Results 81 to 90 of about 18,338 (256)

Mining Characteristics of Vulnerable Smart Contracts across Lifecycle Stages

open access: yesIET Blockchain, Volume 5, Issue 1, January/December 2025.
This paper conducts the first empirical study on smart contract security across three lifecycle stages: deployment and execution, upgrade, and destruction. It identifies seven vulnerability‐related features and applies them to machine learning models, revealing stage‐specific vulnerability patterns and improving detection accuracy.
Hongli Peng, Wenkai Li, Xiaoqi Li
wiley   +1 more source

Seeing Through EVM Bytecode Obfuscation

open access: yesIEEE Access
The Ethereum Virtual Machine (EVM) executes smart contracts using low-level, stack-based bytecode instructions. As these contracts grow in complexity and financial value, they increasingly attract adversaries who seek to evade detection by employing ...
Pasquale De Rosa   +2 more
doaj   +1 more source

SNITCH: Dynamic Dependent Information Flow Analysis for Independent Java Bytecode [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2019
Software testing is the most commonly used technique in the industry to certify the correctness of software systems. This includes security properties like access control and data confidentiality.
Eduardo Geraldo, João Costa Seco
doaj   +1 more source

Algorithm Diversity for Resilient Systems

open access: yes, 2019
Diversity can significantly increase the resilience of systems, by reducing the prevalence of shared vulnerabilities and making vulnerabilities harder to exploit.
A Avizienis   +10 more
core   +1 more source

Sound and Precise Malware Analysis for Android via Pushdown Reachability and Entry-Point Saturation [PDF]

open access: yes, 2013
We present Anadroid, a static malware analysis framework for Android apps. Anadroid exploits two techniques to soundly raise precision: (1) it uses a pushdown system to precisely model dynamically dispatched interprocedural and exception-driven control ...
Aldous, Petey   +6 more
core   +2 more sources

Enhancing intrusion detection against denial of service and distributed denial of service attacks: Leveraging extended Berkeley packet filter and machine learning algorithms

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
Abstract As organizations increasingly rely on network services, the prevalence and severity of Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks have emerged as significant threats. The cornerstone of effectively addressing these challenges lies in the timely and precise detection capabilities offered by advanced intrusion ...
Nemalikanti Anand   +5 more
wiley   +1 more source

A Secured Supply Chain Management System Using Blockchain Technology

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
Develop supply chain management systems using blockchain, which is a smart contract mechanism to enhance security, efficiency, and transparency by recording every transaction and action on the blockchain with the help of the Internet of Things (IoT).
Md. Masud Rana, Sheikh Md. Rabiul Islam
wiley   +1 more source

ADVANCED AND RAPID DEVELOPMENT OF DYNAMIC ANALYSIS TOOLS FOR JAVA

open access: yesInvestigación & Desarrollo, 2012
Low-level bytecode instrumentation techniques are widely used in many software-engineering tools for the Java Virtual Machine (JVM), that perform some form of dynamic program analysis, such as profilers or debuggers.
Alex Villazón   +2 more
doaj  

DexBERT: Effective, Task-Agnostic and Fine-grained Representation Learning of Android Bytecode [PDF]

open access: green, 2022
Tiezhu Sun   +7 more
openalex   +1 more source

PathFuzzer: Sensitive Information Flow Path‐Guided Fuzzing for Intent Vulnerabilities in Android Applications

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
Intent vulnerabilities pose a significant threat as they allow attackers to exploit unverified intent messages, leading to sensitive data leaks, privilege escalations, or unauthorized actions that compromise user privacy and system security. Fuzzing methods, as traditional Intent vulnerability detection methods, are guided by the edge coverage of the ...
Zhanhui Yuan   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy