Understanding ethereum via graph analysis T Chen, Z Li, Y Zhu, J Chen, X Luo, JCS Lui, X Lin, X Zhang ACM Transactions on Internet Technology (TOIT) 20 (2), 1-32, 2020 | 434 | 2020 |
An adaptive gas cost mechanism for ethereum to defend against under-priced dos attacks T Chen, X Li, Y Wang, J Chen, Z Li, X Luo, MH Au, X Zhang Information Security Practice and Experience: 13th International Conference …, 2017 | 156 | 2017 |
Tokenscope: Automatically detecting inconsistent behaviors of cryptocurrency tokens in ethereum T Chen, Y Zhang, Z Li, X Luo, T Wang, R Cao, X Xiao, X Zhang Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 148 | 2019 |
Towards saving money in using smart contracts T Chen, Z Li, H Zhou, J Chen, X Luo, X Li, X Zhang Proceedings of the 40th International Conference on Software Engineering …, 2018 | 124 | 2018 |
Gaschecker: Scalable analysis for discovering gas-inefficient smart contracts T Chen, Y Feng, Z Li, H Zhou, X Luo, X Li, X Xiao, J Chen, X Zhang IEEE Transactions on Emerging Topics in Computing 9 (3), 1433-1448, 2020 | 111 | 2020 |
Dataether: Data exploration framework for ethereum T Chen, Z Li, Y Zhang, X Luo, A Chen, K Yang, B Hu, T Zhu, S Deng, T Hu, ... 2019 IEEE 39th International Conference on Distributed Computing Systems …, 2019 | 61 | 2019 |
A large-scale empirical study on control flow identification of smart contracts T Chen, Z Li, Y Zhang, X Luo, T Wang, T Hu, X Xiao, D Wang, J Huang, ... 2019 ACM/IEEE International Symposium on Empirical Software Engineering and …, 2019 | 32 | 2019 |
SigRec: Automatic Recovery of Function Signatures in Smart Contracts T Chen, Z Li, X Luo, X Wang, T Wang, Z He, K Fang, Y Zhang, H Zhu, H Li, ... IEEE Transactions on Software Engineering 48 (8), 3066-3086, 2021 | 29 | 2021 |
Demystifying defi mev activities in flashbots bundle Z Li, J Li, Z He, X Luo, T Wang, X Ni, W Yang, X Chen, T Chen Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 26 | 2023 |
Large language models for blockchain security: A systematic literature review Z He, Z Li, S Yang, A Qiao, X Zhang, X Luo, T Chen arXiv preprint arXiv:2403.14280v4, 2024 | 21 | 2024 |
Deepinfer: Deep type inference from smart contract bytecode K Zhao, Z Li, J Li, H Ye, X Luo, T Chen Proceedings of the 31st ACM Joint European Software Engineering Conference …, 2023 | 14 | 2023 |
Are we there yet? unraveling the state-of-the-art smart contract fuzzers S Wu, Z Li, L Yan, W Chen, M Jiang, C Wang, X Luo, H Zhou Proceedings of the IEEE/ACM 46th International Conference on Software …, 2024 | 9 | 2024 |
TokenCat: detect flaw of authentication on ERC20 tokens Z He, Z Liao, F Luo, D Liu, T Chen, Z Li ICC 2022-IEEE International Conference on Communications, 4999-5004, 2022 | 9 | 2022 |
NURGLE: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulation Z He, Z Li, A Qiao, X Luo, X Zhang, T Chen, S Song, D Liu, W Niu 2024 IEEE Symposium on Security and Privacy (SP), 128-128, 2024 | 8 | 2024 |
Blockexplorer: Exploring blockchain big data via parallel processing S Li, J Li, Y Tang, X Luo, Z He, Z Li, X Cheng, Y Bai, T Chen, Y Tang, Z Liu, ... IEEE Transactions on Computers 72 (8), 2377-2389, 2023 | 8 | 2023 |
Rethinking of Reentrancy on the Ethereum YX Tang, ZH Li, YX Bai 2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2021 | 2 | 2021 |
Towards Automatic Discovery of Denial of Service Weaknesses in Blockchain Resource Models F Luo, H Lin, Z Li, X Luo, R Luo, Z He, S Song, T Chen, W Luo Proceedings of the 2024 on ACM SIGSAC Conference on Computer and …, 2024 | 1 | 2024 |
DoubleUp Roll: Double-spending in Arbitrum by Rolling It Back Z Sun, Z Li, X Peng, X Luo, M Jiang, H Zhou, Y Zhang Proceedings of the 2024 on ACM SIGSAC Conference on Computer and …, 2024 | 1 | 2024 |
Following the “Thread”: Toward Finding Manipulatable Bottlenecks in Blockchain Clients S Wu, Z Li, H Zhou, X Luo, J Li, H Wang Proceedings of the 33rd ACM SIGSOFT International Symposium on Software …, 2024 | 1 | 2024 |
DBAF: Dynamic Binary Analysis Framework and Its Applications T Chen, Y Feng, X Lin, Z Li, X Zhang Network and System Security: 12th International Conference, NSS 2018, Hong …, 2018 | 1 | 2018 |