Verification of smart contracts: A survey

M Almakhour, L Sliman, AE Samhat… - Pervasive and Mobile …, 2020 - Elsevier
To achieve trust and continuity in the smart contracts-based business process execution, the
verification of such smart contracts is mandatory. A blockchain-based smart contract should …

Osiris: Hunting for integer bugs in ethereum smart contracts

CF Torres, J Schütte, R State - Proceedings of the 34th annual computer …, 2018 - dl.acm.org
The capability of executing so-called smart contracts in a decentralised manner is one of the
compelling features of modern blockchains. Smart contracts are fully fledged programs …

Llm-powered static binary taint analysis

P Liu, C Sun, Y Zheng, X Feng, C Qin, Y Wang… - ACM Transactions on …, 2025 - dl.acm.org
This paper proposes LATTE, the first static binary taint analysis that is powered by a large
language model (LLM). LATTE is superior to the state of the art (eg, Emtaint, Arbiter …

The vulnerabilities in smart contracts: A survey

X Tang, K Zhou, J Cheng, H Li, Y Yuan - … 2021, Dublin, Ireland, July 19-23 …, 2021 - Springer
Blockchain has attracted widespread attention since its inception and one of the special
technologies is smart contracts. Smart contracts are programs on blockchain that act as …

IntRepair: Informed Repairing of Integer Overflows

P Muntean, M Monperrus, H Sun… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Integer overflows have threatened software applications for decades. Thus, in this paper, we
propose a novel technique to provide automatic repairs of integer overflows in C source …

AbsIntIO: Towards Showing the Absence of Integer Overflows in Binaries using Abstract Interpretation

A Küchler, L Wenning, F Wendland - Proceedings of the 2023 ACM Asia …, 2023 - dl.acm.org
In the past years, the CWE-190 integer overflow led to many vulnerabilities. Program
verification techniques such as Abstract Interpretation can show that no such bug is present …

Improving accuracy of static integer overflow detection in binary

Y Zhang, X Sun, Y Deng, L Cheng, S Zeng, Y Fu… - Research in Attacks …, 2015 - Springer
Integer overflow presents a major source of security threats to information systems.
However, current solutions are less effective in detecting integer overflow vulnerabilities …

IntEQ: Recognizing benign integer overflows via equivalence checking across multiple precisions

H Sun, X Zhang, Y Zheng, Q Zeng - Proceedings of the 38th International …, 2016 - dl.acm.org
Integer overflow (IO) vulnerabilities can be exploited by attackers to compromise computer
systems. In the mean time, IOs can be used intentionally by programmers for benign …

Twice the bits, twice the trouble: Vulnerabilities induced by migrating to 64-bit platforms

C Wressnegger, F Yamaguchi, A Maier… - Proceedings of the 2016 …, 2016 - dl.acm.org
Subtle flaws in integer computations are a prime source for exploitable vulnerabilities in
system code. Unfortunately, even code shown to be secure on one platform can be …

Integrity: Finding Integer Errors by Targeted Fuzzing

Y Rong, P Chen, H Chen - … and Privacy in Communication Networks: 16th …, 2020 - Springer
Integer arithmetic errors are a major source of software vulnerabilities. Since they rarely
cause crashes, they are unlikely found by fuzzers without special techniques to trigger them …