Verification of smart contracts: A survey
M Almakhour, L Sliman, AE Samhat… - Pervasive and Mobile …, 2020 - Elsevier
To achieve trust and continuity in the smart contracts-based business process execution, the
verification of such smart contracts is mandatory. A blockchain-based smart contract should …
verification of such smart contracts is mandatory. A blockchain-based smart contract should …
Osiris: Hunting for integer bugs in ethereum smart contracts
The capability of executing so-called smart contracts in a decentralised manner is one of the
compelling features of modern blockchains. Smart contracts are fully fledged programs …
compelling features of modern blockchains. Smart contracts are fully fledged programs …
Llm-powered static binary taint analysis
This paper proposes LATTE, the first static binary taint analysis that is powered by a large
language model (LLM). LATTE is superior to the state of the art (eg, Emtaint, Arbiter …
language model (LLM). LATTE is superior to the state of the art (eg, Emtaint, Arbiter …
The vulnerabilities in smart contracts: A survey
Blockchain has attracted widespread attention since its inception and one of the special
technologies is smart contracts. Smart contracts are programs on blockchain that act as …
technologies is smart contracts. Smart contracts are programs on blockchain that act as …
IntRepair: Informed Repairing of Integer Overflows
Integer overflows have threatened software applications for decades. Thus, in this paper, we
propose a novel technique to provide automatic repairs of integer overflows in C source …
propose a novel technique to provide automatic repairs of integer overflows in C source …
AbsIntIO: Towards Showing the Absence of Integer Overflows in Binaries using Abstract Interpretation
A Küchler, L Wenning, F Wendland - Proceedings of the 2023 ACM Asia …, 2023 - dl.acm.org
In the past years, the CWE-190 integer overflow led to many vulnerabilities. Program
verification techniques such as Abstract Interpretation can show that no such bug is present …
verification techniques such as Abstract Interpretation can show that no such bug is present …
Improving accuracy of static integer overflow detection in binary
Y Zhang, X Sun, Y Deng, L Cheng, S Zeng, Y Fu… - Research in Attacks …, 2015 - Springer
Integer overflow presents a major source of security threats to information systems.
However, current solutions are less effective in detecting integer overflow vulnerabilities …
However, current solutions are less effective in detecting integer overflow vulnerabilities …
IntEQ: Recognizing benign integer overflows via equivalence checking across multiple precisions
H Sun, X Zhang, Y Zheng, Q Zeng - Proceedings of the 38th International …, 2016 - dl.acm.org
Integer overflow (IO) vulnerabilities can be exploited by attackers to compromise computer
systems. In the mean time, IOs can be used intentionally by programmers for benign …
systems. In the mean time, IOs can be used intentionally by programmers for benign …
Twice the bits, twice the trouble: Vulnerabilities induced by migrating to 64-bit platforms
Subtle flaws in integer computations are a prime source for exploitable vulnerabilities in
system code. Unfortunately, even code shown to be secure on one platform can be …
system code. Unfortunately, even code shown to be secure on one platform can be …
Integrity: Finding Integer Errors by Targeted Fuzzing
Integer arithmetic errors are a major source of software vulnerabilities. Since they rarely
cause crashes, they are unlikely found by fuzzers without special techniques to trigger them …
cause crashes, they are unlikely found by fuzzers without special techniques to trigger them …