A survey of protocol fuzzing

X Zhang, C Zhang, X Li, Z Du, B Mao, Y Li… - ACM Computing …, 2024 - dl.acm.org
Communication protocols form the bedrock of our interconnected world, yet vulnerabilities
within their implementations pose significant security threats. Recent developments have …

Vulseye: Detect smart contract vulnerabilities via stateful directed graybox fuzzing

R Liang, J Chen, C Wu, K He, Y Wu… - IEEE Transactions …, 2025 - ieeexplore.ieee.org
Smart contracts, the cornerstone of decentralized applications, have become increasingly
prominent in revolutionizing the digital landscape. However, vulnerabilities in smart …

Towards effective detection of ponzi schemes on ethereum with contract runtime behavior graph

R Liang, J Chen, C Wu, K He, Y Wu, W Sun… - ACM Transactions on …, 2024 - dl.acm.org
Ponzi schemes, a form of scam, have been discovered in Ethereum smart contracts in recent
years, causing massive financial losses. Existing detection methods primarily focus on rule …

Guardians of the ledger: Protecting decentralized exchanges from state derailment defects

Z Li, W Li, X Li, Y Zhang - IEEE Transactions on Reliability, 2024 - ieeexplore.ieee.org
The decentralized exchange (DEX) leverages smart contracts to trade digital assets for
users on the blockchain. Developers usually develop several smart contracts into one …

Nyx: Detecting exploitable front-running vulnerabilities in smart contracts

W Zhang, Z Zhang, Q Shi, L Liu, L Wei… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Smart contracts are susceptible to front-running attacks, in which malicious users leverage
prior knowledge of upcoming transactions to execute attack transactions in advance and …

A comprehensive survey of smart contracts vulnerability detection tools: Techniques and methodologies

N Hejazi, AH Lashkari - Journal of Network and Computer Applications, 2025 - Elsevier
The widespread use of blockchain technology has highlighted smart contracts as crucial
components in digital transactions. However, their susceptibility to vulnerabilities poses …

Defiwarder: Protecting defi apps from token leaking vulnerabilities

J Su, X Lin, Z Fang, Z Zhu, J Chen… - 2023 38th IEEE/ACM …, 2023 - ieeexplore.ieee.org
Decentralized Finance (DeFi) apps have rapidly proliferated with the development of
blockchain and smart contracts, whose maximum total value locked (TVL) has exceeded …

{SlimArchive}: A Lightweight Architecture for Ethereum Archive Nodes

H Feng, Y Hu, Y Kou, R Li, J Zhu, L Wu… - 2024 USENIX Annual …, 2024 - usenix.org
With the rapid development of Ethereum, archive nodes that record all historical states have
become a critical component of the infrastructure. However, current archive nodes suffer …

Demystifying and Detecting Cryptographic Defects in Ethereum Smart Contracts

J Zhang, Y Shen, J Chen, J Su, Y Wang, T Chen… - arxiv preprint arxiv …, 2024 - arxiv.org
Ethereum has officially provided a set of system-level cryptographic APIs to enhance smart
contracts with cryptographic capabilities. These APIs have been utilized in over 10% of …

Midas: Mining Profitable Exploits in On-Chain Smart Contracts via Feedback-Driven Fuzzing and Differential Analysis

M Ye, X Lin, Y Nan, J Wu, Z Zheng - Proceedings of the 33rd ACM …, 2024 - dl.acm.org
In the context of boosting smart contract applications, prioritizing their security becomes
paramount. Smart contract exploits often result in notable financial losses. Ensuring their …