Ethereum smart contract security research: survey and future research opportunities

Z Wang, H **, W Dai, KKR Choo, D Zou - Frontiers of Computer Science, 2021 - Springer
Blockchain has recently emerged as a research trend, with potential applications in a broad
range of industries and context. One particular successful Blockchain technology is smart …

[HTML][HTML] Just-in-time software vulnerability detection: Are we there yet?

F Lomio, E Iannone, A De Lucia, F Palomba… - Journal of Systems and …, 2022 - Elsevier
Background: Software vulnerabilities are weaknesses in source code that might be exploited
to cause harm or loss. Previous work has proposed a number of automated machine …

Understanding the mirai botnet

M Antonakakis, T April, M Bailey, M Bernhard… - 26th USENIX security …, 2017 - usenix.org
The Mirai botnet, composed primarily of embedded and IoT devices, took the Internet by
storm in late 2016 when it overwhelmed several high-profile targets with massive distributed …

Hackers vs. testers: A comparison of software vulnerability discovery processes

D Votipka, R Stevens, E Redmiles, J Hu… - … IEEE Symposium on …, 2018 - ieeexplore.ieee.org
Identifying security vulnerabilities in software is a critical task that requires significant human
effort. Currently, vulnerability discovery is often the responsibility of software testers before …

The secret life of software vulnerabilities: A large-scale empirical study

E Iannone, R Guadagni, F Ferrucci… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Software vulnerabilities are weaknesses in source code that can be potentially exploited to
cause loss or harm. While researchers have been devising a number of methods to deal …

Hey, you have a problem: On the feasibility of {Large-Scale} web vulnerability notification

B Stock, G Pellegrino, C Rossow, M Johns… - 25th USENIX Security …, 2016 - usenix.org
Large-scale discovery of thousands of vulnerableWeb sites has become a frequent event,
thanks to recent advances in security research and the rise in maturity of Internet-wide …

Economic factors of vulnerability trade and exploitation

L Allodi - Proceedings of the 2017 ACM SIGSAC conference on …, 2017 - dl.acm.org
Cybercrime markets support the development and diffusion of new attack technologies,
vulnerability exploits, and malware. Whereas the revenue streams of cyber attackers have …

Bug {Hunters'} Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem

O Akgul, T Eghtesad, A Elazari, O Gnawali… - 32nd USENIX Security …, 2023 - usenix.org
Although researchers have characterized the bug-bounty ecosystem from the point of view
of platforms and programs, minimal effort has been made to understand the perspectives of …

[BUCH][B] Cyberspace in peace and war

M Libicki - 2016 - books.google.com
This book is written to be a comprehensive guide to cybersecurity and cyberwar policy and
strategy, developed for a one-or two-semester class for students of public policy (including …

Don't Trust The Locals: Investigating the Prevalence of Persistent Client-Side Cross-Site Scripting in the Wild.

M Steffens, C Rossow, M Johns, B Stock - 2019 - publications.cispa.de
The Web has become highly interactive and an important driver for modern life, enabling
information retrieval, social exchange, and online shop**. From the security perspective …