📚 A curated list of academic papers on Blockchain & Smart Contracts, categorized by conference name and publication year.
🎯 Contributions are welcome! Researchers and developers are encouraged to add more published papers to this list.
📑 Some papers also include TL;DR summaries for quick reference.
💰 If you find this list helpful, consider supporting via cryptocurrency donation: 0xCC28B05fE858CDbc8692E3272A4451111bDCf700
🌍 Explore my 🔬 Homepage and 💡 Google Scholar Profile to discover my research and contributions.
🔒 Security & Crypto | 🌐 Networking & Database | 🛠Software Engineering & Program Language | 🏛 System Architecture |
---|---|---|---|
IEEE S&P | SIGMETRICS | ICSE | EuroSys |
ACM CCS | ICDE | ESEC/FSE | ACM SOSP |
USENIX Security | VLDB | ASE | IEEE ICDCS |
NDSS | ACM SIGMOD | ACM PLDI | OSDI |
IEEE DSN | IEEE INFOCOM | ACM OOPSLA | Usenix ATC |
SRCS | IMC | ISSTA | Usenix FAST |
RAID | WWW | ACM POPL | |
CAV |
- [security] Asymmetric Mempool DoS Security: Formal Definitions and Provable Secure Designs.
- [security] Zero-Knowledge Location Privacy via Accurate Floating-Point SNARKs
- [security] Volatile and Persistent Memory for zkSNARKs via Algebraic Interactive Proofs
- [security] Phecda: Post-Quantum Transparent zkSNARKs from Improved Polynomial Commitment and VOLE-in-the-Head with Application in Publicly Verifiable AES
- [security] Security Perceptions of Users in Stablecoins: Advantages and Risks within the Cryptocurrency Ecosystem
- [security] P2C2T: Preserving the Privacy of Cross-Chain Transfer
- [security] NURGLE: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulation.
- [security] SoK: Security and Privacy of Blockchain Interoperability.
- [security] Pianist: Scalable zkRollups via Fully Distributed Zero-Knowledge Proofs.
- [security] Large-Scale Study of Vulnerability Scanners for Ethereum Smart Contracts | MyTLDR.
- [security] POMABuster: Detecting Price Oracle Manipulation Attacks in Decentralized Finance | MyTLDR.
- [security] Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based Technical Support Scams
- [security] Certifying Zero-Knowledge Circuits with Refinement Types.
- [security] Formal Model-Driven Analysis of Resilience of GossipSub to Attacks from Misbehaving Peers | MyTLDR.
- [security] Specular: Towards Secure, Trust-minimized Optimistic Blockchain Execution.
- [security] Towards Smart Contract Fuzzing on GPUs.
- [security] SMARTINV: Multimodal Learning for Smart Contract Invariant Inference| MyTLDR.
- [security] Nyx: Detecting Exploitable Front-Running Vulnerabilities in Smart Contracts | MyTLDR.
- [security] Optimal Flexible Consensus and its Application to Ethereum.
- [security] Chronos: Finding Timeout Bugs in Practical Distributed Systems by Deep-Priority Fuzzing with Transient Delay.
- [security] Pulling off the mask: Forensic analysis of the deceptive creator wallets behind smart contract fraud.
- [security] Non-Atomic Arbitrage in Decentralized Finance
- [security] Routing Attacks on Cryptocurrency Mining Pools.
- [financail] WeRLman: To Tackle Whale (Transactions), Go Deep (RL) | MyTLDR.
- [security] Clockwork Finance: Automated Analysis of Economic Security in Smart Contracts | MyTLDR.
- [security] SoK: Decentralized Finance (DeFi) Attacks | MyTLDR.
- [security] Tyr: Finding Consensus Failure Bugs in Blockchain System with Behaviour Divergent Model.
- [security] Three Birds with One Stone: Efficient Partitioning Attacks on Interdependent Cryptocurrency Networks | MyTLDR.
- [security] Quantifying Blockchain Extractable Value: How dark is the forest? | MyTLDR.
- [security] SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds.
- [security] SmartPulse: Automated Checking of Temporal Properties in Smart Contracts | MyTLDR.
- [security] sGUARD: Towards Fixing Vulnerable Smart Contracts Automatically
- [finance] On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols.
- [security] Compositional Security for Reentrant Applications | MyTLDR.
- [security] High-Frequency Trading on Decentralized On-Chain Exchanges.
- [security] Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability.
- [security] VerX: Safety Verification of Smart Contracts | MyTLDR.
- [security] VeriSmart: A Highly Precise Safety Verifier for Ethereum Smart Contracts.
- [security] Executable Operational Semantics of Solidity | MyTLDR.
- [security] The miner's dilemma
- [security] Mempool Privacy via Batched Threshold Encryption: Attacks and Defenses.
- [security] fAmulet: Finding Finalization Failure Bugs in Polygon zkRollup | MyTLDR.
- [security] Derecho: Privacy Pools with Proof-Carrying Disclosures.
- [security] TokenScout: Early Detection of Ethereum Scam Tokens via Temporal Graph Learning | MyTLDR.
- [security] Defying the Odds: Solana's Unexpected Resilience in Spite of the Security Challenges Faced by Developers.
- [security] Stealing Trust: Unraveling Blind Message Attacks in Web3 Authentication.
- [security] FORAY: Towards Effective Attack Synthesis against Deep Logical Vulnerabilities in DeFi Protocols.
- [security] Towards Automatic Discovery of Denial of Service Weaknesses in Blockchain Resource Models.
- [MEV] Rolling in the Shadows: Analyzing the Extraction of MEV Across Layer-2 Rollups.
- [Consensus] Lutris: A Blockchain Combining Broadcast and Consensus.
- [Economic] Blockchain Bribing Attacks and the Efficacy of Counterincentives.
- [security] zkLogin: Privacy-Preserving Blockchain Authentication with Existing Credentials.
- [security] DoubleUp Roll: Double-spending in Arbitrum by Rolling It Back | MyTLDR.
- [security] Data Independent Order Policy Enforcement: Limitations and Solutions.
- [security] Complete Knowledge: Preventing Encumbrance of Cryptographic Secrets.
- [security] Characterizing Ethereum Address Poisoning Attack.
- [security] Demystifying DeFi MEV Activities in Flashbots Bundle | MyTLDR.
- [security] Cryptocurrency wallets, security, usability, multi-device wallets.
- [security] Fait Accompli Committee Selection: Improving the Size-Security Tradeoff of Stake-Based Committees.
- [security] The Locality of Memory Checking
- [security] Lanturn: Measuring Economic Security of Smart Contracts Through Adaptive Learning | MyTLDR.
- [security] Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab)use in the Wild.
- [security] TxPhishScope: Towards Detecting and Understanding Transaction-based Phishing on Ethereum | MyTLDR.
- [security] How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting Governance.
- [security] Uncle Maker: (Time)Stamping Out The Competition in Ethereum | MyTLDR.
- [security] TrustBoost: Boosting Trust among Interoperable Blockchains.
- [security] Analyzing the Real-World Security of the Algorand Blockchain.
- [security] Phoenix: Detect and Locate Resilience Issues in Blockchain via Context-Sensitive Chaos | MyTLDR.
- [security] Fuzz on the Beach: Fuzzing Solana Smart Contracts | MyTLDR.
- [security] Cybercrime Bitcoin Revenue Estimations: Quantifying the Impact of Methodology and Coverage.
- [security] Empirical Analysis of EIP-1559: Transaction Fees, Waiting Time, and Consensus Security.
- [security] Towards Automated Safety Vetting of Smart Contracts in Decentralized Applications | MyTLDR.
- [security] VRust: Automated Vulnerability Detection for Solana Smart Contracts | MyTLDR.
- [security] Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration.
- [security] Understanding Security Issues in the NFT Ecosystem.
- [security] DETER: Denial of Ethereum Txpool sERvices.
- [security] SyncAttack: Double-spending in Bitcoin Without Mining Power.
- [security] ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts | MyTLDR.
- [security] eThor: Practical and Provably Sound Static Analysis of Ethereum Smart Contracts.
