Suivre
Zihao Li
Titre
Citée par
Citée par
Année
Understanding ethereum via graph analysis
T Chen, Z Li, Y Zhu, J Chen, X Luo, JCS Lui, X Lin, X Zhang
ACM Transactions on Internet Technology (TOIT) 20 (2), 1-32, 2020
4342020
An adaptive gas cost mechanism for ethereum to defend against under-priced dos attacks
T Chen, X Li, Y Wang, J Chen, Z Li, X Luo, MH Au, X Zhang
Information Security Practice and Experience: 13th International Conference …, 2017
1562017
Tokenscope: Automatically detecting inconsistent behaviors of cryptocurrency tokens in ethereum
T Chen, Y Zhang, Z Li, X Luo, T Wang, R Cao, X Xiao, X Zhang
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
1482019
Towards saving money in using smart contracts
T Chen, Z Li, H Zhou, J Chen, X Luo, X Li, X Zhang
Proceedings of the 40th International Conference on Software Engineering …, 2018
1242018
Gaschecker: Scalable analysis for discovering gas-inefficient smart contracts
T Chen, Y Feng, Z Li, H Zhou, X Luo, X Li, X Xiao, J Chen, X Zhang
IEEE Transactions on Emerging Topics in Computing 9 (3), 1433-1448, 2020
1112020
Dataether: Data exploration framework for ethereum
T Chen, Z Li, Y Zhang, X Luo, A Chen, K Yang, B Hu, T Zhu, S Deng, T Hu, ...
2019 IEEE 39th International Conference on Distributed Computing Systems …, 2019
612019
A large-scale empirical study on control flow identification of smart contracts
T Chen, Z Li, Y Zhang, X Luo, T Wang, T Hu, X Xiao, D Wang, J Huang, ...
2019 ACM/IEEE International Symposium on Empirical Software Engineering and …, 2019
322019
SigRec: Automatic Recovery of Function Signatures in Smart Contracts
T Chen, Z Li, X Luo, X Wang, T Wang, Z He, K Fang, Y Zhang, H Zhu, H Li, ...
IEEE Transactions on Software Engineering 48 (8), 3066-3086, 2021
292021
Demystifying defi mev activities in flashbots bundle
Z Li, J Li, Z He, X Luo, T Wang, X Ni, W Yang, X Chen, T Chen
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
262023
Large language models for blockchain security: A systematic literature review
Z He, Z Li, S Yang, A Qiao, X Zhang, X Luo, T Chen
arXiv preprint arXiv:2403.14280v4, 2024
212024
Deepinfer: Deep type inference from smart contract bytecode
K Zhao, Z Li, J Li, H Ye, X Luo, T Chen
Proceedings of the 31st ACM Joint European Software Engineering Conference …, 2023
142023
Are we there yet? unraveling the state-of-the-art smart contract fuzzers
S Wu, Z Li, L Yan, W Chen, M Jiang, C Wang, X Luo, H Zhou
Proceedings of the IEEE/ACM 46th International Conference on Software …, 2024
92024
TokenCat: detect flaw of authentication on ERC20 tokens
Z He, Z Liao, F Luo, D Liu, T Chen, Z Li
ICC 2022-IEEE International Conference on Communications, 4999-5004, 2022
92022
NURGLE: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulation
Z He, Z Li, A Qiao, X Luo, X Zhang, T Chen, S Song, D Liu, W Niu
2024 IEEE Symposium on Security and Privacy (SP), 128-128, 2024
82024
Blockexplorer: Exploring blockchain big data via parallel processing
S Li, J Li, Y Tang, X Luo, Z He, Z Li, X Cheng, Y Bai, T Chen, Y Tang, Z Liu, ...
IEEE Transactions on Computers 72 (8), 2377-2389, 2023
82023
Rethinking of Reentrancy on the Ethereum
YX Tang, ZH Li, YX Bai
2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2021
22021
Towards Automatic Discovery of Denial of Service Weaknesses in Blockchain Resource Models
F Luo, H Lin, Z Li, X Luo, R Luo, Z He, S Song, T Chen, W Luo
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and …, 2024
12024
DoubleUp Roll: Double-spending in Arbitrum by Rolling It Back
Z Sun, Z Li, X Peng, X Luo, M Jiang, H Zhou, Y Zhang
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and …, 2024
12024
Following the “Thread”: Toward Finding Manipulatable Bottlenecks in Blockchain Clients
S Wu, Z Li, H Zhou, X Luo, J Li, H Wang
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software …, 2024
12024
DBAF: Dynamic Binary Analysis Framework and Its Applications
T Chen, Y Feng, X Lin, Z Li, X Zhang
Network and System Security: 12th International Conference, NSS 2018, Hong …, 2018
12018
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20