Author:
Daian Philip,Guth Dwight,Hathhorn Chris,Li Yilong,Pek Edgar,Saxena Manasvi,Şerbănuţă Traian Florin,Roşu Grigore
Publisher
Springer International Publishing
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Smart Contract Symbol Execution Vulnerability Detection Method Based on CFG Path Pruning;Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure;2023-07-10
2. Using Runtime Information of Controllers for Safe Adaptation at Runtime: A Process Mining Approach;Computer Safety, Reliability, and Security. SAFECOMP 2023 Workshops;2023
3. VrFy: Verification of Formal Requirements using Generic Traces;2021 IEEE 21st International Conference on Software Quality, Reliability and Security Companion (QRS-C);2021-12
4. KEVM: A Complete Formal Semantics of the Ethereum Virtual Machine;2018 IEEE 31st Computer Security Foundations Symposium (CSF);2018-07
5. Run-Time Analysis of Temporal Constrained Objects;Declarative Programming and Knowledge Management;2018