- [security] Bdos: Blockchain denial-of-service.
- [SoftwareAnalysis] TokenScope: Automatically Discovering Inconsistent Cryptocurrency Tokens.
- [security] Learning to Fuzz from Symbolic Execution with Application to Smart Contracts. | MyTLDR.
- [security] Zkay: Specifying and Enforcing Data Privacy in Smart Contracts.
- [security] Power adjusting and bribery racing: Novel mining attacks in the bitcoin system
- [security] Securify: Practical Security Analysis of Smart Contracts.
- [security] BitML: a calculus for Bitcoin smart contracts Massimo.
- [security] Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing.
- [security] Be selfish and avoid dilemmas: Fork after withholding (faw) attacks on bitcoin
- [security] Making Smart Contracts Smarter | MyTLDR.
- [security] Formal verification of smart contracts: Short paper.
- [security] Town crier: An authenticated data feed for smart contracts.
- [security] Auspex: Unveiling Inconsistency Bugs of Transaction Fee Mechanism in Blockchain.
- [security] Deanonymizing Ethereum Validators: The P2P Network Has a Privacy Issue.
- [security] SoK: Understanding zk-SNARKs: The Gap Between Research and Practice.
- [security] Surviving in Dark Forest: Towards Evading the Attacks from Front-Running Bots in Application Layer.
- [security] Available Attestation: Towards a Reorg-Resilient Solution for Ethereum Proof-of-Stake.
- [security] Voting-Bloc Entropy: A New Metric for DAO Decentralization.
- [security] Following Devils' Footprint: Towards Real-time Detection of Price Manipulation Attacks
- [security] SoK: What Don’t We Know? Understanding Security Vulnerabilities in SNARKs.
- [security] Sprints: Intermittent Blockchain PoW Mining.
- [security] Max Attestation Matters: Making Honest Parties Lose Their Incentives in Ethereum PoS | MyTLDR.
- [security] zkCross: A Novel Architecture for Cross-Chain Privacy-Preserving Auditing.
- [security] Understanding Ethereum Mempool Security under Asymmetric DoS by Symbolized Stateful Fuzzing.
- [security] All Your Tokens are Belong to Us: Demystifying Address Verification Vulnerabilities in Solidity Smart Contracts.
- [security] Speculative Denial-of-Service Attacks in Ethereum | MyTLDR.
- [security] Using My Functions Should Follow My Checks: Understanding and Detecting Insecure OpenZeppelin Code in Smart Contracts.
- [security] Practical Security Analysis of Zero-Knowledge Proof Circuits | MyTLDR.
- [security] Pixel+ and Pixel++: Compact and Efficient Forward-Secure Multi-Signatures for PoS Blockchain Consensus.
- [security] GuideEnricher: Protecting the Anonymity of Ethereum Mixing Service Users with Deep Reinforcement Learning.
- [security] Confusum Contractum: Confused Deputy Vulnerabilities in Ethereum Smart Contracts.
- [security] Panda: Security Analysis of Algorand Smart Contracts.
- [security] Proxy Hunting: Understanding and Characterizing Proxy-based Upgradeable Smart Contracts in Blockchains.
- [security] The Blockchain Imitation Game.
- [security] A Large Scale Study of the Ethereum Arbitrage Ecosystem | MyTLDR.
- [security] A Mixed-Methods Study of Security Practices of Smart Contract Developers | MyTLDR.
- [security] Smart Learning to Find Dumb Contracts | MyTLDR.
- [security] Snapping Snap Sync: Practical Attacks on Go Ethereum Synchronising Nodes | MyTLDR.
- [security] Token Spammers, Rug Pulls, and Sniper Bots: An Analysis of the Ecosystem of Tokens in Ethereum and in the Binance Smart Chain (BNB) | MyTLDR.
- [security] Automated Inference on Financial Security of Ethereum Smart Contracts | MyTLDR.
- [security] Your Exploit is Mine: Instantly Synthesizing Counterattack Smart Contract | MyTLDR.
- [security] Anatomy of a High-Profile Data Breach: Dissecting the Aftermath of a Crypto-Wallet Case.
- [security] Mixed Signals: Analyzing Ground-Truth Data on the Users and Economics of a Bitcoin Mixing Service.
- [security] Is Your Wallet Snitching On You? An Analysis on the Privacy Implications of Web3.
- [security] How to Peel a Million: Validating and Expanding Bitcoin Clusters.
- [security] Total Eclipse of the Heart-Disrupting the InterPlanetary File System.
- [security] Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications.
- [security] EOSAFE: Security Analysis of EOSIO Smart Contracts.
- [security] SmarTest: Effectively Hunting Vulnerable Transaction Sequences in Smart Contracts through Language Model-Guided Symbolic Execution | MyTLDR.
- [security] Smart Contract Vulnerabilities: Vulnerable Does Not Imply Exploited.
- [security] EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts.
- [security] Frontrunner Jones and the Raiders of the Dark Forest: An Empirical Study of Frontrunning on the Ethereum Blockchain.
- [security] ETHBMC: A Bounded Model Checker for Smart Contracts | MyTLDR.
- [security] TXSPECTOR: Uncovering Attacks in Ethereum from Transactions.
- [security] An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem.
- [security] BlockSci: Design and applications of a blockchain analysis platform
- [security] The art of the scam: Demystifying honeypots in ethereum smart contracts | MyTLDR.
- [application] FastKitten: Practical Smart Contracts on Bitcoin.
- [security] Tracing Transactions Across Cryptocurrency Ledgers.
- [security] Erays: Reverse Engineering Ethereum's Opaque Smart Contracts.
- [security] teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts.
- [application] Arbitrum: Scalable, private smart contracts.
- [security] Enter the Hydra: Towards principled bug bounties and exploit-resistant smart contracts.
- [security] SmartPool: Practical Decentralized Pooled Mining.
- [security] Alba: The Dawn of Scalable Bridges for Blockchains.
- [security] Anonymity Schemes Used by Cryptocurrencies.
- [security] Eclipse Attacks on Monero's Peer-to-Peer Network.
- [LLM] PropertyGPT: LLM-driven Formal Verification of Smart Contracts through Retrieval-Augmented Property Generation.
- [security] MTZK: Testing and Exploring Bugs in Zero-Knowledge (ZK) Compilers.
- [security] Silence False Alarms: Identifying Anti-Reentrancy Patterns on Ethereum to Refine Smart Contract Reentrancy Detection.
- [security] Dissecting Payload-based Transaction Phishing on Ethereum.
- [security] Manifoldchain: Maximizing Blockchain Throughput via Bandwidth-Clustered Sharding.
- [security] Siniel: Distributed Privacy-Preserving zkSNARK.
- [security] The Forking Way: When TEEs Meet Consensus | MyTLDR.
- [security] Kronos: A Secure and Generic Sharding Blockchain Consensus with Optimized Overhead.
- [security] Separation is Good: A Faster Order-Fairness Byzantine Consensus.
- [security] Proof of Backhaul: Trustfree Measurement of Broadband Bandwidth
- [security] A Two-Layer Blockchain Sharding Protocol Leveraging Safety and Liveness for Enhanced Performance.
- [security] Pisces: Private and Compliable Cryptocurrency Exchange.
- [security] Front-running Attack in Sharded Blockchains and Fair Cross-shard Consensus.
- [security] Content Censorship in the InterPlanetary File System | MyTLDR.
- [security] DRAINCLoG: Detecting Rogue Accounts with Illegally-obtained NFTs using Classifiers Learned on Graphs.
- [security] VETEOS: Statically Vetting EOSIO Contracts for the "Groundhog Day" Vulnerabilities
- [security] Not your Type! Detecting Storage Collision Vulnerabilities in Ethereum Smart Contracts | MyTLDR.
- [security] Abusing the Ethereum Smart Contract Verification Services for Fun and Profit | MyTLDR.
- [security] Double and Nothing: Understanding and Detecting Cryptocurrency Giveaway Scams | MyTLDR.
- [security] Partitioning Ethereum without Eclipsing It.
- [security] LOKI: State-Aware Fuzzing Framework for the Implementation of Blockchain Consensus Protocols.
