[1] SZABO N.Formalizing and securing relationships on public networks[J].First Monday,1997,2(9):1-19. [2] MEHAR M I,SHIER C L,GIAMBATTISTA A,et al.Understanding a revolutionary and flawed grand experiment in blockchain[J].Journal of Cases on Information Technology,2019,21(1):19-32. [3] WU Xuchuan,LIU Xue.Analysis and thinking of The DAO attack[J].Financial Perspectives Journal,2016(7):19-24.(in Chinese) 伍旭川,刘学.The DAO被攻击事件分析与思考[J].金融纵横,2016(7):19-24. [4] Solidity documentation[EB/OL].[2019-11-20].https://solidity.readthedoc.io. [5] BOCEK T,STILLER B.Smart contracts-blockchains in the wings[M]//LINNHOFF-POPIEN C,SCHNEIDER R,ZADDACH M.Digital marketplaces unleashed.Berlin,Germany:Springer,2017:169-184. [6] Formal methods[EB/OL].[2019-11-20].http://en.wikipedia.orgi/Formal_methods. [7] ZAKI M H,TAHAR S,BOIS G.Formal verification of analog and mixed signal designs:a survey[J].Microelectronics Journal,2008,39(12):1395-1404. [8] MA Ang,PAN Xiao,WU Lei,et al.A survey of the basic technology and application of block chain[J].Journal of Information Security Research,2017,3(11):968-980.(in Chinese) 马昂,潘晓,吴雷,等.区块链技术基础及应用研究综述[J].信息安全研究,2017,3(11):968-980. [9] BERENTSEN A.Aleksander Berentsen recommends "bitcoin:a peer-to-peer electronic cash system" by Satoshi Nakamoto[M]//FREY B S,SCHALTEGGER C A.21st century economics.Berlin,Germany:Springer,2019:7-8. [10] BUTERIN V.A next-generation smart contract and decentralized application platform[EB/OL].[2019-11-20].https://www.mendeley.com/catalogue/7f15213c-fdfa-3247-8f64-5997b917c898/. [11] BURROWS M,ABADI M,NEEDHAM R.A logic of authentication[J].ACM SIGOPS Operating Systems Review,1989,23(5):1-13. [12] MAJUMDAR R.Paul Ammann and Jeff Offutt introduction to software testing[J].The Computer Journal,2010,53(5):615-616. [13] BAUDET M.Deciding security of protocols against off-line guessing attacks[C]//Proceedings of the 12th Conference on Computer and Communication Security.New York,USA:ACM Press,2005:16-25. [14] HU Kai,BAI Xiaomin,GAO Lingchao,et al.Formal verification method of smart contract[J].Journal of Information Security Research,2016,2(12):1080-1089.(in Chinese) 胡凯,白晓敏,高灵超,等.智能合约的形式化验证方法[J].信息安全研究,2016,2(12):1080-1089. [15] BHARGAVAN K,SWAMY N,ZANELLA-BÉGUELIN S,et al.Formal verification of smart contracts[C]//Proceedings of 2016 ACM Workshop on Programming Languages and Analysis for Security.New York,USA:ACM Press,2016:1-10. [16] BLANCHET B.A computationally sound mechanized prover for security protocols[J].IEEE Transactions on Dependable and Secure Computing,2008,5(4):193-207. [17] PAULSON L C.The inductive approach to verifying cryptographic protocols[J].Journal of Computer Security,1998,6(1/2):85-128. [18] ABADI M,FOURNET C.Mobile values,new names,and secure communication[C]//Proceedings of the 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages.New York,USA:ACM Press,2001:1-13. [19] ABADI M,CORTIER V.Deciding knowledge in security protocols under equational theories[J].Theoretical Computer Science,2006,367(1/2):2-32. [20] XIONG Yan,SU Cheng,HUANG Wenchao,et al.SmartVerif:push the limit of automation capability of verifying security protocols by dynamic strategies[C]//Proceedings of the 29th USENIX Security Symposium.Boston,USA:USENIX Association,2020:1-5. |