[1] YEUNG K.Regulation by blockchain:the emerging battle for supremacy between the code of law and code as law[J].The Modern Law Review,2019,82(2):207-239. [2] 高健博,张家硕,李青山,等.RegLang:一种面向监管的智能合约编程语言[J].计算机科学,2022,49(S1):462-468. GAO J B,ZHANG J S,LI Q S,et al.RegLang:a smart contract programming language for regulation[J].Computer Science,2022,49(S1):462-468.(in Chinese) [3] HAINES F,GURNEY D.The shadows of the law:contemporary approaches to regulation and the problem of regulatory conflict[J].Law & Policy,2003,25(4):353-380. [4] 李有,程金华.行政、司法与金融规制冲突:对金融借款利率上限的实证研究[J].交大法学,2020,11(3):121-142. LI Y,CHENG J H.Conflicts of administrative and judicial powers in Chinese financial regulatory regime:an empirical study on the interest rate ceiling of financial borrowings[J].SJTU Law Review,2020,11(3):121-142.(in Chinese) [5] 刘乃梁.银行业反垄断规制的冲突及其协调[J].法商研究,2019,36(1):43-53. LIU N L.The conflict and coordination of the anti-monopoly regulation in banking industry[J].Studies in Law and Business,2019,36(1):43-53.(in Chinese) [6] 张亮,刘百祥,张如意,等.区块链技术综述[J].计算机工程,2019,45(5):1-12. ZHANG L,LIU B X,ZHANG R Y,et al.Overview of blockchain technology[J].Computer Engineering,2019,45(5):1-12.(in Chinese) [7] 张健,张超,玄跻峰,等.程序分析研究进展[J].软件学报,2019,30(1):80-109. ZHANG J,ZHANG C,XUAN J F,et al.Recent progress in program analysis[J].Journal of Software,2019,30(1):80-109.(in Chinese) [8] 张林,曾庆凯.软件安全漏洞的静态检测技术[J].计算机工程,2008,34(12):157-159. ZHANG L,ZENG Q K.Static detecting techniques of software security flaws[J].Computer Engineering,2008,34(12):157-159.(in Chinese) [9] 陈建敏,舒辉,熊小兵.基于符号化执行的Fuzzing测试方法[J].计算机工程,2009,35(21):33-35. CHEN J M,SHU H,XIONG X B.Fuzzing test approach based on symbolic execution[J].Computer Engineering,2009,35(21):33-35.(in Chinese) [10] ATZEI N,BARTOLETTI M,CIMOLI T.A survey of attacks on Ethereum smart contracts[C]//Proceedings of International Conference on Principles of Security and Trust.Berlin,Germany:Springer,2017:164-186. [11] CHINEN Y,YANAI N,CRUZ J P,et al.RA:hunting for re-entrancy attacks in Ethereum smart contracts via static analysis[C]//Proceedings of 2020 IEEE International Conference on Blockchain.Washington D.C.,USA:IEEE Press,2020:327-336. [12] ZHANG W,BANESCU S,PASOS L,et al.MPro:combining static and symbolic analysis for scalable testing of smart contract[C]//Proceedings of the 30th IEEE International Symposium on Software Reliability Engineering.Washington D.C.,USA:IEEE Press,2020:456-462. [13] KRUPP J,ROSSOW C.TEETHER:gnawing at Ethereum to automatically exploit smart contracts[C]//Proceedings of the 27th USENIX Conference on Security Symposium.New York,USA:ACM Press,2018:1317-1333. [14] GAO J B,LIU H,LIU C,et al.EASYFLOW:keep Ethereum away from overflow[C]//Proceedings of the 41st IEEE/ACM International Conference on Software Engineering.Washington D.C.,USA:IEEE Press,2019:23-26. [15] ZOU W Q,LO D,KOCHHAR P S,et al.Smart contract development:challenges and opportunities[J].IEEE Transactions on Software Engineering,2021,47(10):2084-2106. [16] HILDENBRANDT E,SAXENA M,RODRIGUES N,et al.KEVM:a complete formal semantics of the Ethereum virtual machine[C]//Proceedings of the 31st IEEE Computer Security Foundations Symposium.Washington D.C.,USA:IEEE Press,2018:204-217. [17] MA F C,FU Y,REN M,et al.EVM:from offline detection to online reinforcement for Ethereum virtual machine[C]//Proceedings of the 26th IEEE International Conference on Software Analysis,Evolution and Reengineering.Washington D.C.,USA:IEEE Press,2019:554-558. [18] LUU L,CHU D H,OLICKEL H,et al.Making smart contracts smarter[C]//Proceedings of 2016 ACM SIGSAC Conference on Computer and Communications Security.New York,USA:ACM Press,2016:254-269. [19] MOURA L D,BJØRNER N.Z3:an efficient SMT solver[C]//Proceedings of International Conference on Tools and Algorithms for the Construction and Analysis of Systems.Berlin,Germany:Springer,2008:337-340. [20] MOSSBERG M,MANZANO F,HENNENFENT E,et al.Manticore:a user-friendly symbolic execution framework for binaries and smart contracts[C]//Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering.Washington D.C.,USA:IEEE Press,2020:1186-1189. [21] ConsenSys/mythril[EB/OL].[2022-07-24].https://github.com/ConsenSys/mythril. [22] Ethereum yellow paper[EB/OL].[2022-07-24].https://ethereum.github.io/yellowpaper/paper.pdf. [23] RO U G,ERBĂNUTĂ T F.An overview of the K semantic framework[J].The Journal of Logic and Algebraic Programming,2010,79(6):397-434. [24] KOLLURI A,NIKOLIC I,SERGEY I,et al.Exploiting the laws of order in smart contracts[C]//Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis.New York,USA:ACM Press,2019:363-373. [25] LI J,ZHAO B D,ZHANG C.Fuzzing:a survey[J].Cybersecurity,2018,1(1):1-13. [26] HE J X,BALUNOVIĆ M,AMBROLADZE N,et al.Learning to fuzz from symbolic execution with application to smart contracts[C]//Proceedings of 2019 ACM SIGSAC Conference on Computer and Communications Security.New York,USA:ACM Press,2019:531-548. [27] TORRES C F,SCHÜTTE J,STATE R.Osiris:hunting for integer bugs in ethereum smart contracts[C]//Proceedings of the 34th Annual Computer Security Applications Conference.New York,USA:ACM Press,2018:664-676. [28] TSANKOV P,DAN A,DRACHSLER-COHEN D,et al.Securify:practical security analysis of smart contracts[C]//Proceedings of 2018 ACM SIGSAC Conference on Computer and Communications Security.New York,USA:ACM Press,2018:67-82. [29] 王翀,吕荫润,陈力,等.SMT求解技术的发展及最新应用研究综述[J].计算机研究与发展,2017,54(7):1405-1425. WANG C,LÜ Y R,CHEN L,et al.Survey on development of solving methods and state-of-the-art applications of satisfiability modulo theories[J].Journal of Computer Research and Development,2017,54(7):1405-1425.(in Chinese) |