Analysis and transformation of constrained Horn clauses for program verification
This paper surveys recent work on applying analysis and transformation techniques that
originate in the field of constraint logic programming (CLP) to the problem of verifying …
originate in the field of constraint logic programming (CLP) to the problem of verifying …
Empirical review of smart contract and defi security: Vulnerability detection and automated repair
Decentralized Finance (DeFi) is emerging as a peer-to-peer financial ecosystem, enabling
participants to trade products on a permissionless blockchain. Built on blockchain and smart …
participants to trade products on a permissionless blockchain. Built on blockchain and smart …
Smart contracts refinement for gas optimization
Smart contracts facilitate the execution of programmable code on a blockchain. The cost for
executing smart contract code is metered using gas-the exact amount of which is based on …
executing smart contract code is metered using gas-the exact amount of which is based on …
Smart money wasting: Analyzing gas cost drivers of ethereum smart contracts
Users must pay a fee depending on resource consumption when using smart contracts on
the Ethereum blockchain. As even the most basic operations cost several dollars under …
the Ethereum blockchain. As even the most basic operations cost several dollars under …
[PDF][PDF] Systematic review of ethereum smart contract security vulnerabilities, analysis methods and tools
H Rameder - PhD thesis, 2021 - academia.edu
Smart contracts deployed to the Ethereum blockchain hold billions of dollars worth of assets.
Ethereum currently represents the most widely used smart contract platform. It is the second …
Ethereum currently represents the most widely used smart contract platform. It is the second …
An Order Theory Framework of Recurrence Equations for Static Cost Analysis–Dynamic Inference of Non-Linear Inequality Invariants
Recurrence equations have played a central role in static cost analysis, where they can be
viewed as abstractions of programs and used to infer resource usage information without …
viewed as abstractions of programs and used to infer resource usage information without …
Incremental and modular context-sensitive analysis
Context-sensitive global analysis of large code bases can be expensive, which can make its
use impractical during software development. However, there are many situations in which …
use impractical during software development. However, there are many situations in which …
A lightweight approach to nontermination inference using Constrained Horn Clauses
Nontermination is an unwanted program property for some software systems, and a safety
property for other systems. In either case, automated discovery of preconditions for …
property for other systems. In either case, automated discovery of preconditions for …
Verifly: On-the-fly Assertion checking via incrementality
MA Sanchez-Ordaz, I Garcia-Contreras… - Theory and Practice of …, 2021 - cambridge.org
Assertion checking is an invaluable programmer's tool for finding many classes of errors or
verifying their absence in dynamic languages such as Prolog. For Prolog programmers, this …
verifying their absence in dynamic languages such as Prolog. For Prolog programmers, this …
Demystification and Near-perfect Estimation of Minimum Gas Limit and Gas Used for Ethereum Smart Contracts
The Ethereum blockchain has a\emph {gas system} that associates operations with a cost in
gas units. Two central concepts of this system are the\emph {gas limit} assigned by the …
gas units. Two central concepts of this system are the\emph {gas limit} assigned by the …