- [security] BlockScope: Detecting and Investigating Propagated Vulnerabilities in Forked Blockchain Projects.
- [security] Smarter Contracts: Detecting Vulnerabilities in Smart Contracts with Deep Transfer Learning | MyTLDR.
- [application] Bitcontracts: Supporting Smart Contracts in Legacy Blockchains.
- [security] As Strong As Its Weakest Link: How to Break Blockchain DApps at RPC Service.
- [security] SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Reinforcement Learning.
- [security] SODA: A Generic Online Detection Framework for Smart Contracts.
- [security] Broken Metre: Attacking Resource Metering in EVM.
- [security] YODA: Enabling computationally intensive contracts on blockchains with Byzantine and Selfish nodes.
- [security] Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks.
- [security] "Zeus": Analyzing Safety of Smart Contracts.
- [security] Chainspace: A Sharded Smart Contracts Platform.
- [FAST2025] Maat: Analyzing and Optimizing Overcharge on Blockchain Storage.
- [FAST2024] COLE: A Column-based Learned Storage for Blockchain Systems.
- [ATC24] SlimArchive: A Lightweight Architecture for Ethereum Archive Nodes.
- [ATC22] An Off-The-Chain Execution Environment for Scalable Testing and Profiling of Smart Contracts.
- [ATC21] RainBlock: Faster Transaction Processing in Public Blockchains.
- [EUROSYS25] ParallelEVM: Operation-Level Concurrent Transaction Execution for EVM-Compatible Blockchains.
- [EUROSYS23] Diablo: A Benchmark Suite for Blockchains | MyTLDR.
- [EUROSYS22] Ethanos: efficient bootstrapping for full nodes on account-based blockchain.
- [EUROSYS21] Hyperledger fabric: a distributed operating system for permissioned blockchains.
- [CAV22] SolCMC: Solidity Compiler's Model Checker | MyTLDR
- [CAV22] End-to-End Formal Verification of Ethereum 2.0 Deposit Smart Contract.
- [CAV22] Synthesis of super-optimized smart contracts using max-smt.
- [CAV21] TxT: Real-Time Transaction Encapsulation for Ethereum Smart Contracts
- [security] Smart Contract Fuzzing Towards Profitable Vulnerabilities.
- [security] Detecting Smart Contract State-Inconsistency Bugs via Flow Divergence and Multiplex Symbolic Execution.
- [security] SmartShot: Hunt Hidden Vulnerabilities in Smart Contracts using Mutable Snapshots.
- [security] Clone Detection for Smart Contracts: How Far Are We?.
- [security] Automated and Accurate Token Transfer Identification and Its Applications in Cryptocurrency Security.
- [security] VERITE: A Profit-Centric Smart Contract Fuzzing Framework.
- [security] Static Application Security Testing (SAST) Tools for Smart Contracts: How Far Are We?).
- [security] SmartAxe: Detecting Cross-Chain Vulnerabilities in Bridge Smart Contracts via Fine-Grained Static Analysis.
- [security] Demystifying Invariant Effectiveness for Securing Smart Contracts.
- [security] Efficiently Detecting Reentrancy Vulnerabilities in Complex Smart Contracts.
- [security] Demystifying the Composition and Code Reuse in Solidity Smart Contracts | MyTLDR.
- [security] Understanding Solidity Event Logging Practices in the Wild.
- [software engineering] EtherDiffer: Differential Testing on RPC Services of Ethereum Nodes | MyTLDR.
- [security] SmartFix: Fixing Vulnerable Smart Contracts by Accelerating Generate-and-Verify Repair using Statistical Models
- [security] TransRacer: Function Dependence-Guided Transaction Race Detection for Smart Contracts
- [security] DeepInfer: Deep Type Inference from Smart Contract Bytecode | MyTLDR.
- [security] MANDO-GURU: vulnerability detection for smart contract source code by heterogeneous graph embeddings.
- [security] An Empirical Study of Blockchain System Vulnerabilities: Modules, Types, and Patterns.
- [security] Declarative Smart Contracts.
- [security] SolSEE: a source-level symbolic execution engine for solidity
- [security] ÐArcher: Detecting On-Chain-Off-Chain Synchronization Bugs in Decentralized Applications.
- [application] Making Smart Contract Development More Secure and Easier.
- [application] iBatch: Saving Ethereum Fees via Secure and Cost-Effective Batching of Smart-Contract Invocations.
- [security] Towards Automated Verification of Smart Contract Fairness.
- [security] ModCon: a model-based testing platform for smart contracts.
- [security] HARVEY: A Greybox Fuzzer for Smart Contracts.
- [security] EVMFuzzer: Detect EVM vulnerabilities via fuzz testing.
- [security] A graph-based framework for analysing the design of smart contracts.
- [security] Automated Attack Synthesis for Constant Product Market Makers
- [security] Copy-and-Paste? Identifying EVM-Inequivalent Code Smells in Multi-chain Reuse Contracts
- [security] OpDiffer: LLM-Assisted Opcode-Level Differential Testing of Ethereum Virtual Machine
- [security] Enhancing Smart Contract Security Analysis with Execution Property Graphs
- [security] Smart-LLaMA-DPO: Reinforced Large Language Model for Explainable Smart Contract Vulnerability Detection
- [security] SoK: A Taxonomic Analysis of DeFi Rug Pulls - Types, Dataset, and Tool Assessment
- [security] The Incredible Shrinking Context... in a Decompiler Near You
- [security] Towards Understanding the Bugs in Solidity Compiler.
- [security] Synthesis of Sound and Precise Storage Cost Bounds via Unsound Resource Analysis and Max-SMT
- [security] LENT-SSE: Leveraging Executed and Near Transactions for Speculative Symbolic Execution of Smart Contracts.
- [security] ldentifying Smart Contract Security Issues in Code Snippets from Stack Overflow.
- [security] Empirical Study of Move Smart Contract Security: Introducing MoveScan for Enhanced Analysis.
- [security] Following the "Thread": Toward Finding Manipulatable Bottlenecks In Blockchain Clients.
- [security] Midas: Mining Profitable Exploits in On-Chain Smart Contracts via Feedback-Driven Fuzzing and Differential Analysis.
- [security] DeFort: Automatic Detection and Analysis of Price Manipulation Attacks in DeFi Applications.
- [security] DAppFL: Just-in-Time Fault Localization for Decentralized Applications in Web3.
- [security] SmartState: Detecting State-Reverting Vulnerabilities in Smart Contracts via Fine-Grained State-Dependency Analysis | MyTLDR.
- [security] iSyn: Semi-automated Smart Contract Synthesis from Legal Financial Agreements | MyTLDR.
- [security] Beyond "Protected" and "Private": An Empirical Security Analysis of Custom Function Modifiers in Smart Contracts | MyTLDR.
- [security] Automated Generation of Security-Centric Descriptions for Smart Contract Bytecode.
- [security] Detecting State Inconsistency Bugs in DApps via On-Chain Transaction Replay and Fuzzing | MyTLDR.
- [security] ItyFuzz: Snapshot-Based Fuzzer for Smart Contract
- [security] Toward Automated Detecting Unanticipated Price Feed in Smart Contract | MyTLDR.
- [security] DeFiTainter: Detecting Price Manipulation Vulnerabilities in DeFi Protocols | MyTLDR.
- [security] Definition and Detection of Defects in NFT Smart Contracts | MyTLDR.
- [security] WASAI: uncovering vulnerabilities in Wasm smart contracts | MyTLDR.
- [security] Finding permission bugs in smart contracts with role mining | MyTLDR.
- [security] eTainter: detecting gas-related vulnerabilities in smart contracts | MyTLDR.
- [security] Park: accelerating smart contract vulnerability detection via parallel-fork symbolic execution.
- [security] SmartDagger: a bytecode-based static analysis approach for detecting cross-contract vulnerability.
- [security] SpCon: Finding Smart Contract Permission Bugs with Role Mining
- [security] Empirical Evaluation of Smart Contract Testing: What Is the Best Choice?.
- [security] SCStudio: A Secure and Efficient Integrated Development Environment for Smart Contracts..
