[HTML][HTML] Flash controller-based secure execution environment for protecting code confidentiality

Z Zhang, J Xue, T Chen, Y Zhao, W Meng - Journal of Systems Architecture, 2024 - Elsevier
With the rapid evolution of Internet-of-Things (IoT), billions of IoT devices have connected to
the Internet, collecting information via tags and sensors. For an IoT device, the application …

Detecting unknown vulnerabilities in smart contracts using opcode sequences

P Li, G Wang, X Xing, X Li, J Zhu - Connection Science, 2024 - Taylor & Francis
Unknown vulnerabilities, also known as zero-day vulnerabilities, are vulnerabilities in
software, systems, or networks that have not yet been publicly disclosed or fixed. If these …

Bi-thresholds-based unknown vulnerability detection in smart contracts using multi-classification model

P Li, G Wang, G Zhai, W Gu, X Li, X Liu… - Computers and Electrical …, 2024 - Elsevier
Ethereum's development has established a trusted environment for executing smart
contracts. However, smart contracts often involve significant financial transfers and become …

Detecting unknown vulnerabilities in smart contracts with binary classification model using machine learning

X Li, X Xing, G Wang, P Li, X Liu - International Conference on Ubiquitous …, 2022 - Springer
The emergence of smart contracts has led to the wider use of blockchain, which involves a
large number of virtual currency transactions. Because smart contracts are inevitably written …

FedTA: Locally-Differential Federated Learning with Top-k Mechanism and Adam Optimization

Y Li, G Wang, T Peng, G Feng - International Conference on Ubiquitous …, 2022 - Springer
With the explosive development of fields including big data and cloud computing, it has
become a global trend for the public to place a premium on data security and privacy. A …

A survey on the evolution of bootkits attack and defense techniques

Y Zhou, G Peng, Z Li, S Liu - China Communications, 2024 - ieeexplore.ieee.org
According to the boot process of modern computer systems, whoever boots first will gain
control first. Taking advantage of this feature, a malicious code called bootkit can hijack the …

Detecting unknown vulnerabilities in smart contracts with multi-label classification model using CNN-BiLSTM

W Gu, G Wang, P Li, X Li, G Zhai, X Li… - … Conference on Ubiquitous …, 2022 - Springer
Smart contracts are frequently targeted by hackers because they hold large amounts of
money and cannot be modified once they are published. Existing detection methods mainly …

Towards isolated execution at the machine level

S Anzai, M Misono, R Nakamura, Y Kuga… - Proceedings of the 13th …, 2022 - dl.acm.org
Isolated execution with CPU-level protection, such as process sandboxes, virtual machines,
and trusted execution environments, has long been studied to mitigate software …

Research on Dynamic Detection of Vulnerabilities in Smart Contracts Based on Machine Learning

Y Boxin - 2024 IEEE 3rd International Conference on Electrical …, 2024 - ieeexplore.ieee.org
The proliferation of smart contracts has led to a surge in hacking attacks, resulting in
substantial financial losses and undermining the healthy growth of the blockchain …

FMC-CEE: A Collaborative Execution Environment with Flash Memory Controllers in IoT

Z Zhang, J Xue, T Baker, T Chen… - … Workshops and other …, 2024 - ieeexplore.ieee.org
Applications running on an Internet of Things (IoT) device are usually deployed in an
untrusted environment. This introduces risks of vulnerability to malware, and loss of …