ivanov, C. Li, Q. Yan, et al. Security threat mitigation for smart contracts: A comprehensive survey. ACM Computing Surveys, 55(14s), 1-37 (2023) [Google Scholar]
- A. Kosba, D. Papadopoulos, C. Papamanthou, et al. MIRAGE: Succinct arguments for randomized algorithms with applications to universal zk-SNARKs. In: 29th USENIX Security Symposium (USENIX Security 20), pp. 2129-2146 (2020) [Google Scholar]
- A. Laurent, L. Brotcorne & B. Fortz. Transaction fees optimization in the Ethereum blockchain. Blockchain: Research and Applications, 3(3), 100074 (2022) [CrossRef] [Google Scholar]
- P. Praitheeshan, L. Pan, J. Yu, et al. Security analysis methods on ethereum smart contract vulnerabilities: a survey. arXiv preprint arXiv:1908.08605 (2019) [Google Scholar]
- N. Deshpande & R. Vaghela. Demystifying Reentrancy Attacks on Smart Contracts Understanding Types and Mitigations. Towards Excellence, (1) (2024) [Google Scholar]
- Y. Fang, D. Wu, X. Yi, et al. Beyond “Protected” and “Private”: An Empirical Security Analysis of Custom Function Modifiers in Smart Contracts. In: Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 1157-1168 (2023) [Google Scholar]
- H. Liu & Y. Sun. Using My Functions Should Follow My Checks: Understanding and Detecting Insecure OpenZeppelin Code in Smart Contracts. In: 33rd USENIX Security Symposium (USENIX Security 24), USENIX Association, pp. 3585-3601 (2024) [Google Scholar]
- A. I. Beksultanova & A. L. Tkachenko. Analysis tools for smart contract security. In: 2nd International Conference on Computer Applications for Management and Sustainable Development of Production and Industry (CMSD-II-2022), SPIE, 12564, 221-228 (2023) [Google Scholar]
- W. Chen, Z. Yang, J. Zhang, et al. Enhancing Blockchain Performance via On-chain and Off-chain Collaboration. In: International Conference on Service-Oriented Computing, Cham: Springer Nature Switzerland, pp. 393-408 (2023) [Google Scholar]
- G. C. Sirakoulis, K. Christodoulou, S. A. Chatzichristofis, et al. RandomBlocks: a transparent, verifiable blockchain-based system for random numbers (2019) [Google Scholar]
- E. Hildenbrandt, M. Saxena, N. Rodrigues, et al. Kevm: A complete formal semantics of the ethereum virtual machine. In: 2018 IEEE 31st Computer Security Foundations Symposium (CSF), IEEE, pp. 204-217 (2018) [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.