- [security] How effective are smart contract analysis tools? evaluating smart contract static analysis tools using bug injection.
- [security] Echidna: effective, usable, and fast fuzzing for smart contracts.
- [security] EShield: protect smart contracts against reverse engineering.
- [security] SAFEVM: a safety verifier for Ethereum smart contracts.
- [security] Exploiting the laws of order in smart contracts.
- [security] AdvSCanner: Generating Adversarial Smart Contracts to Exploit Reentrancy Vulnerabilities Using LLM and Static Analysis.
- [security] COBRA: Interaction-Aware Bytecode-Level Vulnerability Detector for Smart Contracts.
- [security] Semantic Sleuth: Identifying Ponzi Contracts via Large Language Models.
- [security] Skyeye: Detecting Imminent Attacks via Analyzing Adversarial Smart Contracts.
- [security] DeFiWarder: Protecting DeFi Apps from Token Leaking Vulnerabilities | MyTLDR.
- [security] SmartCoCo: Checking Comment-code Inconsistency in Smart Contracts via Constraint Propagation and Binding.
- [security] A Unified Specification Mining Framework for Smart Contracts.
- [security] InvCon: A Dynamic Invariant Detector for Ethereum Smart Contracts.
- [security] Learning Contract Invariants Using Reinforcement Learning.
- [security] Effectively Generating Vulnerable Transaction Sequences in Smart Contracts with Reinforcement Learning-guided Fuzzing.
- [security] Reentrancy Vulnerability Detection and Localization: A Deep Learning Based Two-phase Approach.
- [security] Identifying Solidity Smart Contract API Documentation Errors.
- [security] Xscope: Hunting for Cross-Chain Bridge Attacks
- [security] Property-Based Automated Repair of DeFi Protocols
- [security] Towards Effective Static Analysis Approaches for Security Vulnerabilities in Smart Contracts
- [security] GASOL: Gas Analysis and Optimization for Ethereum Smart Contracts.
- [security] Automating User Notice Generation for Smart Contract Functions.
- [security] Characterizing Transaction-Reverting Statements in Ethereum Smart Contracts.
- [security] SMARTIAN: Enhancing Smart Contract Fuzzing with Static and Dynamic Analyses.
- [security] SigRec: Automatic Recovery of Function Signatures in Smart Contracts.
- [security] Cross-Contract Static Analysis for Detecting Practical Reentrancy Vulnerabilities in Smart Contracts.
- [security] Demystifying Loops in Smart Contracts.
- [security] Summary-Based Symbolic Evaluation for Smart Contracts.
- [security] Finding Ethereum Smart Contracts Security Issues by Comparing History Versions.
- [security] Manticore: A User-Friendly Symbolic Execution Framework for Binaries and Smart Contracts.
- [security] MuSC: A Tool for Mutation Testing of Ethereum Smart Contract.
- [security] Securing Smart Contracts in Blockchain.
- [security] ContractFuzzer: Fuzzing Smart Contracts for Vulnerability.
- [security] S-gram: towards semantic-aware security auditing for Ethereum smart contracts.
- [security] ConsCS: Effective and Efficient Verification of Circom Circuits.
- [security] Safeguarding DeFi Smart Contracts against Oracle Deviations.
- [security] Hyperion: Unveiling DApp Inconsistencies using LLM and Dataflow-Guided Symbolic Execution.
- [security] Demystifying and Detecting Cryptographic Defects in Ethereum Smart Contracts | MyTLDR.
- [LLM] Combining Fine-Tuning and LLM-based Agents for Intuitive Smart Contract Auditing with Justifications.
- [security] An Empirical Study of Proxy Smart Contracts at the Ethereum Ecosystem Scale.
- [security] Fork State-Aware Differential Fuzzing for Blockchain Consensus Implementations.
- [security] Automated Test Generation For Smart Contracts via On-Chain Test Case Augmentation and Migration.
- [security] FairChecker: Detecting Fund-stealing Bugs in DeFi Protocols via Fairness Validation.
- [security] Enhancing The Open Network: Definition and Automated Detection of Smart Contract Defects.
- [security] Code Cloning in Solidity Smart Contracts: Prevalence, Evolution, and Impact on Development.
- [security] Definition and Detection of Centralization Defects in Smart Contracts.
- [security] Chord: Towards a Unified Detection of Blockchain Transaction Parallelism Bugs.
- [security] FairChecker: Detecting Fund-stealing Bugs in DeFi Protocols via Fairness Validation.
- [security] SCVHunter: Smart Contract Vulnerability Detection Based on Heterogeneous Graph Attention Network | MyTLDR.
- [security] FlashSyn: Flash Loan Attack Synthesis via Counter Example Driven Approximation.
- [security] Stop Pulling my Rug: Exposing Rug Pull Risks in Crypto Token to Investors.
- [security] Improving Smart Contract Security with Contrastive Learning-based Vulnerability Detection.
- [security] Towards Finding Accounting Errors in Smart Contracts.
- [security] Are We There Yet? Unraveling the State-of-the-Art Smart Contract Fuzzers.
- [security] PrettySmart: Detecting Permission Re-delegation Vulnerability for Token Behaviors in Smart Contracts.
- [security] When Contracts Meets Crypto: Exploring Developers' Struggleswith Ethereum Cryptographic APIs
- [security] PonziGuard: Detecting Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph (CRBG).
- [security] Revealing Hidden Threats: An Empirical Study of Library Misuse in Smart Contracts | MyTLDR.
- [security] Uncover the Premeditated Attacks: Detecting Exploitable Reentrancy Vulnerabilities by Identifying Attacker Contracts.
- [security] Smart Contract and DeFi Security Tools: Do They Meet the Needs of Practitioners?.
- [security] Safeguarding DeFi Smart Contracts against Oracle Deviations.
- [security] Verifying Declarative Smart Contracts.
- [security] GPTScan: Detecting Logic Vulnerabilities in Smart Contracts by Combining GPT with Program Analysis | | MyTLDR.
- [security] SmartMark: Software Watermarking Scheme for Smart Contracts.
- [security] AChecker: Statically Detecting Smart Contract Access Control Vulnerabilities | MyTLDR.
- [security] BSHUNTER: Detecting and Tracing Defects of Bitcoin Scripts.
- [security] Demystifying Exploitable Bugs in Smart Contracts.
- [security] Turn the Rudder: A Beacon of Reentrancy Detection for Smart Contracts on Ethereum
- [security] Empirical Review of Automated Analysis Tools on 47,587 Ethereum Smart Contracts.
- [security] sFuzz-An Efficient Adaptive Fuzzer for Solidity Smart Contracts.
- [security] Targeted Greybox Fuzzing with Static Lookahead Analysis.
- [security] Gap between Theory and Practice: An Empirical Study of Security Patches in Solidity.
- [security] Seraph: Enabling Cross-Platform Security Analysis For EVM and WASM Smart Contracts.
- [security] Gigahorse: Thorough, Declarative Decompilation of Smart Contracts.
- [security] VULTRON: Catching Vulnerable Smart Contracts Once and for All.
- [SOSP21] Forerunner: Constraint-based Speculative Transaction Execution for Ethereum | MyTLDR.
- [SOSP17] Algorand: Scaling Byzantine Agreements for Cryptocurrencies.
- [OSDI23] LVMT: An Efficient Authenticated Storage for Blockchain.
- [OSDI21] Finding Consensus Bugs in Ethereum via Multi-transaction Differential Fuzzing.
- [Performance] ContribChain: A Stress-Balanced Blockchain Sharding Protocol with Node Contribution Awareness.
- [Performance] EC-Chain: Cost-Effective Storage Solution for Permissionless Blockchains.
- [Performance] ConWatcher: Towards Adaptive and Label-Efficient Online Smart Contract Analysis in Blockchains.
- [Performance] ExClique: An Express Consensus Algorithm for High-Speed Transaction Process in Blockchains.
- [Performance] LBFT-DAG: a Swift, Leader-driven, DAG-based Consortium Blockchain with Byzantine Fault-tolerance.
