[1] 王化群, 张帆, 李甜, 等. 智能合约中的安全与隐私保护技术[J]. 南京邮电大学学报(自然科学版),2019,39(4):63-71.(WANG H Q,ZHANG F,LI T,et al. Security and privacy protection technologies in smart contract[J]. Journal of Nanjing University of Posts and Telecommunications,2019,39(4):63-71.) [2] 付梦琳, 吴礼发, 洪征, 等. 智能合约安全漏洞挖掘技术研究[J]. 计算机应用,2019,39(7):1959-1966.(FU M L,WU L F, HONG Z,et al. Research on vulnerability mining technique for smart contracts[J]. Journal of Computer Applications,2019,39(7):1959-1966.) [3] GRISHCHENKO I,MAFFEI M,SCHNEIDEWIND C. A semantic framework for the security analysis of Ethereum smart contracts[C]//Proceedings of the 2018 International Conference on Principles of Security and Trust,LNCS 10804. Cham:Springer,2018:243-269. [4] GRISHCHENKO I, MAFFEI M, SCHNEIDEWIND C. Foundations and tools for the static analysis of Ethereum smart contracts[C]//Proceedings of the 2018 International Conference on Computer Aided Verification, LNCS 10981. Cham:Springer, 2018:51-78. [5] KALRA S,GOEL S,DHAWAN M,et al. ZEUS:analyzing safety of smart contracts[C]//Proceedings of the 2018 Annual Network and Distributed System Security Symposium. Reston,VA:Internet Society,2018:1-15. [6] TSANKOV P,DAN A,DRACHSLER-COHEN D,et al. Securify:practical security analysis of smart contracts[C]//Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM,2018:67-82. [7] TIKHOMIROV S,VOSKRESENSKAYA E,IVANITSKIY I,et al. SmartCheck:static analysis of Ethereum smart contracts[C]//Proceedings of the IEEE/ACM 1st International Workshop on Emerging Trends in Software Engineering for Blockchain. Piscataway:IEEE, 2018:9-16. [8] KRUPP J,ROSSOW C. teEther:gnawing at Ethereum to automatically exploit smart contracts[C]//Proceedings of the 27th USENIX Security Symposium. Berkeley,CA:USENIX Association,2018:1317-1333. [9] LUU L,CHU D H,OLICKEL H,et al. Making smart contracts smarter[C]//Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM,2016:254-269. [10] Trailofbits. Slither-a Solidity static analysis framework[EB/OL].[2019-08-15]. https://blog.trailofbits.com/2018/10/19/slither-a-solidity-static-analysis-framework/. [11] Trailofbits. Manticore[EB/OL].[2019-08-15]. https://github.com/trailofbits/manticore. [12] WRIGHT C,SERGUIEVA A. Sustainable blockchain-enabled services:smart contracts[C]//Proceedings of the 2017 IEEE International Conference on Big Data. Piscataway:IEEE,2017:4255-4264. [13] 范吉立, 李晓华, 聂铁铮, 等. 区块链系统中智能合约技术综述[J]. 计算机科学,2019,46(11):1-10.(FAN J L,LI X H,NIE T Z,et al. Survey on smart contract based on blockchain system[J]. Computer Science,2019,46(11):1-10.) [14] 邱欣欣, 马兆丰, 徐明昆. 以太坊智能合约安全漏洞分析及对策[J]. 信息安全与通信保密,2019(2):44-53.(QIU X X,MA Z F, XU M K. Ethereum smart contract security vulnerability scenario analysis[J]. Information Security and Communications Privacy,2019(2):44-53.) [15] 牛伟纳, 丁雪峰, 刘智, 等. 基于符号执行的二进制代码漏洞发现[J]. 计算机科学,2013,40(10):119-121,138.(NIU W N, DING X F,LIU Z,et al. Vulnerability finding using symbolic execution on binary programs[J]. Computer Science,2013,40(10):119-121,138.) [16] GODEFROID P,KLARLUND N,SEN K. DART:directed automated random testing[C]//Proceedings of the 2005 Conference on Programming Language Design and Implementation. New York:ACM,2005:213-223. [17] SEN K,MARINOV D,AGHA G. CUTE:a concolic unit testing engine for C[C]//Proceedings of the 10th European Software Engineering Conference held jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering. New York:ACM,2005:263-272. [18] SEC-BIT. Awesome-Buggy-Erc20-Tokens[EB/OL].[2019-08-15] https://github.com/sec-bit/awesome-buggy-erc20-tokens. |