Author:
Fröwis Michael,Böhme Rainer
Publisher
Springer Nature Switzerland
Reference18 articles.
1. Lecture Notes in Computer Science;S Azouvi,2019
2. Baldoni, R., Coppa, E., D’elia, D.C., Demetrescu, C., Finocchi, I.: A survey of symbolic execution techniques. ACM Comput. Surv. 51(3), 1–39 (2018)
3. Bratspies, R.M.: Cryptocurrency and the myth of the trustless transaction. Mich. Telecommun. Technol. Law Rev. 25, 1 (2018)
4. Chen, T., et al.: Tokenscope: automatically detecting inconsistent behaviors of cryptocurrency tokens in Ethereum. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 1503–1520 (2019)
5. Chen, W., Zhang, T., Chen, Z., Zheng, Z., Lu, Y.: Traveling the token world: a graph analysis of ethereum ERC20 token ecosystem, pp. 1411–1421. Association for Computing Machinery, New York, NY, USA (2020)