Skip to content

Latest commit

 

History

History
140 lines (140 loc) · 13.2 KB

readme.md

File metadata and controls

140 lines (140 loc) · 13.2 KB

Paper List

Usenix Security

2022

2021

2020

IEEE S&P

2022

  • SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds
  • [Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents]
  • [Four Attacks and a Proof for Telegram]
  • [A Formal Security Analysis of the W3C Web Payment APIs: Attacks and Verification]
  • [Cats vs. Spectre: An Axiomatic Approach to Modeling Speculative Execution Attacks]
  • [TASHAROK: Using Mechanism Design for Enhancing Security Resource Allocation in Interdependent Systems]
  • [Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities]

2021

  • [SmartPulse: Automated Checking of Temporal Properties in Smart Contracts]
  • [An Interactive Prover for Protocol Verification in the Computational Model]
  • [An I/O Separation Model for Formal Verification of Kernel Implementations]
  • [Symbolic Modeling of Micro Services for Intrusion Detection]
  • [A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer]
  • [Bookworm Game: Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis]
  • [SGUARD: Towards Fixing Vulnerable Smart Contracts Automatically]
  • [Compositional Security for Reentrant Applications]

2020

  • [Binsec/Rel: Efficient Relational Symbolic Execution for Constant-Time at Binary-Level]
  • [VerX: Safety Verification of Smart Contracts]
  • [VeriSmart: A Highly Precise Safety Verifier for Ethereum Smart Contracts]
  • [Semantic Understanding of Smart Contracts: Executable Operational Semantics of Solidity]

NDSS

2021

2020

CCS

2022

  • [Cerberus: A Formal Approach to Secure and Efficient Enclave Memory Sharing]
  • [Zapper: Smart Contracts with Data and Identity Privacy]
  • [VRust: Automated Vulnerability Detection for Solana Smart Contracts]
  • [Understanding Security Issues in the NFT Ecosystem]
  • [Towards Automated Safety Vetting of Smart Contracts in Decentralized Applications]
  • [Towards Automated Safety Vetting of Smart Contracts in Decentralized Applications]

2020

  • [ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts]
  • [eThor: Practical and Provably Sound Static Analysis of Ethereum Smart Contracts]
  • [WI is Almost Enough: Contingent Payment All Over Again]
  • [BlackMirror: Preventing Wallhacks in 3D Online FPS Games]
  • [Forensic Analysis in Access Control: Foundations and a Case-Study from Practice]

Binary Similarity

Vulnerabilities Detection

Fuzz

Smart Contracts

Natural Language Processing

Operating System Security