{EOSAFE}: Security analysis of {EOSIO} smart contracts N He, R Zhang, H Wang, L Wu, X Luo, Y Guo, T Yu, X Jiang 30th USENIX Security Symposium (USENIX Security 21), 1271-1288, 2021 | 93* | 2021 |
Characterizing code clones in the Ethereum smart contract ecosystem N He, L Wu, H Wang, Y Guo, X Jiang The 24th International Conference on Financial Cryptography and Data …, 2020 | 88 | 2020 |
Sadponzi: Detecting and characterizing ponzi schemes in ethereum smart contracts W Chen, X Li, Y Sui, N He, H Wang, L Wu, X Luo Proceedings of the ACM on Measurement and Analysis of Computing Systems 5 (2 …, 2021 | 59 | 2021 |
DEPOSafe: Demystifying the Fake Deposit Vulnerability in Ethereum Smart Contracts R Ji, N He, L Wu, H Wang, G Bai, Y Guo The 25th International Conference on Engineering of Complex Computer Systems …, 2020 | 16 | 2020 |
A survey on eosio systems security: Vulnerability, attack, and mitigation N He, H Wang, L Wu, X Luo, Y Guo, X Chen arXiv preprint arXiv:2207.09227, 2022 | 8 | 2022 |
IMFL-AIGC: Incentive Mechanism Design for Federated Learning Empowered by Artificial Intelligence Generated Content G Huang, Q Wu, J Li, X Chen IEEE Transactions on Mobile Computing, 2024 | 7 | 2024 |
Understanding the evolution of blockchain ecosystems: a longitudinal measurement study of bitcoin, ethereum, and eosio N He, W Su, Z Yu, X Liu, F Zhao, H Wang, X Luo, G Tyson, L Wu, Y Guo arXiv preprint arXiv:2110.07534, 2021 | 6 | 2021 |
Eunomia: Enabling User-specified Fine-Grained Search in Symbolically Executing WebAssembly Binaries N He, Z Zhao, J Wang, Y Hu, S Guo, H Wang, G Liang, D Li, X Chen, ... The ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), 2023 | 4 | 2023 |
Miracle or Mirage? A Measurement Study of NFT Rug Pulls J Huang, N He, K Ma, J Xiao, H Wang Proceedings of the ACM on Measurement and Analysis of Computing Systems 7 (3 …, 2023 | 3 | 2023 |
Abusing the Ethereum Smart Contract Verification Services for Fun and Profit P Ma, N He, Y Huang, H Wang, X Luo arXiv preprint arXiv:2307.00549, 2023 | 3 | 2023 |
Symgx: Detecting cross-boundary pointer vulnerabilities of sgx applications via static symbolic execution Y Wang, Z Zhang, N He, Z Zhong, S Guo, Q Bao, D Li, Y Guo, X Chen Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 2 | 2023 |
Put Your Memory in Order: Efficient Domain-based Memory Isolation for WASM Applications H Lei, Z Zhang, S Zhang, P Jiang, Z Zhong, N He, D Li, Y Guo, X Chen Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 2 | 2023 |
BREWasm: A General Static Binary Rewriting Framework for WebAssembly S Cao, N He, Y Guo, H Wang International Static Analysis Symposium, 139-163, 2023 | 2 | 2023 |
WRTester: Differential Testing of WebAssembly Runtimes via Semantic-aware Binary Generation S Cao, N He, X She, Y Zhang, M Zhang, H Wang arXiv preprint arXiv:2312.10456, 2023 | 1 | 2023 |
WASMixer: Binary Obfuscation for WebAssembly S Cao, N He, Y Guo, H Wang arXiv preprint arXiv:2308.03123, 2023 | 1 | 2023 |
All Your Tokens are Belong to Us: Demystifying Address Verification Vulnerabilities in Solidity Smart Contracts T Sun, N He, J Xiao, Y Yue, X Luo, H Wang arXiv preprint arXiv:2405.20561, 2024 | | 2024 |
Remeasuring the Arbitrage and Sandwich Attacks of Maximal Extractable Value in Ethereum T Chi, N He, X Hu, H Wang arXiv preprint arXiv:2405.17944, 2024 | | 2024 |
WalletRadar: towards automating the detection of vulnerabilities in browser-based cryptocurrency wallets P Xia, Y Guo, Z Lin, J Wu, P Duan, N He, K Wang, T Liu, Y Yue, G Xu, ... Automated Software Engineering 31 (1), 32, 2024 | | 2024 |
SoK: On the Security of Non-Fungible Tokens K Ma, J Huang, N He, Z Wang, H Wang arXiv preprint arXiv:2312.08000, 2023 | | 2023 |
Fuzzing the Latest NTFS in Linux with Papora: An Empirical Study E Lo, N He, Y Shi, J Xu, C Wu, D Li, Y Guo 17th IEEE Workshop on Offensive Technologies, 2023 | | 2023 |