- [Performance] AIGC-CM: An Efficient and Scalable Blockchain Solution for AIGC Copyright Management.
- [Performance] Justitia: An Incentive Mechanism Towards the Fairness of Cross-Shard Transactions.
- [application] IPFS in the Fast Lane: Accelerating Record Storage with Optimistic Provide.
- [application] Federated Analytics-Empowered Frequent Pattern Mining for Decentralized Web 3.0 Applications.
- [performance] DEthna: Accurate Ethereum Network Topology Discovery with Marked Transactions.
- [performance] Broker2Earn: Towards Maximizing Broker Revenue and System Liquidity for Sharded Blockchains.
- [Performance] Account Migration across Blockchain Shards using Fine-tuned Lock Mechanism.
- [security] ConFuzz: Towards Large Scale Fuzz Testing of Smart Contracts in Ethereum.
- [security] Latency-First Smart Contract: Overclock the Blockchain for a while.
- [security] A Decentralized Truth Discovery Approach to the Blockchain Oracle Problem.
- [security] Code is the (F)Law: Demystifying and Mitigating Blockchain Inconsistency Attacks Caused by Software Bugs.
- [application] Counter-Collusion Smart Contracts for Watchtowers in Payment Channel Networks.
- [mine] Characterizing Ethereum's Mining Power Decentralization at a Deeper Level.
- [application] ET-DeaL: A P2P Smart Contract-based Secure Energy Trading Scheme for Smart Grid Systems.
- [application] A Solution for State Conflicts of Smart Contract in Interaction with Non-blockchain.
- [application] ChainIDE 2.0: Facilitating Smart Contract Development for Consortium Blockchain.
- [application] EncELC: Hardening and Enriching Ethereum Light Clients with Trusted Enclaves.
- [graph analysis] Understanding ethereum via graph analysis.
- [security] CATALOG: Exploiting Joint Temporal Dependencies for Enhanced Phishing Detection on Ethereum.
- [security] AERO: Enhancing Sharding Blockchain via Deep Reinforcement Learning for Account Migration.
- [security] The Poorest Man in Babylon: A Longitudinal Study of Cryptocurrency Investment Scams.
- [security] Quantitative Runtime Monitoring of Ethereum Transaction Attacks.
- [security] Fully Anonymous Decentralized Identity Supporting Threshold Traceability with Practical Blockchain
- [security] MAP the Blockchain World: A Trustless and Scalable Blockchain Interoperability Protocol for Cross-chain Applications.
- [security] The Poorest Man in Babylon: A Longitudinal Study of Cryptocurrency Investment Scams.
- [security] Linking Souls to Humans: Blockchain Accounts with Credible Anonymity for Web 3.0 Decentralized Identity.
- [security] SigScope: Detecting and Understanding Off-Chain Message Signing-related Vulnerabilities in Decentralized Applications
- [security] Hunting in the Dark Forest: A Pre-trained Model for On-chain Attack Transaction Detection in Web3
- [security] Towards Understanding Crypto-Asset Risks on Ethereum Caused by Key Leakage on the Internet.
- [Finance] DenseFlow: Spotting Cryptocurrency Money Laundering in Ethereum Transaction Graphs.
- [Finance] Unveiling the Paradox of NFT Prosperity.
- [security] Advancing Web 3.0: Making Smart Contracts Smarter on Blockchain.
- [security] Blockchain Censorship
- [security] Identifying Risky Vendors in Cryptocurrency P2P Marketplaces
- [security] ARTEMIS: Detecting Airdrop Hunters in NFT Markets with a Graph Learning System
- [security] Characterizing Ethereum Upgradable Smart Contracts and Their Security Implications.
- [security] ZipZap: Efficient Training of Language Models for Large-Scale Fraud Detection on Blockchain.
- [security] Investigations of Top-Level Domain Name Collisions in Blockchain Naming Services.
- [security] Interface Illusions: Uncovering the Rise of Visual Scams in Cryptocurrency Wallets.
- [measurement] Don't Trust, Verify: The Case of Slashing from a Popular Ethereum Explorer.
- [Finance] Bad Apples: Understanding the Centralized Security Risks in Decentralized Ecosystems.
- [Finance] Ready, Aim, Snipe! Analysis of Sniper Bots and their Impact on the DeFi Ecosystem.
- [Finance] On How Zero-Knowledge Proof Blockchain Mixers Improve, and Worsen User Privacy.
- [Finance] Know Your Transactions: Real-time and Generic Transaction Semantic Representation on Blockchain & Web3 Ecosystem | MyTLDR.
- [security] BERT4ETH: A Pre-trained Transformer for Ethereum Fraud Detection | MyTLDR.
- [Finance] Cyclic Arbitrage in Decentralized Exchanges.
- [security] TTAGN: Temporal Transaction Aggregation Graph Network for Ethereum Phishing Scams Detection.
- [Finance] Towards Understanding Cryptocurrency Derivatives: A Case Study of BitMEX.
- [graph analysis] Temporal Analysis of the Entire Ethereum Blockchain Network.
- [Finance] Detecting and Quantifying Wash Trading on Decentralized Cryptocurrency Exchanges.
- [application] Towards understanding and demystifying bitcoin mixing services.
- [graph analysis] Measurements, Analyses, and Insights on the Entire Ethereum Blockchain Network.
- [graph analysis] Traveling the token world: A graph analysis of Ethereum ERC20 token ecosystem.
- [security] PhishingHook: Catching Phishing Ethereum Smart Contracts leveraging EVM Opcodes.
- [security] Reentrancy Redux: The Evolution of Real-World Reentrancy Attacks on Blockchains.
- [security] Mitigating Reordering Attacks through Fair and Resilient Transaction Dissemination.
- [security] Byzantine Attacks Exploiting Penalties in Ethereum PoS.
- [security] PAROLE: Profitable Arbitrage in Optimistic Rollup with ERC-721 Token Transactions.
- [security] AOAB: Optimal and Fair Ordering of Financial Transactions.
- [security] BFTRAND: Low-Latency Random Number Provider for BFT Smart Contracts.
- [security] SMACS: Smart Contract Access Control Service.
- [security] Data-Driven Model-Based Analysis of the Ethereum Verifier's Dilemma.
- [security] Smart Contracts on the Move.
- [mine] Impact of Geo-Distribution and Mining Pools on Blockchains: A Study of Ethereum.
- [application] FabZK: Supporting Privacy-Preserving, Auditable Smart Contracts in Hyperledger Fabric.
- [verification] Consolidating Smart Contracts with Behavioral Contracts.
- [optimization] SuperStack: Superoptimization of Stack-Bytecode via Greedy, Constraint-Based, and SAT Techniques.
- [security] Behavioral Simulation for Smart Contracts.
- [security] Ethainter: A Smart Contract Security Analyzer for Composite Vulnerabilities.
- [security] Securing Smart Contract with Runtime Validation.
- [security] Cumulus: A Plug-and-Play Long Range Defense System for Proof of Stake Blockchains.
- [security] Revoke: Mitigating Ransomware Attacks against Ethereum Validators.
- [security] n-MVTL Attack: Optimal Transaction Reordering Attack on DeFi.
- [security] When is Slower Block Propagation More Profitable for Large Miners?.
- [security] PrivacyGuard: Enforcing Private Data Usage Control with Blockchain and Off-chain Contract Execution.
- [security] Practical Mutation Testing for Smart Contracts.
- [application] PDFS: Practical Data Feed Service for Smart Contracts.
- [security] The Operational Cost of Ethereum Airdrops.
- [security] Annotary: A Concolic Execution System for Developing Secure Smart Contracts.
- [security] An Efficient Micropayment Channel on Ethereum.
- [security] A Minimal Core Calculus for Solidity Contracts.
- [security] In Code We Trust? - Measuring the Control Flow Immutability of All Smart Contracts Deployed on Ethereum.
- [security] An Empirical Study of Smart Contract Decompilers.
- [security] Automatic Identification of Crash-inducing Smart Contracts.
- [security] Security Code Recommendations for Smart Contract.
- [security] Combine sliced joint graph with graph neural networks for smart contract vulnerability detection.
