|
[1] Zibin Zheng et al. “Blockchain challenges and opportunities: A survey”. In: International journal of web and grid services 14.4 (2018), pp. 352–375. [2] Sam M Werner et al. “Sok: Decentralized finance (defi)”. In: arXiv preprint arXiv:2101.08778 (2021). [3] Sara Saberi et al. “Blockchain technology and its relationships to sustainable supply chain management”. In: International Journal of Production Research 57.7 (2019), pp. 2117– 2135. [4] Vitalik Buterin et al. “A next-generation smart contract and decentralized application platform”. In: white paper 3.37 (2014), pp. 2–1. [5] Nicola Atzei, Massimo Bartoletti, and Tiziana Cimoli. “A survey of attacks on ethereum smart contracts (sok)”. In: International conference on principles of security and trust. Springer. 2017, pp. 164–186. [6] Hack track: Analysis of C.R.E.A.M. finance hack. https://blog.merklescience. com/hacktrack/hack- track- analysis- of- cream- finance- hack. Accessed: 2022-12-15. [7] Peng Qian et al. “Smart Contract Vulnerability Detection Technique: A Survey”. In: arXiv preprint arXiv:2209.05872 (2022). [8] Loi Luu et al. “Making smart contracts smarter”. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security. 2016, pp. 254–269. [9] Bernhard Mueller. Introducing Mythril: A framework for bug hunting on the Ethereum blockchain. https://medium.com/hackernoon/introducing-mythril-a-frameworkfor-bug-hunting-on-the-ethereum-blockchain-9dc5588f82f6. 2017. [10] Ilya Grishchenko, Matteo Maffei, and Clara Schneidewind. “A semantic framework for the security analysis of ethereum smart contracts”. In: International Conference on Principles of Security and Trust. Springer. 2018, pp. 243–269. 24 [11] Sukrit Kalra et al. “Zeus: analyzing safety of smart contracts.” In: Ndss. 2018, pp. 1–12. [12] Josselin Feist, Gustavo Grieco, and Alex Groce. “Slither: a static analysis framework for smart contracts”. In: 2019 IEEE/ACM 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB). IEEE. 2019, pp. 8–15. [13] Bo Jiang, Ye Liu, and Wing Kwong Chan. “Contractfuzzer: Fuzzing smart contracts for vulnerability detection”. In: 2018 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE. 2018, pp. 259–269. [14] Yuan Zhuang et al. “Smart Contract Vulnerability Detection using Graph Neural Network.” In: IJCAI. 2020, pp. 3283–3290. [15] Thomas N Kipf and Max Welling. “Semi-supervised classification with graph convolutional networks”. In: arXiv preprint arXiv:1609.02907 (2016). [16] Lejun Zhang et al. “CBGRU: A Detection Method of Smart Contract Vulnerability Based on a Hybrid Model”. In: Sensors 22.9 (2022), p. 3577. [17] Peng Qian et al. “Towards automated reentrancy detection for smart contracts based on sequential models”. In: IEEE Access 8 (2020), pp. 19685–19695. [18] Quoc Le and Tomas Mikolov. “Distributed representations of sentences and documents”. In: International conference on machine learning. PMLR. 2014, pp. 1188–1196. [19] Tomas Mikolov et al. “Efficient estimation of word representations in vector space”. In: arXiv preprint arXiv:1301.3781 (2013). [20] Ashish Vaswani et al. “Attention is all you need”. In: Advances in neural information processing systems 30 (2017). [21] Jacob Devlin et al. “Bert: Pre-training of deep bidirectional transformers for language understanding”. In: arXiv preprint arXiv:1810.04805 (2018). [22] Sepp Hochreiter and Jürgen Schmidhuber. “Long short-term memory”. In: Neural computation 9.8 (1997), pp. 1735–1780. [23] Alec Radford et al. “Improving language understanding by generative pre-training”. In: (2018). [24] Tom Brown et al. “Language models are few-shot learners”. In: Advances in neural information processing systems 33 (2020), pp. 1877–1901. 25 [25] Piotr Bojanowski et al. “Enriching word vectors with subword information”. In: Transactions of the association for computational linguistics 5 (2017), pp. 135–146. [26] Yinhan Liu et al. “Roberta: A robustly optimized bert pretraining approach”. In: arXiv preprint arXiv:1907.11692 (2019). [27] Zhangyin Feng et al. “Codebert: A pre-trained model for programming and natural languages”. In: arXiv preprint arXiv:2002.08155 (2020). [28] Xiaoaochen. Xiaoaochen/CBGRU: ”CBGRU: A detection method of smart contract vulnerability based on hybrid model”. URL: https://github.com/xiaoaochen/CBGRU. [29] Jason Wei et al. “Chain of thought prompting elicits reasoning in large language models”. In: arXiv preprint arXiv:2201.11903 (2022). [30] Alec Radford et al. “Learning transferable visual models from natural language supervision”. In: International Conference on Machine Learning. PMLR. 2021, pp. 8748–8763.
|