2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER) 2019
DOI: 10.1109/saner.2019.8668038
|View full text |Cite
|
Sign up to set email alerts
|

EVM: From Offline Detection to Online Reinforcement for Ethereum Virtual Machine

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
23
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 34 publications
(23 citation statements)
references
References 6 publications
0
23
0
Order By: Relevance
“…Fourth, P1 and Sereum have different sets of false positives because they apply different techniques [30]. EVM * inserts protection code into EVM to prevent integer overflow bugs and timestamp bugs from being exploited [35]. However, the extension of EVM * to support other attacks is not easy because EVM should be modified by inserting new protection code, which is technically challenging.…”
Section: A Online Approachesmentioning
confidence: 99%
See 2 more Smart Citations
“…Fourth, P1 and Sereum have different sets of false positives because they apply different techniques [30]. EVM * inserts protection code into EVM to prevent integer overflow bugs and timestamp bugs from being exploited [35]. However, the extension of EVM * to support other attacks is not easy because EVM should be modified by inserting new protection code, which is technically challenging.…”
Section: A Online Approachesmentioning
confidence: 99%
“…However, the extension of EVM * to support other attacks is not easy because EVM should be modified by inserting new protection code, which is technically challenging. Besides, EVM * lacks comprehensive evaluations about its effectiveness and efficiency; instead, EVM * is tested by just 10 selected smart contracts [35].…”
Section: A Online Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…It primarily simulates the operations of compiled bytecodes to help users optimize smart contract and understand how EVM and smart contract work, which covers 88.2% of the codes. Fuchen Ma, Ying Fu et al [22] presents a method for the problem of contract code vulnerability detection by strengthening EVM. EVM will automatically stop unsafe transactions to prevent economical losses, but the types of covered errors are limited.…”
Section: Related Workmentioning
confidence: 99%
“…Despite all the security enhancements and security tools [7], [8], blockchain still faces challenges to cope with various pernicious attacks [9]. A range of attacks are constantly initiated to obstruct the natural flow or even fully destroy the network [10].…”
Section: Introductionmentioning
confidence: 99%