Computer Science ›› 2021, Vol. 48 ›› Issue (2): 289-294.doi: 10.11896/jsjkx.200500105
• Information Security • Previous Articles Next Articles
CHEN Zi-min1, LU Yi-wen2, GUO Yan1
CLC Number:
[1] ATZEI N,BARTOLETTI M,CIMOLI T.A survey of attacks on ethereum smart contracts (sok)[C]//International Confe-rence on Principles of Security and Trust.Springer,Berlin,Heidelberg,2017:164-186. [2] CHEN W,ZHENG Z,CUI J,et al.Detecting ponzi schemes on ethereum:Towards healthier blockchain technology[C]//Proceedings of the 2018 World Wide Web Conference.2018:1409-1418. [3] CHEN T,LI X,WANG Y,et al.An adaptive gas cost mechanism for ethereum to defend against under-priced dos attacks[C]//International Conference on Information Security Practice and Experience.Springer,Cham,2017:3-24. [4] LEE X T,KHAN A,SEN GUPTA S,et al.Measurements,analyses,and insights on the entire ethereum blockchain network[C]//Proceedings of The Web Conference 2020.2020:155-166. [5] KIFFER L,LEVIN D,MISLOVE A.Stick a fork in it:Analyzing the ethereum network partition[C]//Proceedings of the 16th ACM Workshop on Hot Topics in Networks.2017:94-100. [6] NIKOLI I,KOLLURI A,SERGEY I,et al.Finding the greedy,prodigal,and suicidal contracts at scale[C]//Proceedings of the 34th Annual Computer Security Applications Conference.2018:653-663. [7] BARTOLETTI,M,LANDE S,POMPIANU L,et al.A general framework for blockchain analytics[C]//1st Workshop on Sca-lable and Resilient Infrastructures for Distributed Ledgers.ACM,2017. [8] Google.blockchain-etl/ethereum-etl[EB/OL].https://github.com/ blockchain-etl/ethereumetl.2019. [9] ZHENG W,ZHENG Z,DAI H N,et al.Xblock-EOS:Extracting and exploring blockchain data from EOSIO[J].arXiv:2003.11967,2020. [10] BISTARELLI S,MAZZANTE G,MICHELETTI M,et al.Analysis of ethereum smart contracts and opcodes[C]//International Conference on Advanced Information Networking and Applications.Springer,Cham,2019:546-558. [11] ETHERSCAN.Etherscan[EB/OL].https://cn.Etherscan.com/. [12] BARTOLETTI M,CARTA S,CIMOLI T,et al.Dissecting Ponzi schemes on Ethereum:identification,analysis,and impact[J].Future Generation Computer Systems,2020,102:259-277. [13] CHEN T,LI Z,ZHANG Y,et al.Dataether:Data exploration framework for ethereum[C]//2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS).IEEE,2019:1369-1380. [14] CHEN T,ZHU Y,LI Z,et al.Understanding ethereum viagraph analysis[C]//IEEE Conference on Computer Communications.IEEE,2018:1484-1492. [15] ETHEREUM F.Geth v1.9.0[EB/OL].https://blog.ethereum.org/2019/07/10/geth-v1-9-0/. [16] BOWE S,GABIZON A,GREEN M D.A multi-party protocol for constructing the public parameters of the Pinocchio zk-SNARK[C]//International Conference on Financial Cryptography and Data Security.Springer,Berlin,Heidelberg,2018:64-77. [17] FEIGE U,FIAT A,SHAMIR A.Zero-knowledge proofs ofidentity[J].Journal of cryptology,1988,1(2):77-94. [18] TETHER.Tether[EB/OL].https://tether.to/.2020. |
[1] | WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317. |
[2] | HUANG Song, DU Jin-hu, WANG Xing-ya, SUN Jin-lei. Survey of Ethereum Smart Contract Fuzzing Technology Research [J]. Computer Science, 2022, 49(8): 294-305. |
[3] | FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461. |
[4] | GAO Jian-bo, ZHANG Jia-shuo, LI Qing-shan, CHEN Zhong. RegLang:A Smart Contract Programming Language for Regulation [J]. Computer Science, 2022, 49(6A): 462-468. |
[5] | WEI Hong-ru, LI Si-yue, GUO Yong-hao. Secret Reconstruction Protocol Based on Smart Contract [J]. Computer Science, 2022, 49(6A): 469-473. |
[6] | ZHANG Ying-li, MA Jia-li, LIU Zi-ang, LIU Xin, ZHOU Rui. Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts [J]. Computer Science, 2022, 49(3): 52-61. |
[7] | LIU Feng, ZHANG Jia-hao, ZHOU Jun-jie, LI Mu, KONG De-li, YANG Jie, QI Jia-yin, ZHOU Ai-min. Novel Hash-time-lock-contract Based Cross-chain Token Swap Mechanism of Blockchain [J]. Computer Science, 2022, 49(1): 336-344. |
[8] | GUO Xian, WANG Yu-yue, FENG Tao, CAO Lai-cheng, JIANG Yong-bo, ZHANG Di. Blockchain-based Role-Delegation Access Control for Industrial Control System [J]. Computer Science, 2021, 48(9): 306-316. |
[9] | WANG Xiang-yu, YANG Ting. Routing Directory Server Defined by Smart Contract [J]. Computer Science, 2021, 48(6A): 504-508. |
[10] | GUO Shang-tong, WANG Rui-jin, ZHANG Feng-li. Summary of Principle and Application of Blockchain [J]. Computer Science, 2021, 48(2): 271-281. |
[11] | DAI Chuang-chuang, LUAN Hai-jing, YANG Xue-ying, GUO Xiao-bing, LU Zhong-hua, NIU Bei-fang. Overview of Blockchain Technology [J]. Computer Science, 2021, 48(11A): 500-508. |
[12] | LING Fei, CHEN Shi-ping. Shared Digital Credits Management Mechanism of Enterprise Alliance Based on Blockchain [J]. Computer Science, 2021, 48(11A): 533-539. |
[13] | CHEN Ying-ren, GUO Ying-nan, GUO Xiang, NI Yi-tao, CHEN Xing. Web Page Wrapper Adaptation Based on Feature Similarity Calculation [J]. Computer Science, 2021, 48(11A): 218-224. |
[14] | WANG Hui, CHEN Bo, LIU Yu-xiang. Research on Personnel File Management System Based on Blockchain [J]. Computer Science, 2021, 48(11A): 713-718. |
[15] | TU Liang-qiong, SUN Xiao-bing, ZHANG Jia-le, CAI Jie, LI Bin, BO Li-li. Survey of Vulnerability Detection Tools for Smart Contracts [J]. Computer Science, 2021, 48(11): 79-88. |
|