Maintenance-related concerns for post-deployed Ethereum smart contract development: issues, techniques, and future challenges
Software development is a very broad activity that captures the entire life cycle of a software,
which includes designing, programming, maintenance and so on. In this study, we focus on …
which includes designing, programming, maintenance and so on. In this study, we focus on …
Sok: Decentralized finance (defi) attacks
Within just four years, the blockchain-based Decentralized Finance (DeFi) ecosystem has
accumulated a peak total value locked (TVL) of more than 253 billion USD. This surge in …
accumulated a peak total value locked (TVL) of more than 253 billion USD. This surge in …
Transaction-based classification and detection approach for Ethereum smart contract
Blockchain technology brings innovation to various industries. Ethereum is currently the
second blockchain platform by market capitalization, it's also the largest smart contract …
second blockchain platform by market capitalization, it's also the largest smart contract …
A survey of software clone detection from security perspective
H Zhang, K Sakurai - IEEE Access, 2021 - ieeexplore.ieee.org
For software engineering, if two code fragments are closely similar with minor modifications
or even identical due to a copy-paste behavior, that is called software/code clone. Code …
or even identical due to a copy-paste behavior, that is called software/code clone. Code …
Tokens, types, and standards: identification and utilization in Ethereum
M Di Angelo, G Salzer - 2020 IEEE International Conference on …, 2020 - ieeexplore.ieee.org
Tokens are often referred to as the killer application of blockchains and cryptocurrencies.
Some even believe that basically everything can be tokenized, meaning that it can be …
Some even believe that basically everything can be tokenized, meaning that it can be …
{EOSAFE}: security analysis of {EOSIO} smart contracts
The EOSIO blockchain, one of the representative Delegated Proof-of-Stake (DPoS)
blockchain platforms, has grown rapidly recently. Meanwhile, a number of vulnerabilities …
blockchain platforms, has grown rapidly recently. Meanwhile, a number of vulnerabilities …
Sadponzi: Detecting and characterizing ponzi schemes in ethereum smart contracts
Ponzi schemes are financial scams that lure users under the promise of high profits. With the
prosperity of Bitcoin and blockchain technologies, there has been growing anecdotal …
prosperity of Bitcoin and blockchain technologies, there has been growing anecdotal …
Al-SPSD: Anti-leakage smart Ponzi schemes detection in blockchain
S Fan, S Fu, H Xu, X Cheng - Information Processing & Management, 2021 - Elsevier
Blockchain provides a decentralized environment for applications and information systems
in various fields. It is an innovative revolution for the traditional Internet. However, without …
in various fields. It is an innovative revolution for the traditional Internet. However, without …
A multi-modal transformer-based code summarization approach for smart contracts
Code comment has been an important part of computer programs, greatly facilitating the
understanding and maintenance of source code. However, high-quality code comments are …
understanding and maintenance of source code. However, high-quality code comments are …
An integrated architecture for maintaining security in cloud computing based on blockchain
Due to its wide accessibility, cloud services are susceptible to attacks. Data manipulation is
a serious threat to data integrity which can occur in cloud computing-a relatively new offering …
a serious threat to data integrity which can occur in cloud computing-a relatively new offering …