| [1] |
BitShares. Delegated proof-of-stake consensus[EB/OL]. [2024-06-07]. .
|
| [2] |
QUANTUM M. The proposal of PoS[EB/OL]. [2024-07-10]..
|
| [3] |
BUTERIN V. A next-generation smart contract and decentralized application platform[EB/OL]. [2024-10-01]..
|
| [4] |
DE CANDIA A. Increase of EOSIO transaction volumes[EB/OL]. [2024-09-03]..
|
| [5] |
MOZILLA. Basic concepts for WASM[EB/OL]. [2024-07-01]..
|
| [6] |
NONEAGE. Random number generation vulnerability[EB/OL]. [2024-10-12]. .
|
| [7] |
Fake EOS transfer vulnerabilities in EOS smart contracts[EB/OL]. [2024-11-02]. .
|
| [8] |
Forged transfer notification in EOS smart contracts[EB/OL]. [2024-11-05]..
|
| [9] |
HE N, ZHANG R, WANG H, et al. EOSAFE: security analysis of EOSIO smart contracts[C]// Proceedings of the 30th USENIX Security Symposium. Berkeley: USENIX Association, 2021: 1271-1288.
|
| [10] |
QUAN L, WU L, WANG H. EVulHunter: detecting fake transfer vulnerabilities for EOSIO's smart contracts at WebAssembly level[EB/OL]. [2024-10-26]..
|
| [11] |
LI W, WANG M, YU B, et al. Grey-box fuzzing based on execution feedback for EOSIO smart contracts[C]// Proceedings of the 29th Asia-Pacific Software Engineering Conference. Piscataway: IEEE, 2022: 1-10.
|
| [12] |
HUANG Y, JIANG B, CHAN W K. EOSFuzzer: fuzzing EOSIO smart contracts for vulnerability detection[C]// Proceedings of the 12th Asia-Pacific Symposium on Internetware. New York: ACM, 2020: 99-109.
|
| [13] |
JIN L, CAO Y, CHEN Y, et al. ExGen: cross-platform, automated exploit generation for smart contract vulnerabilities[J]. IEEE Transactions on Dependable and Secure Computing, 2020: 650-664.
|
| [14] |
ZHUANG Y, LIU Z, QIAN P, et al. Smart contract vulnerability detection using graph neural networks[C]// Proceedings of the 29th International Joint Conference on Artificial Intelligence. California: ijcai.org, 2020: 3283-3290.
|
| [15] |
KRUPP J, ROSSOW C. teEther: gnawing at Ethereum to automatically exploit smart contracts[C]// Proceedings of the 27th USENIX Security Symposium. Berkeley: USENIX Association, 2018: 1317-1333.
|
| [16] |
CHEN J, XIA X, LO D, et al. DefectChecker: automated smart contract defect detection by analyzing EVM bytecode[J]. IEEE Transactions on Software Engineering, 2022, 48(7): 2189-2207.
|
| [17] |
JIANG B, LIU Y, CHAN W K. ContractFuzzer: fuzzing smart contracts for vulnerability detection[C]// Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering. New York: ACM, 2018: 259-269.
|
| [18] |
CHOI J, KIM D, KIM S, et al. SMARTIAN: enhancing smart contract fuzzing with static and dynamic data-flow analyses[C]// Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering. Piscataway: IEEE, 2021: 227-239.
|
| [19] |
TANN W J W, HAN X J, GUPTA S S, et al. Towards safer smart contracts: a sequence learning approach to detecting security threats[EB/OL]. [2024-11-05]..
|
| [20] |
ZHANG L, CHEN W, WANG W, et al. CBGRU: a detection method of smart contract vulnerability based on a hybrid model[J]. Sensors, 2022, 22(9): No.3577.
|
| [21] |
LI Z, LU S, ZHANG R, et al. VulHunter: hunting vulnerable smart contracts at EVM bytecode-level via multiple instance learning[J]. IEEE Transactions on Software Engineering, 2023, 49(11): 4886-4916.
|
| [22] |
LI Z, ZOU D, XU S, et al. SySeVR: a framework for using deep learning to detect software vulnerabilities[J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(4): 2244-2258.
|
| [23] |
LI Z, ZOU D, XU S, et al. VulDeePecker: a deep learning-based system for vulnerability detection[EB/OL]. [2024-11-05]..
|
| [24] |
钱鹏,刘振广,何钦铭,等.智能合约安全漏洞检测技术研究综述[J].软件学报,2022,33(8):3059-3085.
|
|
QIAN P, LIU Z G, HE Q M, et al. Smart contract vulnerability detection technique: a survey[J]. Journal of Software, 2022, 33(8): 3059-3085.
|
| [25] |
REN S, HE K, GIRSHICK R, et al. Faster R-CNN: towards real-time object detection with region proposal networks[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2017, 39(6): 1137-1149.
|
| [26] |
SHRIVASTAVA A, GUPTA A, GIRSHICK R, et al. Training region-based object detectors with online hard example mining[C]// Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition. Piscataway: IEEE, 2016: 761-769.
|
| [27] |
HOCHREITER S, SCHMIDHUBER J. Long short-term memory[J]. Neural Computation, 1997, 9(8): 1735-1780.
|
| [28] |
CHO K, VAN MERRIËNBOER B, BAHDANAU D, et al. On the properties of neural machine translation: encoder-decoder approaches[C]// Proceedings of the 8th Workshop on Syntax, Semantics and Structure in Statistical Translation. Stroudsburg: ACL, 2014: 103-111.
|
| [29] |
GRAVES A, SCHMIDHUBER J. Framewise phoneme classification with bidirectional LSTM and other neural network architectures[J]. Neural Networks, 2005, 18(5/6): 602-610.
|