Results 311 to 320 of about 1,636,081 (333)
Some of the next articles are maybe not open access.
Securing Deployed Smart Contracts and DeFi With Distributed TEE Cluster
IEEE Transactions on Parallel and Distributed Systems, 2023Smart contract technologies can be used to implement almost arbitrary business logic. They can revolutionize many businesses such as payments, insurance, and crowdfunding.
Zecheng Li +3 more
semanticscholar +1 more source
Securify: Practical Security Analysis of Smart Contracts
Conference on Computer and Communications Security, 2018Permissionless blockchains allow the execution of arbitrary programs (called smart contracts), enabling mutually untrusted entities to interact without relying on trusted third parties.
Petar Tsankov +5 more
semanticscholar +1 more source
Smart Contracts, Bitcoin Bots, and Consumer Protection
Social Science Research NetworkTrustless public ledgers (“TPLs”)—the technology underneath Bitcoin—do more than just create online money. The technology permits people to directly exchange money for what they want, with no intermediaries, such as credit card companies. Contract law is
Joshua Fairfield
semanticscholar +1 more source
Malicious Code Detection in Smart Contracts via Opcode Vectorization
arXiv.orgWith the booming development of blockchain technology, smart contracts have been widely used in finance, supply chain, Internet of things and other fields in recent years.
Huanhuan Zou, Zongwei Li, Xiaoqi Li
semanticscholar +1 more source
SCALM: Detecting Bad Practices in Smart Contracts Through LLMs
AAAI Conference on Artificial IntelligenceAs the Ethereum platform continues to mature and gain widespread usage, it is crucial to maintain high standards of smart contract writing practices. While bad practices in smart contracts may not directly lead to security issues, they do elevate the ...
Zongwei Li +3 more
semanticscholar +1 more source
Finding permission bugs in smart contracts with role mining
International Symposium on Software Testing and Analysis, 2022Smart contracts deployed on permissionless blockchains, such as Ethereum, are accessible to any user in a trustless environment. Therefore, most smart contract applications implement access control policies to protect their valuable assets from ...
Ye Liu +3 more
semanticscholar +1 more source
Smart Contracts in the Real World: A Statistical Exploration of External Data Dependencies
arXiv.orgSmart contracts with external data are crucial for functionality but pose security and reliability concerns. Statistical and quantitative studies on this interaction are scarce.
Yishun Wang +3 more
semanticscholar +1 more source
European Review of Private Law, 2018
Abstract: The computer language (computer code) on the basis of which smart contracts are written is different from the natural (Human) language. Computer language is a ‘dry’ language, whereas natural language is ‘wet’. In other words, it means that computer language is deterministic (just one meaning and one result are conceivable), when natural ...
openaire +1 more source
Abstract: The computer language (computer code) on the basis of which smart contracts are written is different from the natural (Human) language. Computer language is a ‘dry’ language, whereas natural language is ‘wet’. In other words, it means that computer language is deterministic (just one meaning and one result are conceivable), when natural ...
openaire +1 more source
Blockchain-Enabled Smart Contracts: Architecture, Applications, and Future Trends
IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2019In recent years, the rapid development of cryptocurrencies and their underlying blockchain technology has revived Szabo’s original idea of smart contracts, i.e., computer protocols that are designed to automatically facilitate, verify, and enforce the ...
Shuai Wang +5 more
semanticscholar +1 more source
ZeeStar: Private Smart Contracts by Homomorphic Encryption and Zero-knowledge Proofs
IEEE Symposium on Security and Privacy, 2022Data privacy is a key concern for smart contracts handling sensitive data. The existing work zkay addresses this concern by allowing developers without cryptographic expertise to enforce data privacy. However, while zkay avoids fundamental limitations of
Samuel Steffen +3 more
semanticscholar +1 more source

