Maintenance-related concerns for post-deployed Ethereum smart contract development: issues, techniques, and future challenges

J Chen, X Xia, D Lo, J Grundy, X Yang - Empirical Software Engineering, 2021 - Springer
Software development is a very broad activity that captures the entire life cycle of a software,
which includes designing, programming, maintenance and so on. In this study, we focus on …

Sok: Decentralized finance (defi) attacks

L Zhou, X Xiong, J Ernstberger… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Within just four years, the blockchain-based Decentralized Finance (DeFi) ecosystem has
accumulated a peak total value locked (TVL) of more than 253 billion USD. This surge in …

Transaction-based classification and detection approach for Ethereum smart contract

T Hu, X Liu, T Chen, X Zhang, X Huang, W Niu… - Information Processing …, 2021 - Elsevier
Blockchain technology brings innovation to various industries. Ethereum is currently the
second blockchain platform by market capitalization, it's also the largest smart contract …

A survey of software clone detection from security perspective

H Zhang, K Sakurai - IEEE Access, 2021 - ieeexplore.ieee.org
For software engineering, if two code fragments are closely similar with minor modifications
or even identical due to a copy-paste behavior, that is called software/code clone. Code …

Tokens, types, and standards: identification and utilization in Ethereum

M Di Angelo, G Salzer - 2020 IEEE International Conference on …, 2020 - ieeexplore.ieee.org
Tokens are often referred to as the killer application of blockchains and cryptocurrencies.
Some even believe that basically everything can be tokenized, meaning that it can be …

{EOSAFE}: security analysis of {EOSIO} smart contracts

N He, R Zhang, H Wang, L Wu, X Luo, Y Guo… - 30th USENIX security …, 2021 - usenix.org
The EOSIO blockchain, one of the representative Delegated Proof-of-Stake (DPoS)
blockchain platforms, has grown rapidly recently. Meanwhile, a number of vulnerabilities …

Sadponzi: Detecting and characterizing ponzi schemes in ethereum smart contracts

W Chen, X Li, Y Sui, N He, H Wang, L Wu… - Proceedings of the ACM …, 2021 - dl.acm.org
Ponzi schemes are financial scams that lure users under the promise of high profits. With the
prosperity of Bitcoin and blockchain technologies, there has been growing anecdotal …

Al-SPSD: Anti-leakage smart Ponzi schemes detection in blockchain

S Fan, S Fu, H Xu, X Cheng - Information Processing & Management, 2021 - Elsevier
Blockchain provides a decentralized environment for applications and information systems
in various fields. It is an innovative revolution for the traditional Internet. However, without …

A multi-modal transformer-based code summarization approach for smart contracts

Z Yang, J Keung, X Yu, X Gu, Z Wei… - 2021 IEEE/ACM 29th …, 2021 - ieeexplore.ieee.org
Code comment has been an important part of computer programs, greatly facilitating the
understanding and maintenance of source code. However, high-quality code comments are …

An integrated architecture for maintaining security in cloud computing based on blockchain

R Awadallah, A Samsudin, JS Teh… - IEEE Access, 2021 - ieeexplore.ieee.org
Due to its wide accessibility, cloud services are susceptible to attacks. Data manipulation is
a serious threat to data integrity which can occur in cloud computing-a relatively new offering …