- [security] When They Go Low: Automated Replacement of Low-level Functions in Ethereum Smart Contracts.
- [security] A Bytecode-based Approach for Smart Contract Classification.
- [security] A Tool to check the Ownership of Solana's Smart Contracts.
- [security] On the use of Petri Nets in Smart Contracts modeling, generation, and verification.
- [security] Analysis Of The Relationship Between Smart Contracts' Categories and Vulnerabilities.
- [security] Goal and Policy Based Code Generation and Deployment of Smart Contracts.
- [security] Understanding Code Reuse in Smart Contracts.
- [security] SMARTSHIELD: Automatic Smart Contract Protection Made Easy.
- [security] EthPloit: From Fuzzing to Efficient Exploit Generation against Smart Contracts.
- [security] Towards Generating Cost-Effective Test-Suite for Ethereum Smart Contract.
- [security] EVM*: From Offline Detection to Online Reinforcement for Ethereum Virtual Machine.
- [security] SmartInspect: solidity smart contract inspector.
- [security] Smart contracts vulnerabilities: a call for blockchain software engineering?.
- [security] The ICO phenomenon and its relationships with Ethereum smart contract environment.
- [security] Smart contracts: security patterns in the Ethereum ecosystem and solidity.
- [application] Under-optimized smart contracts devour your money.
- [Program language] A complete formal semantics of eBPF instruction set architecture for Solana.
- [Program language] VarLifter: Recovering Variables and Types from Bytecode of Solidity Smart Contracts.
- [Program language] Practical Verification of Smart Contracts using Memory Splitting.
- [security] Asparagus: Automated Synthesis of Parametric Gas Upper-bounds for Smart Contracts | MyTLDR.
- [security] Synthesis-powered optimization of smart contracts via data type refactoring | MyTLDR.
- [security] Elipmoc: Advanced Decompilation of Ethereum Smart Contracts.
- [security] A Study of Inline Assembly in Solidity Smart Contracts.
- [security] SigVM: Enabling Event-Driven Execution for Truly Decentralized Smart Contracts.
- [security] Symbolic Value-Flow Static Analysis: Deep, Precise, Complete Modeling of Ethereum Smart Contracts.
- [security] Rich Specifications for Ethereum Smart Contract Verification.
- [security] Pluto: Exposing Vulnerabilities in Inter-Contract Scenarios.
- [security] Precise Static Modelling of Ethereum "Memory".
- [security] Taming Callbacks for Smart Contract Modularity.
- [security] Detecting Nondeterministic Payment Bugs in Ethereum Smart Contracts.
- [security] Safer Smart Contract Programming with Scilla.
- [security] Ethereum's Proposer-Builder Separation: Promises and Realities | MyTLDR.
- [security] The Cloud Strikes Back: Investigating the Decentralization of IPFS.
- [security] A flash(bot) in the pan: measuring maximal extractable value in private pools.
- [security] Challenges in decentralized name management: the case of ENS.
- [measure] Measuring ethereum network peers | MyTLDR.
- [security] analyzing ethereum's contract topology.
- [security] Piecing Together the Jigsaw Puzzle of Transactions on Heterogeneous Blockchain Networks
- [security] Towards Understanding and Analyzing Instant Cryptocurrency Exchanges
- [security] Miracle or Mirage? A Measurement Study of NFT Rug Pulls
- [security] Towards Understanding and Characterizing the Arbitrage Bot Scam In the Wild
- [performance] Strategic Latency Reduction in Blockchain Peer-to-Peer Networks | MyTLDR.
- [security] Characterizing Cryptocurrency-themed Malicious Browser Extensions.
- [performance] Tuxedo: Maximizing Smart Contract computation in PoW Blockchains.
- [security] Trade or Trick? Detecting and Characterizing Scam Tokens on Uniswap Decentralized Exchange.
- [SIGMETRICS2021] Tracking Counterfeit Cryptocurrency End-to-end.
- [SIGMETRICS2021] SADPonzi: Detecting and Characterizing Ponzi Schemes in Ethereum Smart Contracts | MyTLDR.
- [SIGMETRICS2020] Understanding (Mis)Behavior on the EOSIO Blockchain.
- [ACSAC24] Breaking the Privacy Barrier: On the Feasibility of Reorganization Attacks on Ethereum Private Transactions.
- [ACSAC21] SolSaviour: A Defending Framework for Deployed Defective Smart Contracts.
- [ACSAC19] SmarTor: Smarter Tor with Smart Contracts.
- [ACSAC18] Finding The Greedy, Prodigal, and Suicidal Contracts at Scale.
- [ACSAC18] Osiris: Hunting for Integer Bugs in Ethereum Smart Contracts.
- [security] Source Code Obfuscation for Smart Contracts.
- [security] SIF: A Framework for Solidity Contract Instrumentation and Analysis.
- [security] SolAnalyser: A Framework for Analysing and Testing Smart Contracts.
- [security] Penny Wise and Pound Foolish: Quantifying the Risk of Unlimited Approval of ERC20 Tokens on Ethereum | MyTLDR.
- [security] Elysium: Context-Aware Bytecode-Level Patching to Automatically Heal Vulnerable Smart Contracts
- [security] Proxion: Uncovering Hidden Proxy Smart Contracts for Finding Collision Vulnerabilities in Ethereum.
- [security] Depermissioning Web3: a Permissionless Accountable RPC Protocol for Blockchain Networks.
- [security] Fully Decentralized Collection of Attestations for Single-Slot Finality in Ethereum.
- [performance] Hammer: A General Blockchain Evaluation Framework.
- [performance] SecSCS: A User-Centric Secure Smart Camera System Based on Blockchain.
- [security] SG-FCB: A Stackelberg Game-Driven Fair Committee-based Blockchain Consensus Protocol.
- [security] AcBF: A Revocable Blockchain-based Identity Management Enabling Low-Latency Authentication.
- [security] Orbit: A Dynamic Account Allocation Mechanism In Sharding Blockchain System.
- [security] Timed Data Release using Smart Contracts.
- [storage] GeckoDAG: Towards A Lightweight DAG-based Blockchain via Reducing Data Redundancy
- [security] Detecting Flash Loan Based Attacks in Ethereum
- [security] Towards Decentralized Adaptive Control of Cryptocurrency Liquidity via Auction.
- [application] A Game of NFTs: Characterizing NFT Wash Trading in the Ethereum Blockchain.
- [security] Smart Contract Parallel Execution with Fine-Grained State Accesses | MyTLDR.
- [security] Fair and Efficient Gossip in Hyperledger Fabri.
- [security] TinyEVM: Off-Chain Smart Contracts on Low-Power IoT Devices.
- [security] DataEther: Data Exploration Framework For Ethereum.
- [security] Read-Uncommitted Transactions for Smart Contract Performance.
- [security] MPCSToken: Smart Contract Enabled Fault-Tolerant Incentivisation for Mobile P2P Crowd Services.
- [POPL22] SolType: Refinement Types for Arithmetic Overflow in Solidity.
- [POPL18] Online detection of effectively callback free objects with applications to smart contracts.
- [POPL18] Vandal: A Scalable Security Analysis Framework for Smart Contracts.
- [TOSEM23] TokenAware: Accurate and Efficient Bookkeeping Recognition for Token Smart Contracts.
- [TOSEM25] PonziHunter: Hunting Ethereum Ponzi Contract via Static Analysis and Contrastive Learning on the Bytecode Level.
- [TOSEM25] Characterizing Smart Contract Evolution.
- [TOSEM25] Evaluating Explanations Needs in Blockchain Smart Contracts to Reconcile Surprises.
- [TOSEM] Automating Comment Generation for Smart Contracts from Bytecode.
- [TOSEM] FunFuzz: A Function-oriented Fuzzer for Smart Contract Vulnerability Detection with High Effectiveness and Efficiency.
- [TOSEM] CLFuzz: Vulnerability Detection of Cryptographic Algorithm Implementation via Semantic-Aware Fuzzing.
- [TOSEM23] Semantic-enriched code knowledge graph to reveal unknowns in smart contract code reuse.
