2021 IEEE International Conference on Software Maintenance and Evolution (ICSME) 2021
DOI: 10.1109/icsme52107.2021.00009
|View full text |Cite
|
Sign up to set email alerts
|

SmartGift: Learning to Generate Practical Inputs for Testing Smart Contracts

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 37 publications
0
7
0
Order By: Relevance
“…[32], [37]- [39], [42], [44], [45], [49] ULM Unidirectional Language Model A left-to-right language modeling task, asking the model to guess one masked token in an instance by only considering the leftward tokens (i.e., the tokens preceding the masked one).…”
Section: A Transformer Modelmentioning
confidence: 99%
“…[32], [37]- [39], [42], [44], [45], [49] ULM Unidirectional Language Model A left-to-right language modeling task, asking the model to guess one masked token in an instance by only considering the leftward tokens (i.e., the tokens preceding the masked one).…”
Section: A Transformer Modelmentioning
confidence: 99%
“…If the gas allocated by the sender contract is insufficient to execute a costly fallback function, it sends an out-of-gas exception to the sender contract. If the sender does not check the exception properly, it will not realize the unsuccessful transfer, resulting in a gasless send [102,148,239].…”
Section: Division-by-zero Guardingmentioning
confidence: 99%
“…If a user-provided (nontrusted) value flows into the contract address invoked through a delegatecall, a nontrusted contract could be invoked, resulting in a high-risk security vulnerability called tainted or dangerous delegatecall [14,38,102,216,239]. This can be addressed by establishing guarding of delegatecall, which asserts that functions with delegatecall are either private or accessible from public functions through specific checks only and if the target address in a delegatecall is derived from user-provided input, it is checked against trusted contract addresses [52], and it explicitly flows into arguments of a delegatecall instruction [93].…”
Section: Information Flow-relatedmentioning
confidence: 99%
See 1 more Smart Citation
“…In the papers [17], [19], [29], [30], [31], [34], [45], and [61], a newer method called mutation testing was introduced for the specific purpose of testing smart contracts. In addition, in the papers [20], [21], [23], [24], [26], [41], [42], [48], [53], [54], [55], and [56], another method called fuzz testing was introduced as well.…”
Section: ) Testing Data Challengesmentioning
confidence: 99%