[PDF][PDF] GPTScan: Detecting Logic Vulnerabilities in Smart Contracts by Combining GPT with Program Analysis
Smart contracts are prone to various vulnerabilities, leading to substantial financial losses
over time. Current analysis tools mainly target vulnerabilities with fixed control-or data-flow …
over time. Current analysis tools mainly target vulnerabilities with fixed control-or data-flow …
Gptscan: Detecting logic vulnerabilities in smart contracts by combining gpt with program analysis
Smart contracts are prone to various vulnerabilities, leading to substantial financial losses
over time. Current analysis tools mainly target vulnerabilities with fixed control-or data-flow …
over time. Current analysis tools mainly target vulnerabilities with fixed control-or data-flow …
Web3: Exploring Decentralized Technologies and Applications for the Future of Empowerment and Ownership
Y Lai, J Yang, M Liu, Y Li, S Li - Blockchains, 2023 - mdpi.com
The emergence of the World Wide Web has revolutionized online communication, aiming to
achieve global information sharing and communication. However, the current Web 2.0 …
achieve global information sharing and communication. However, the current Web 2.0 …
Achecker: Statically detecting smart contract access control vulnerabilities
As most smart contracts have a financial nature and handle valuable assets, smart contract
developers use access control to protect assets managed by smart contracts from being …
developers use access control to protect assets managed by smart contracts from being …
Confusum contractum: confused deputy vulnerabilities in ethereum smart contracts
Smart contracts are immutable programs executed in the context of a globally distributed
system known as a blockchain. They enable the decentralized implementation of many …
system known as a blockchain. They enable the decentralized implementation of many …
Analyzing the Threats to Blockchain-Based Self-Sovereign Identities by Conducting a Literature Survey
Self-sovereign identity (SSI) is a digital identity management model managed in a
decentralized manner. It allows identity owners to manage and store their digital identities in …
decentralized manner. It allows identity owners to manage and store their digital identities in …
Dappscan: building large-scale datasets for smart contract weaknesses in dapp projects
The Smart Contract Weakness Classification Registry (SWC Registry) is a widely recognized
list of smart contract weaknesses specific to the Ethereum platform. Despite the SWC …
list of smart contract weaknesses specific to the Ethereum platform. Despite the SWC …
Invcon: A dynamic invariant detector for ethereum smart contracts
Smart contracts are self-executing computer programs deployed on blockchain to enable
trustworthy exchange of value without the need of a central authority. With the absence of …
trustworthy exchange of value without the need of a central authority. With the absence of …
Beyond “Protected” and “Private”: An Empirical Security Analysis of Custom Function Modifiers in Smart Contracts
A smart contract is a piece of application-layer code running on blockchain ledgers and it
provides programmatic logic via transaction-based execution of pre-defined functions. Smart …
provides programmatic logic via transaction-based execution of pre-defined functions. Smart …
Demystifying invariant effectiveness for securing smart contracts
Smart contract transactions associated with security attacks often exhibit distinct behavioral
patterns compared with historical benign transactions before the attacking events. While …
patterns compared with historical benign transactions before the attacking events. While …