Results 81 to 90 of about 18,338 (256)
Mining Characteristics of Vulnerable Smart Contracts across Lifecycle Stages
This paper conducts the first empirical study on smart contract security across three lifecycle stages: deployment and execution, upgrade, and destruction. It identifies seven vulnerability‐related features and applies them to machine learning models, revealing stage‐specific vulnerability patterns and improving detection accuracy.
Hongli Peng, Wenkai Li, Xiaoqi Li
wiley +1 more source
Seeing Through EVM Bytecode Obfuscation
The Ethereum Virtual Machine (EVM) executes smart contracts using low-level, stack-based bytecode instructions. As these contracts grow in complexity and financial value, they increasingly attract adversaries who seek to evade detection by employing ...
Pasquale De Rosa +2 more
doaj +1 more source
SNITCH: Dynamic Dependent Information Flow Analysis for Independent Java Bytecode [PDF]
Software testing is the most commonly used technique in the industry to certify the correctness of software systems. This includes security properties like access control and data confidentiality.
Eduardo Geraldo, João Costa Seco
doaj +1 more source
Algorithm Diversity for Resilient Systems
Diversity can significantly increase the resilience of systems, by reducing the prevalence of shared vulnerabilities and making vulnerabilities harder to exploit.
A Avizienis +10 more
core +1 more source
Sound and Precise Malware Analysis for Android via Pushdown Reachability and Entry-Point Saturation [PDF]
We present Anadroid, a static malware analysis framework for Android apps. Anadroid exploits two techniques to soundly raise precision: (1) it uses a pushdown system to precisely model dynamically dispatched interprocedural and exception-driven control ...
Aldous, Petey +6 more
core +2 more sources
Abstract As organizations increasingly rely on network services, the prevalence and severity of Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks have emerged as significant threats. The cornerstone of effectively addressing these challenges lies in the timely and precise detection capabilities offered by advanced intrusion ...
Nemalikanti Anand +5 more
wiley +1 more source
A Secured Supply Chain Management System Using Blockchain Technology
Develop supply chain management systems using blockchain, which is a smart contract mechanism to enhance security, efficiency, and transparency by recording every transaction and action on the blockchain with the help of the Internet of Things (IoT).
Md. Masud Rana, Sheikh Md. Rabiul Islam
wiley +1 more source
ADVANCED AND RAPID DEVELOPMENT OF DYNAMIC ANALYSIS TOOLS FOR JAVA
Low-level bytecode instrumentation techniques are widely used in many software-engineering tools for the Java Virtual Machine (JVM), that perform some form of dynamic program analysis, such as profilers or debuggers.
Alex Villazón +2 more
doaj
DexBERT: Effective, Task-Agnostic and Fine-grained Representation Learning of Android Bytecode [PDF]
Tiezhu Sun +7 more
openalex +1 more source
Intent vulnerabilities pose a significant threat as they allow attackers to exploit unverified intent messages, leading to sensitive data leaks, privilege escalations, or unauthorized actions that compromise user privacy and system security. Fuzzing methods, as traditional Intent vulnerability detection methods, are guided by the edge coverage of the ...
Zhanhui Yuan +5 more
wiley +1 more source

