Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of protocol fuzzing
Communication protocols form the bedrock of our interconnected world, yet vulnerabilities
within their implementations pose significant security threats. Recent developments have …
within their implementations pose significant security threats. Recent developments have …
Vulseye: Detect smart contract vulnerabilities via stateful directed graybox fuzzing
Smart contracts, the cornerstone of decentralized applications, have become increasingly
prominent in revolutionizing the digital landscape. However, vulnerabilities in smart …
prominent in revolutionizing the digital landscape. However, vulnerabilities in smart …
Towards effective detection of ponzi schemes on ethereum with contract runtime behavior graph
Ponzi schemes, a form of scam, have been discovered in Ethereum smart contracts in recent
years, causing massive financial losses. Existing detection methods primarily focus on rule …
years, causing massive financial losses. Existing detection methods primarily focus on rule …
Guardians of the ledger: Protecting decentralized exchanges from state derailment defects
The decentralized exchange (DEX) leverages smart contracts to trade digital assets for
users on the blockchain. Developers usually develop several smart contracts into one …
users on the blockchain. Developers usually develop several smart contracts into one …
Nyx: Detecting exploitable front-running vulnerabilities in smart contracts
Smart contracts are susceptible to front-running attacks, in which malicious users leverage
prior knowledge of upcoming transactions to execute attack transactions in advance and …
prior knowledge of upcoming transactions to execute attack transactions in advance and …
A comprehensive survey of smart contracts vulnerability detection tools: Techniques and methodologies
N Hejazi, AH Lashkari - Journal of Network and Computer Applications, 2025 - Elsevier
The widespread use of blockchain technology has highlighted smart contracts as crucial
components in digital transactions. However, their susceptibility to vulnerabilities poses …
components in digital transactions. However, their susceptibility to vulnerabilities poses …
Defiwarder: Protecting defi apps from token leaking vulnerabilities
Decentralized Finance (DeFi) apps have rapidly proliferated with the development of
blockchain and smart contracts, whose maximum total value locked (TVL) has exceeded …
blockchain and smart contracts, whose maximum total value locked (TVL) has exceeded …
{SlimArchive}: A Lightweight Architecture for Ethereum Archive Nodes
With the rapid development of Ethereum, archive nodes that record all historical states have
become a critical component of the infrastructure. However, current archive nodes suffer …
become a critical component of the infrastructure. However, current archive nodes suffer …
Demystifying and Detecting Cryptographic Defects in Ethereum Smart Contracts
Ethereum has officially provided a set of system-level cryptographic APIs to enhance smart
contracts with cryptographic capabilities. These APIs have been utilized in over 10% of …
contracts with cryptographic capabilities. These APIs have been utilized in over 10% of …
Midas: Mining Profitable Exploits in On-Chain Smart Contracts via Feedback-Driven Fuzzing and Differential Analysis
In the context of boosting smart contract applications, prioritizing their security becomes
paramount. Smart contract exploits often result in notable financial losses. Ensuring their …
paramount. Smart contract exploits often result in notable financial losses. Ensuring their …