peer reviewedSmart contracts are Turing-complete programs that are executed across a blockchain. Unlike traditional programs, once deployed, they cannot be modified. As smart contracts carry more value, they become more of an exciting target for attackers. Over the last years, they suffered from exploits costing millions of dollars due to simple programming mistakes. As a result, a variety of tools for detecting bugs have been proposed. Most of these tools rely on symbolic execution, which may yield false positives due to over-approximation. Recently, many fuzzers have been proposed to detect bugs in smart contracts. However, these tend to be more effective in finding shallow bugs and less effective in finding bugs that lie deep in the exec...
© 2021 by The USENIX Association. All rights reserved.Ethereum is the second-largest blockchain plat...
Recently, software testing has become a significant component of information security. The most reli...
Fuzzing is a simple yet effect approach to discover bugs by repeatedly testing the target system usi...
Smart contracts are Turing-complete programs that are executed across a blockchain. Unlike tradition...
With the boom of Initial Coin Offerings (ICO) in the financial markets, smart contracts have gained ...
Modern blockchains, such as Ethereum, gained tremendously in popularity over the past few years. Wha...
Smart contract transactions are increasingly interleaved by cross-contract calls. While many tools h...
Smart contracts are computer programs running on blockchain platforms to manage large sums of crypto...
Our computers, phones, and other smart devices are running a vast and ever increasing amount of soft...
The peculiar novelty of smart contracts is a computational model where irreversible transactions are...
Fuzz testing ("fuzzing") is a widely-used and effective dynamic technique to discover crashes and se...
Bugs enable security attacks on smart contracts—computer programs operating on the blockchain and ma...
peer reviewedThe capability of executing so-called smart contracts in a decentralised manner is one ...
The term “smart contracts” has become ubiquitous to describe an enormous number of programs uploaded...
Fuzzing, a technique for negative testing of programs using randomly mutated or gen?erated input dat...
© 2021 by The USENIX Association. All rights reserved.Ethereum is the second-largest blockchain plat...
Recently, software testing has become a significant component of information security. The most reli...
Fuzzing is a simple yet effect approach to discover bugs by repeatedly testing the target system usi...
Smart contracts are Turing-complete programs that are executed across a blockchain. Unlike tradition...
With the boom of Initial Coin Offerings (ICO) in the financial markets, smart contracts have gained ...
Modern blockchains, such as Ethereum, gained tremendously in popularity over the past few years. Wha...
Smart contract transactions are increasingly interleaved by cross-contract calls. While many tools h...
Smart contracts are computer programs running on blockchain platforms to manage large sums of crypto...
Our computers, phones, and other smart devices are running a vast and ever increasing amount of soft...
The peculiar novelty of smart contracts is a computational model where irreversible transactions are...
Fuzz testing ("fuzzing") is a widely-used and effective dynamic technique to discover crashes and se...
Bugs enable security attacks on smart contracts—computer programs operating on the blockchain and ma...
peer reviewedThe capability of executing so-called smart contracts in a decentralised manner is one ...
The term “smart contracts” has become ubiquitous to describe an enormous number of programs uploaded...
Fuzzing, a technique for negative testing of programs using randomly mutated or gen?erated input dat...
© 2021 by The USENIX Association. All rights reserved.Ethereum is the second-largest blockchain plat...
Recently, software testing has become a significant component of information security. The most reli...
Fuzzing is a simple yet effect approach to discover bugs by repeatedly testing the target system usi...