Evolution of automated weakness detection in Ethereum bytecode: a comprehensive study

Article Properties
Abstract
Cite
di Angelo, Monika, et al. “Evolution of Automated Weakness Detection in Ethereum Bytecode: A Comprehensive Study”. Empirical Software Engineering, vol. 29, no. 2, 2024, https://doi.org/10.1007/s10664-023-10414-8.
di Angelo, M., Durieux, T., Ferreira, J., & Salzer, G. (2024). Evolution of automated weakness detection in Ethereum bytecode: a comprehensive study. Empirical Software Engineering, 29(2). https://doi.org/10.1007/s10664-023-10414-8
di Angelo M, Durieux T, Ferreira J, Salzer G. Evolution of automated weakness detection in Ethereum bytecode: a comprehensive study. Empirical Software Engineering. 2024;29(2).
Journal Categories
Science
Mathematics
Instruments and machines
Electronic computers
Computer science
Science
Mathematics
Instruments and machines
Electronic computers
Computer science
Computer software
Technology
Electrical engineering
Electronics
Nuclear engineering
Electronics
Computer engineering
Computer hardware
Refrences
Title Journal Journal Categories Citations Publication Date
A Survey of Smart Contract Formal Specification and Verification

ACM Computing Surveys
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science: Computer software
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics: Computer engineering. Computer hardware
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
44 2022
A Survey on Ethereum Systems Security

ACM Computing Surveys
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science: Computer software
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics: Computer engineering. Computer hardware
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
119 2020
An Analysis of Smart Contracts Security Threats Alongside Existing Solutions

Entropy
  • Science: Astronomy: Astrophysics
  • Science: Physics
  • Science: Physics
  • Science: Physics
16 2020
10.1109/ACCESS.2021.3140091 IEEE Access
  • Technology: Electrical engineering. Electronics. Nuclear engineering
  • Science: Science (General): Cybernetics: Information theory
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electric apparatus and materials. Electric circuits. Electric networks
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Telecommunication
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics
2022
Ethereum smart contract security research: survey and future research opportunities Frontiers of Computer Science
  • Science: Science (General): Cybernetics: Information theory
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science: Computer software
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science: Computer software
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics: Computer engineering. Computer hardware
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
57 2021