Results 251 to 260 of about 1,816,745 (277)
Some of the next articles are maybe not open access.
DAppSCAN: Building Large-Scale Datasets for Smart Contract Weaknesses in DApp Projects
IEEE Transactions on Software Engineering, 2023The Smart Contract Weakness Classification Registry (SWC Registry) is a widely recognized list of smart contract weaknesses specific to the Ethereum platform.
Zibin Zheng +5 more
semanticscholar +1 more source
Informatik-Spektrum, 2017
In addition to the cryptocurrency Bitcoin, Smart Contracts are seen as the main application of blockchain technology. This thesis deals with the question if Smart Contracts have to be seen as contracts in the sense of Austrian civil law, with a description of the applications and implementation possibilities of Smart Contracts and with necessary ...
+4 more sources
In addition to the cryptocurrency Bitcoin, Smart Contracts are seen as the main application of blockchain technology. This thesis deals with the question if Smart Contracts have to be seen as contracts in the sense of Austrian civil law, with a description of the applications and implementation possibilities of Smart Contracts and with necessary ...
+4 more sources
2022
This chapter looks beyond the novelty of self-executing ‘smart contracts’ in blockchain networks and explores developments against the background fact that commercial parties have, for centuries, used documentary credit to simulate autonomous performance. Blockchain-based smart contracts and documentary credit share three core functionalities which are
+4 more sources
This chapter looks beyond the novelty of self-executing ‘smart contracts’ in blockchain networks and explores developments against the background fact that commercial parties have, for centuries, used documentary credit to simulate autonomous performance. Blockchain-based smart contracts and documentary credit share three core functionalities which are
+4 more sources
International Journal of Production Research, 2022
The production control for the mass individualisation paradigm of R&D-stage products is challenging due to the mix-flow and frequently-disturbed environment.
Jiewu Leng +5 more
semanticscholar +1 more source
The production control for the mass individualisation paradigm of R&D-stage products is challenging due to the mix-flow and frequently-disturbed environment.
Jiewu Leng +5 more
semanticscholar +1 more source
Combining Fine-Tuning and LLM-Based Agents for Intuitive Smart Contract Auditing with Justifications
International Conference on Software EngineeringSmart contracts are decentralized applications built atop blockchains like Ethereum. Recent research has shown that large language models (LLMs) have potential in auditing smart contracts, but the state-of-the-art indicates that even GPT-4 can achieve ...
Wei Ma +7 more
semanticscholar +1 more source
SCVHUNTER: Smart Contract Vulnerability Detection Based on Heterogeneous Graph Attention Network
International Conference on Software EngineeringSmart contracts are integral to blockchain's growth, but their vulnerabilities pose a significant threat. Traditional vulnerability detection methods rely heavily on expert-defined complex rules that are labor-intensive and difficult to adapt to the ...
Feng Luo +7 more
semanticscholar +1 more source
ACM Computing Surveys
Blockchain is a decentralized distributed ledger that combines multiple technologies, including chain data structures, P2P networks, consensus algorithms, cryptography, and smart contracts.
Wei Liang +5 more
semanticscholar +1 more source
Blockchain is a decentralized distributed ledger that combines multiple technologies, including chain data structures, P2P networks, consensus algorithms, cryptography, and smart contracts.
Wei Liang +5 more
semanticscholar +1 more source
Smart Contract Vulnerability Detection: The Role of Large Language Model (LLM)
ACM SIGAPP Applied Computing ReviewSmart contracts are susceptible to various vulnerabilities that can lead to significant financial losses. The usage of tools for vulnerabilities is reducing the threats but presents some limitations related to the approach used by the tool itself.
Biagio Boi +2 more
semanticscholar +1 more source
Improving Smart Contract Security with Contrastive Learning-Based Vulnerability Detection
International Conference on Software EngineeringCurrently, smart contract vulnerabilities (SCVs) have emerged as a major factor threatening the transaction security of blockchain. Existing state-of-the-art methods rely on deep learning to mitigate this threat.
Yizhou Chen +3 more
semanticscholar +1 more source
ExGen: Cross-platform, Automated Exploit Generation for Smart Contract Vulnerabilities
IEEE Transactions on Dependable and Secure Computing, 2023Smart contracts, just like other computer programs, are prone to a variety of vulnerabilities, which lead to severe consequences including massive token and coin losses.
Ling Jin +4 more
semanticscholar +1 more source

