Results 121 to 130 of about 18,338 (256)

STAN: Towards Describing Bytecodes of Smart Contract [PDF]

open access: green, 2020
Xiaoqi Li   +5 more
openalex   +1 more source

Smart contract vulnerability detection method based on pre-training and novel timing graph neural network

open access: yesTongxin xuebao
To address the limitations of current deep learning-based methods in extracting contract bytecode features and representing vulnerability semantics, as well as the shortcomings of the traditional graph neural networks in learning temporal information ...
ZHUANG Yuan   +4 more
doaj   +2 more sources

Evaluation of 6LoWPAN Generic Header Compression in the Context of a RPL Network. [PDF]

open access: yesSensors (Basel), 2023
Vandervelden T   +5 more
europepmc   +1 more source

Non-termination of Dalvik bytecode via compilation to CLP

open access: yes, 2014
We present a set of rules for compiling a Dalvik bytecode program into a logic program with array constraints. Non-termination of the resulting program entails that of the original one, hence the techniques we have presented before for proving non ...
Mesnard, Fred, Payet, Etienne
core  

Verification System of Removable Key Carriers Software

open access: yesБезопасность информационных технологий, 2013
Removable key carriers are most widespread devices for cryptographic key systems. The most popular platform for them is JavaCard. However, an on-card bytecode verifier is only optional on JavaCard smartcards, and indeed most cards do not include it. That’
Sergey Sergeevich Agafyin   +1 more
doaj  

Smart contracts software metrics: A first study. [PDF]

open access: yesPLoS One, 2023
Tonelli R   +3 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy