Results 281 to 290 of about 1,414,439 (309)
Some of the next articles are maybe not open access.
2022
This chapter looks beyond the novelty of self-executing ‘smart contracts’ in blockchain networks and explores developments against the background fact that commercial parties have, for centuries, used documentary credit to simulate autonomous performance. Blockchain-based smart contracts and documentary credit share three core functionalities which are
+4 more sources
This chapter looks beyond the novelty of self-executing ‘smart contracts’ in blockchain networks and explores developments against the background fact that commercial parties have, for centuries, used documentary credit to simulate autonomous performance. Blockchain-based smart contracts and documentary credit share three core functionalities which are
+4 more sources
SmartBugBert: BERT-Enhanced Vulnerability Detection for Smart Contract Bytecode
arXiv.orgSmart contracts deployed on blockchain platforms are vulnerable to various security vulnerabilities. However, only a small number of Ethereum contracts have released their source code, so vulnerability detection at the bytecode level is crucial.
Jiuyang Bu +4 more
semanticscholar +1 more source
International Journal of Production Research, 2022
The production control for the mass individualisation paradigm of R&D-stage products is challenging due to the mix-flow and frequently-disturbed environment.
Jiewu Leng +5 more
semanticscholar +1 more source
The production control for the mass individualisation paradigm of R&D-stage products is challenging due to the mix-flow and frequently-disturbed environment.
Jiewu Leng +5 more
semanticscholar +1 more source
Combining Fine-Tuning and LLM-Based Agents for Intuitive Smart Contract Auditing with Justifications
International Conference on Software EngineeringSmart contracts are decentralized applications built atop blockchains like Ethereum. Recent research has shown that large language models (LLMs) have potential in auditing smart contracts, but the state-of-the-art indicates that even GPT-4 can achieve ...
Wei Ma +7 more
semanticscholar +1 more source
SCVHUNTER: Smart Contract Vulnerability Detection Based on Heterogeneous Graph Attention Network
International Conference on Software EngineeringSmart contracts are integral to blockchain's growth, but their vulnerabilities pose a significant threat. Traditional vulnerability detection methods rely heavily on expert-defined complex rules that are labor-intensive and difficult to adapt to the ...
Feng Luo +7 more
semanticscholar +1 more source
ACM Computing Surveys
Blockchain is a decentralized distributed ledger that combines multiple technologies, including chain data structures, P2P networks, consensus algorithms, cryptography, and smart contracts.
Wei Liang +5 more
semanticscholar +1 more source
Blockchain is a decentralized distributed ledger that combines multiple technologies, including chain data structures, P2P networks, consensus algorithms, cryptography, and smart contracts.
Wei Liang +5 more
semanticscholar +1 more source
Improving Smart Contract Security with Contrastive Learning-Based Vulnerability Detection
International Conference on Software EngineeringCurrently, smart contract vulnerabilities (SCVs) have emerged as a major factor threatening the transaction security of blockchain. Existing state-of-the-art methods rely on deep learning to mitigate this threat.
Yizhou Chen +3 more
semanticscholar +1 more source
Smart Contract Vulnerability Detection: The Role of Large Language Model (LLM)
ACM SIGAPP Applied Computing ReviewSmart contracts are susceptible to various vulnerabilities that can lead to significant financial losses. The usage of tools for vulnerabilities is reducing the threats but presents some limitations related to the approach used by the tool itself.
Biagio Boi +2 more
semanticscholar +1 more source
ExGen: Cross-platform, Automated Exploit Generation for Smart Contract Vulnerabilities
IEEE Transactions on Dependable and Secure Computing, 2023Smart contracts, just like other computer programs, are prone to a variety of vulnerabilities, which lead to severe consequences including massive token and coin losses.
Ling Jin +4 more
semanticscholar +1 more source
European Review of Private Law, 2018
Abstract: The computer language (computer code) on the basis of which smart contracts are written is different from the natural (Human) language. Computer language is a ‘dry’ language, whereas natural language is ‘wet’. In other words, it means that computer language is deterministic (just one meaning and one result are conceivable), when natural ...
openaire +1 more source
Abstract: The computer language (computer code) on the basis of which smart contracts are written is different from the natural (Human) language. Computer language is a ‘dry’ language, whereas natural language is ‘wet’. In other words, it means that computer language is deterministic (just one meaning and one result are conceivable), when natural ...
openaire +1 more source