- [TOSEM] sGuard+: Machine Learning Guided Rule-based AutomatedVulnerability Repair on Smart Contracts..
- [TOSEM] Is my transaction done yet? An empirical study of transaction processing times in the Ethereum blockchain platform.
- [TOSEM] Securing the Ethereum from Smart Ponzi Schemes: Identification Using Static Features.
- [TOSEM] Pied-Piper: Revealing the Backdoor Threats in Ethereum ERC Token Contracts.
- [TOSEM] Time-travel Investigation: Toward Building a Scalable Attack Detection Framework on Ethereum.
- [TOSEM] Developing Cost-Effective Blockchain-Powered Applications: A Case Study of the Gas Usage of Smart Contract Transactions in the Ethereum Blockchain Platform.
- [TOSEM] Why Do Smart Contracts Self-Destruct? Investigating the Selfdestruct Function on Ethereum.
- [TSE25] Understanding Security Issues in the DAO Governance Process.
- [TSE25] Enhanced Smart Contract Vulnerability Detection via Graph Neural Networks: Achieving High Accuracy and Efficiency.
- [TSE25] NumScout: Unveiling Numerical Defects in Smart Contracts using LLM-Pruning Symbolic Execution
- [TSE25] SmartOracle: Generating Smart Contract Oracle via Fine-Grained Invariant Detection.
- [TSE25] SmartUpdater: Enabling Transparent, Automated, and Secure Maintenance of Stateful Smart Contracts.
- [TSE25] Understanding Security Issues in the DAO Governance Process.
- [TSE24] Unity is Strength: Enhancing Precision in Reentrancy Vulnerability Detection of Smart Contract Analysis Tools.
- [TSE24] Unearthing Gas-Wasting Code Smells in Smart Contracts with Large Language Models.
- [TSE24] SCAnoGenerator: Automatic Anomaly Injection for Ethereum Smart Contracts.
- [TSE24] ContractCheck: Checking Ethereum Smart Contracts in Fine-Grained Level.
- [TSE23] Self-Admitted Technical Debt in Ethereum Smart Contracts: A Large-Scale Exploratory Study
- [TSE23] Combatting Front-Running in Smart Contracts: Attack Mining, Benchmark Construction and Vulnerability Detector Evaluation.
- [TSE23] CRPWarner: Warning the Risk of Contract-related Rug Pull in DeFi Smart Contracts.
- [TSE21] Aroc: An Automatic Repair Framework for On-Chain Smart Contracts.
- [TSE] VulHunter: Hunting Vulnerable Smart Contracts at EVM Bytecode-Level via Multiple Instance Learning.
- [TSE] Large-Scale Empirical Study of Inline Assembly on 7.6 Million Ethereum Smart Contracts.
- [TSE] Demystifying Random Number in Ethereum Smart Contract: Taxonomy, Vulnerability Identification, and Attack Detection
- [TSE] DEFECTCHECKER: Automated Smart Contract Defect Detection by Analyzing EVM Bytecode.
- [TSE] Checking smart contracts with structural code embedding.
- [TSE] Code Cloning in Smart Contracts on the Ethereum Platform: An Extended Replication Study.
- [TSE] Defining smart contract defects on Ethereum.
- [TSE] Pluto: Exposing Vulnerabilities in Inter-Contract Scenarios.
- [TSE] Smart Contract Development: Challenges and Opportunities.
- [EMSE25] UPC sentinel: An Accurate Approach for Detecting Upgradeability Proxy Contracts in Ethereum.
- [EMSE24] A Large-Scale Exploratory Study on the Proxy Pattern in Ethereum.
- [TIFS25] Detecting Reentrancy Vulnerabilities for Solidity Smart Contracts with Contract Standards-Based Rules.
- [TIFS25] Across-Platform Detection of Malicious Cryptocurrency Accounts via Interaction Feature Learning.
- [TIFS25] Secure Optimizations on Ethereum Bytecode Jump-Free Sequences.
- [TIFS24] 2DynEthNet: A Two-Dimensional Streaming Framework for Ethereum Phishing Scam Detection.
- [TIFS24] Bringing Smart Contract Confidentiality via Trusted Hardware: Fact and Fiction.
- [TIFS24] Blockchain-based Convert Communication: A Detection Attack and Efficient Improvement.
- [TIFS24] Who Stole My NFT? Investigating Web3 NFT Phishing Scams on Ethereum.
- [TIFS24] Profitability Analysis of Time-Restricted Double-Spending Attack on PoW-based Large Scale Blockchains with the Aid of Multiple Attacks.
- [TIFS24] Proof of Finalization: A Self-Fulfilling Function of Blockchain.
- [TIFS24] Fishing for Fraudsters: Uncovering Ethereum Phishing Gangs With Blockchain Data.
- [TIFS23] ExGen: Cross-platform, Automated Exploit Generation for Smart Contract Vulnerabilities.
- [TIFS23] Black Swan in Blockchain: Micro Analysis of Natural Forking.
- [TIFS23] Correct-by-Design Interacting Smart Contracts and a Systematic Approach for Verifying ERC20 and ERC721 Contracts With VeriSolid.
- [TIFS23] Combatting Front-Running in Smart Contracts: Attack Mining, Benchmark Construction and Vulnerability Detector Evaluation.
- [TIFS23] Fishing for Fraudsters: Uncovering Ethereum Phishing Gangs With Blockchain Data.
- [TIFS23] Rethinking Smart Contract Fuzzing: Fuzzing With Invocation Ordering and Important Branch Revisiting.
- [TIFS23] EVM-Shield: In-Contract State Access Control for Fast Vulnerability Detection and Prevention.
- [TIFS23] Towards Understanding Asset Flows in Crypto Money Laundering Through the Lenses of Ethereum Heists.
- [TIFS23] sChain: An Efficient and Secure Solution for Improving Blockchain Storage.
- [TIFS23] Breaking the Anonymity of Ethereum Mixing Services Using Graph Feature Learning.
- [TIFS22] Behavior-aware Account De-anonymization on Ethereum Interaction Graph.
- [TIFS22] TxT: Real-Time Transaction Encapsulation for Ethereum Smart Contracts.
- [TIFS21] Hunting Vulnerable Smart Contracts via Graph Embedding Based Bytecode Matching.
- [TIFS22] Rethinking Smart Contract Fuzzing: Fuzzing With Invocation Ordering and Important Branch Revisiting.
- [TDSC25] Uncovering NFT Domain-Specific Defects on Smart Contract Bytecode.
- [TDSC25] SmartTrans: Advanced Similarity Analysis for Detecting Vulnerabilities in Ethereum Smart Contracts
- [TDSC25] A Moving Target DDoS Defense Approach in Consortium Blockchain
- [TDSC25] Multi-Signature and Game Based Blockchain Interoperability Oracle.
- [TDSC24] HDWSA2: A Secure Hierarchical Deterministic Wallet Supporting Stealth Address and Signature Aggregation.
- [TDSC] MFGSCOPE: A Lightweight Framework for Efficient Graph-based Analysis on Blockchain.
- [TDSC] DeFiRanger: Detecting DeFi Price Manipulation Attacks.
- [TDSC] Highly Available Blockchain Nodes With N-Version Design.
- [TDSC] Correct-by-Design Interacting Smart Contracts and a Systematic Approach for Verifying ERC20 and ERC721 Contracts With VeriSolid.
- [TDSC] Oracle-Supported Dynamic Exploit Generation for Smart Contracts.
- [TDSC] Obfuscating verifiable Random Functions for Proof-of-Stake Blockchains.
- [TDSC] Correct-by-Design Interacting Smart Contracts and a Systematic Approach for Verifying ERC20 and ERC721 Contracts With VeriSolid.
- [TDSC] ExGen: Cross-platform, Automated Exploit Generation for Smart Contract Vulnerabilities.
- [POMACS25] The Last Survivor of PoS Pools: Staker's Dilemma.
- [TC25] Tangram: Enabling Efficient and Balanced Dynamic Storage Extension on Sharding Blockchain Systems.
- [TON25] One Model Fits All Nodes: Neuron Activation Pattern Analysis Based Attack Traffic Detection Framework for P2P Networks.
