2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS) 2020
DOI: 10.1109/icdcs47774.2020.00116
|View full text |Cite
|
Sign up to set email alerts
|

SafePay on Ethereum: A Framework For Detecting Unfair Payments in Smart Contracts

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…Sereum [133], ECFChecker [78], TokenScope [55], EasyFlow [72], TxSpector [169], and EthScope [162] are the threat mitigation solutions that read smart contract information from the chain data, i.e., stored copy of the blockchain. Some threat mitigation solutions use a combination of bytecode and source code as an input, e.g., Securify 6 [151], SAFEVM [23], Gastap [24], SafePay [103], and CPN [60]. Other solutions, in addition to a smart contract, also take a set of manual specifications as an input, as we see it in FSolidM [116], Model-Checking [122], VeriSolid [117], solc-verify [79], BitML [31], SmartPulse [143], ESCORT [111], and ContractLarva [61].…”
Section: Data Mappingmentioning
confidence: 99%
See 1 more Smart Citation
“…Sereum [133], ECFChecker [78], TokenScope [55], EasyFlow [72], TxSpector [169], and EthScope [162] are the threat mitigation solutions that read smart contract information from the chain data, i.e., stored copy of the blockchain. Some threat mitigation solutions use a combination of bytecode and source code as an input, e.g., Securify 6 [151], SAFEVM [23], Gastap [24], SafePay [103], and CPN [60]. Other solutions, in addition to a smart contract, also take a set of manual specifications as an input, as we see it in FSolidM [116], Model-Checking [122], VeriSolid [117], solc-verify [79], BitML [31], SmartPulse [143], ESCORT [111], and ContractLarva [61].…”
Section: Data Mappingmentioning
confidence: 99%
“…Some symbolic execution solutions use certain augmentations to the basic design by adding additional features. Oyente [112], teEther [97], SafePay [103], Artemis [153], and DEFECTCHECKER [52] process the smart contract to build a CFG. Another augmentation observed in symbolic execution solutions is the production of exploits (sample inputs revealing vulnerabilities), as can be seen in teEther [97] and EthBMC [68].…”
Section: Symbolic Execution Workflowmentioning
confidence: 99%