[PDF][PDF] GPTScan: Detecting Logic Vulnerabilities in Smart Contracts by Combining GPT with Program Analysis

Y Sun, D Wu, Y Xue, H Liu, H Wang, Z Xu… - arXiv preprint arXiv …, 2023 - researchgate.net
Smart contracts are prone to various vulnerabilities, leading to substantial financial losses
over time. Current analysis tools mainly target vulnerabilities with fixed control-or data-flow …

Gptscan: Detecting logic vulnerabilities in smart contracts by combining gpt with program analysis

Y Sun, D Wu, Y Xue, H Liu, H Wang, Z Xu… - Proceedings of the …, 2024 - dl.acm.org
Smart contracts are prone to various vulnerabilities, leading to substantial financial losses
over time. Current analysis tools mainly target vulnerabilities with fixed control-or data-flow …

Web3: Exploring Decentralized Technologies and Applications for the Future of Empowerment and Ownership

Y Lai, J Yang, M Liu, Y Li, S Li - Blockchains, 2023 - mdpi.com
The emergence of the World Wide Web has revolutionized online communication, aiming to
achieve global information sharing and communication. However, the current Web 2.0 …

Achecker: Statically detecting smart contract access control vulnerabilities

A Ghaleb, J Rubin… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
As most smart contracts have a financial nature and handle valuable assets, smart contract
developers use access control to protect assets managed by smart contracts from being …

Confusum contractum: confused deputy vulnerabilities in ethereum smart contracts

F Gritti, N Ruaro, R McLaughlin, P Bose, D Das… - 32nd USENIX Security …, 2023 - usenix.org
Smart contracts are immutable programs executed in the context of a globally distributed
system known as a blockchain. They enable the decentralized implementation of many …

Analyzing the Threats to Blockchain-Based Self-Sovereign Identities by Conducting a Literature Survey

D Pöhn, M Grabatin, W Hommel - Applied Sciences, 2023 - mdpi.com
Self-sovereign identity (SSI) is a digital identity management model managed in a
decentralized manner. It allows identity owners to manage and store their digital identities in …

Dappscan: building large-scale datasets for smart contract weaknesses in dapp projects

Z Zheng, J Su, J Chen, D Lo, Z Zhong… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The Smart Contract Weakness Classification Registry (SWC Registry) is a widely recognized
list of smart contract weaknesses specific to the Ethereum platform. Despite the SWC …

Invcon: A dynamic invariant detector for ethereum smart contracts

Y Liu, Y Li - Proceedings of the 37th IEEE/ACM International …, 2022 - dl.acm.org
Smart contracts are self-executing computer programs deployed on blockchain to enable
trustworthy exchange of value without the need of a central authority. With the absence of …

Beyond “Protected” and “Private”: An Empirical Security Analysis of Custom Function Modifiers in Smart Contracts

Y Fang, D Wu, X Yi, S Wang, Y Chen, M Chen… - Proceedings of the …, 2023 - dl.acm.org
A smart contract is a piece of application-layer code running on blockchain ledgers and it
provides programmatic logic via transaction-based execution of pre-defined functions. Smart …

Demystifying invariant effectiveness for securing smart contracts

Z Chen, Y Liu, SM Beillahi, Y Li, F Long - Proceedings of the ACM on …, 2024 - dl.acm.org
Smart contract transactions associated with security attacks often exhibit distinct behavioral
patterns compared with historical benign transactions before the attacking events. While …