- [PPoPP25] Crystality: A Programming Model for Smart Contracts on Parallel EVMs
- [AAAI24] Unveiling the Risks of NFT Promotion Scams.
- [IEEE TR24] Test Case Generation for Ethereum Smart Contracts Based on Cross-Contract Data Flow Analysis.
- [TPDS24] SPARROW: Expediting Smart Contract Execution for Blockchain Sharding via Inter-shard Caching.
- [ICDE25] Know Your Account: Double Graph Inference-based Account De-anonymization on Ethereum.
- [ICDE25] MEST: An Efficient Authenticated Secondary Index in Blockchain Systems.
- [SC24] Toward High-Performance Blockchain System by Blurring the Line between Ordering and Execution.
- [CACM24] A Brief History of Blockchain Interoperability.
- [arxiv] DogeFuzz: A Simple Yet Efficient Grey-box Fuzzer for Ethereum Smart Contracts.
- [CACM24] Transaction Fee Mechanism Design.
- [arxiv] Large Language Models for Blockchain Security: A Systematic Literature Review.
- [PPoPP23] Block-STM: Scaling Blockchain Execution by Turning Ordering Curse to a Performance Blessing.
- [TC24] GFBE: A Generalized and Fine-Grained Blockchain Evaluation Framework.
- [TC24] BlockCompass: A Benchmarking Platform for Blockchain Performance.
- [TC21] Precise Dynamic Symbolic Execution for Nonuniform Data Access in Smart Contracts.
- [FM23] Formal and Executable Semantics of the Ethereum Virtual Machine in Dafny.
- [arxiv] DISL: Fueling Research with A Large Dataset of Solidity Smart Contracts.
- [ASPLOS22] Who Goes First? Detecting Go Concurrency Bugs via Message Reordering.
- [DASFAA24] DS-Ponzi: Anti-jamming Detection of Ponzi Scheme on Ethereum Utilizing Dynamic-Static Features of Smart Contract Codes.
- [TKDE24] Unravelling Token Ecosystem of EOSIO Blockchain.
- [WINE2023] Routing MEV in Constant Function Market Makers.
- [TCAD2023] A Semantic-Integrated LSM-Tree Based Key-Value Storage Engine for Blockchain Systems.
- [ISCA23] An Algorithm and Architecture Co-design for Accelerating Smart Contracts in Blockchain.
- [SODA23] Foundations of Transaction Fee Mechanism Design.
- [IEEE Computer] The Multibillion Dollar Software Supply Chain of Ethereum.
- [ACM DTL] Chaos Engineering of Ethereum Blockchain Clients In ACM Distributed Ledger Technologies: Research and Practice.
- [SIGKDD25] TEMPER: Capturing Consistent and Fluctuating TEMPoral User Behaviour for EtheReum Phishing Scam Detection.
- [SIGKDD24] BitLINK: Temporal Linkage of Address Clusters in Bitcoin Blockchain.
- [SIGKDD23] Demystifying Fraudulent Transactions and Illicit Nodes in the Bitcoin Network for Financial Forensics.
- [SIGKDD23] Diga: Guided Diffusion Model for Graph Recovery in Anti-Money Laundering.
- [ICDE24] MuFuzz: Sequence-Aware Mutation and Seed Mask Guidance for Blockchain Smart Contract Fuzzing.
- [ICDE23] Scaling Blockchain Consensus via a Robust Shared Mempool.
- [SC23] FISCO-BCOS: An Enterprise-grade Permissioned Blockchain System with High-performance.
- [JSAC22] Detecting Arbitrage on Ethereum Through Feature Fusion and Positive-Unlabeled Learning.
- [TPDS24] MoltDB: Accelerating Blockchain via Ancient State Segregation.
- [TPDS24] PaVM: A Parallel Virtual Machine for Smart Contract Execution and Validation.
- [TPDS22] Securing Deployed Smart Contracts and DeFi With Distributed TEE Cluster.
- [TPDS] SmartVM: A Smart Contract Virtual Machine for Fast On-Chain DNN Computations.
- [CHI25] Of Secrets and Seedphrases: Conceptual Misunderstandings and Security Challenges for Seed Phrase Management among Cryptocurrency Users.
- [CHI24] Don't put all your eggs in one basket": How Cryptocurrency Users Choose and Secure Their Wallets.
- [CHI23] Code Will Tell: Visual Identification of Ponzi Schemes on Ethereum.
- [CHI22] Impact and User Perception of Sandwich Attacks in the DeFi Ecosystem.
- [CHI21] Effect of the Gas Price Surges on User Activity in the DAOs of the Ethereum Blockchain.
- [POMACS2021] Trade or Trick? Detecting and Characterizing Scam Tokens on Uniswap Decentralized Exchange.
- [HPCA20] BBS: Micro-Architecture Benchmarking Blockchain Systems through Machine Learning and Fuzzy Set.
- [VLDB24] A Comprehensive Outlook for Analyzing and Enhancing the Performance of Blockchain Platforms.
- [VLDB24] Practical Declarative Smart Contracts Optimization.
- [VLDB24] CMixing: An Efficient Coin Mixing Platform to Enhance Anonymity in Cryptocurrency Transactions.
- [VLDB24] FlexChain: An Elastic Disaggregated Blockchain.
- [VLDB24] L2chain: Towards High-performance, Confidential and Secure Layer-2 Blockchain Solution for Decentralized Applications.
- [VLDB24] Spectrum: Speedy and Strictly-Deterministic Smart Contract Transactions for Blockchain Ledgers.
- [VLDB23] ChainDash: An Ad-Hoc Blockchain Data Analytics System.
- [VLDB23] Auto-Tuning with Reinforcement Learning for Permissioned Blockchain Systems.
- [VLDB22] Hybrid Blockchain Database Systems: Design and Performance.
- [AsiaCCS22] Eliminating Sandwich Attacks with the Help of Game Theory.
- [TC21] Precise Dynamic Symbolic Execution for Nonuniform Data Access in Smart Contracts.
- [sigmod23] When Private Blockchain Meets Deterministic Database.
- [sigmod23] ChainKV: A Semantics-Aware Key-Value Store for Ethereum System.
- [sigmod23] LETUS: A Log-Structured Efficient Trusted Universal BlockChain Storage.
- [sigmod21] Why Do My Blockchain Transactions Fail? A Study of Hyperledger Fabric.
- [ICPC] A multi-modal transformer-based code summarization approach for smart contracts.
- [ICPC22] An Empirical Investigation on the Trade-off between Smart Contract Readability and Gas Consumption.
- [ICPC22] Peculiar: Smart Contract Vulnerability Detection Based on Crucial Data Flow Graph and Pre-training Techniques.
- [ICPC20] Inheritance software metrics on smart contracts.
- [ICPC19] Recommending Differentiated Code to Support Smart Contract Update.
- [ICPC19] Enabling clone detection for ethereum via smart contract birthmarks.
- [WETSEB18] SmartCheck: Static Analysis of Ethereum Smart Contracts.
- [EDCC18] Runtime Verification of Ethereum Smart Contracts.
- [ICSCA18] Formal Modeling and Verification of Smart Contracts.
- [SRDS20] Protect Your Smart Contract Against Unfair Payment.
- [SRDS20] TZ4Fabric: Executing Smart Contracts with ARM TrustZone (Practical Experience Report).
- [IJCAI20] Smart Contract Vulnerability Detection Using Graph Neural Networks.
- [ISSRE2019] MPro: Combining Static and Symbolic Analysis for Scalable Testing of Smart Contract.
- [CPP2021] Extracting Smart Contracts Tested and Verified in Coq.
- [SAC2022] Model checking of vulnerabilities in smart contracts: a solidity-to-CPN approach.
- [Eurosp23] EF/CF: High Performance Smart Contract Fuzzing for Exploit Generation.
- [CSFW] Kevm: A complete formal semantics of the ethereum virtual machine.
- [DAC20] BPU: A blockchain processing unit for accelerated smart contract execution.
- [TOPLAS20] Obsidian: Typestate and Assets for Safer Blockchain Programming.
This list is released into the public domain.