You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

1234567891011121314151617181920212223242526272829303132333435363738394041
  1. \begin{thebibliography}{1}
  2. \bibitem{smartian}
  3. Jaeseung Choi, Doyeon Kim, Soomin Kim, Gustavo Grieco, Alex Groce, and Sang~Kil
  4. Cha.
  5. \newblock Smartian: Enhancing smart contract fuzzing with static and dynamic
  6. data-flow analyses.
  7. \newblock In {\em 2021 36th IEEE/ACM International Conference on Automated
  8. Software Engineering (ASE)}, pages 227--239, 2021.
  9. \bibitem{doughoyte}
  10. doughoyte.
  11. \newblock Merdetoken: It's some hot shit.
  12. \newblock
  13. \url{https://github.com/Arachnid/uscc/tree/master/submissions-2017/doughoyte}
  14. [Accessed: Oct. 27th 2023].
  15. \bibitem{teether}
  16. Johannes Krupp and Christian Rossow.
  17. \newblock {teEther}: Gnawing at ethereum to automatically exploit smart
  18. contracts.
  19. \newblock In {\em 27th USENIX Security Symposium (USENIX Security 18)}, pages
  20. 1317--1333, Baltimore, MD, August 2018. USENIX Association.
  21. \bibitem{fuzzdrivegen}
  22. Siddhasagar Pani, Harshita~Vani Nallagonda, Vigneswaran, Raveendra~Kumar
  23. Medicherla, and Rajan M.
  24. \newblock Smartfuzzdrivergen: Smart contract fuzzing automation for golang.
  25. \newblock In {\em Proceedings of the 16th Innovations in Software Engineering
  26. Conference}, ISEC '23, New York, NY, USA, 2023. Association for Computing
  27. Machinery.
  28. \bibitem{securify}
  29. Petar Tsankov, Andrei Dan, Dana Drachsler-Cohen, Arthur Gervais, Florian
  30. B\"{u}nzli, and Martin Vechev.
  31. \newblock Securify: Practical security analysis of smart contracts.
  32. \newblock In {\em Proceedings of the 2018 ACM SIGSAC Conference on Computer and
  33. Communications Security}, CCS '18, page 67–82, New York, NY, USA, 2018.
  34. Association for Computing Machinery.
  35. \end{thebibliography}