| 1 | 钱鹏, 刘振广, 何钦铭, 等. 智能合约安全漏洞检测技术研究综述. 软件学报, 2021, 33 (8): 3059- 3085.  doi: 10.13328/j.cnki.jos.006375
 | 
																													
																							|  | QIAN P, LIU Z G, HE Q M, et al. A review of research on smart contract security vulnerability detection technology. Journal of Software, 2021, 33 (8): 3059- 3085.  doi: 10.13328/j.cnki.jos.006375
 | 
																													
																							| 2 |  | 
																													
																							| 3 |  | 
																													
																							| 4 |  | 
																													
																							| 5 |  | 
																													
																							| 6 |  | 
																													
																							| 7 |  | 
																													
																							| 8 |  | 
																													
																							| 9 | LUU L, CHU D H, OLICKEL H, et al. Making smart contracts smarter[C]//Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. New York, USA: ACM Press, 2016: 254-269. | 
																													
																							| 10 | TORRES C F, SCHÜTTE J, STATE R. Osiris: hunting for integer bugs in Ethereum smart contracts[C]//Proceedings of the 34th Annual Computer Security Applications Conference. New York, USA: ACM Press, 2018: 664-676. | 
																													
																							| 11 |  | 
																													
																							| 12 | KRUPP J, ROSSOW C. TEETHER: gnawing at Ethereum to automatically exploit smart contracts[C]//Proceedings of the 27th USENIX Security Symposium. [S. l. ]: USENIX, 2018: 1317-1333. | 
																													
																							| 13 | CHEN J C, XIA X, LO D, et al. DefectChecker: automated smart contract defect detection by analyzing EVM bytecode. IEEE Transactions on Software Engineering, 2022, 48 (7): 2189- 2207.  doi: 10.1109/TSE.2021.3054928
 | 
																													
																							| 14 | BOSE P, DAS D, CHEN Y J, et al. SAILFISH: vetting smart contract state-inconsistency bugs in seconds[C]//Proceedings of the IEEE Symposium on Security and Privacy. Washington D. C., USA: IEEE Press, 2022: 161-178. | 
																													
																							| 15 | KALRA S, GOEL S, DHAWAN M, et al. ZEUS: analyzing safety of smart contracts[C]//Proceedings of 2018 Network and Distributed System Security Symposium. Reston, USA: Internet Society, 2018: 1-15. | 
																													
																							| 16 | TSANKOV P, DAN A, DRACHSLER-COHEN D, et al. Securify: practical security analysis of smart contracts[C]//Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. New York, USA: ACM Press, 2018: 67-82. | 
																													
																							| 17 | TIKHOMIROV S, VOSKRESENSKAYA E, IVANITSKIY I, et al. SmartCheck: static analysis of Ethereum smart contracts[C]//Proceedings of the 1st International Workshop on Emerging Trends in Software Engineering for Blockchain. New York, USA: ACM Press, 2018: 9-16. | 
																													
																							| 18 | FEIST J, GRIECO G, GROCE A. Slither: a static analysis framework for smart contracts[C]//Proceedings of the 2nd IEEE/ACM International Workshop on Emerging Trends in Software Engineering for Blockchain. Washington D. C., USA: IEEE Press, 2019: 8-15. | 
																													
																							| 19 | JIANG B, LIU Y, CHAN W K. ContractFuzzer: fuzzing smart contracts for vulnerability detection[C]//Proceedings of the 33rd IEEE/ACM International Conference on Automated Software Engineering. New York, USA: ACM Press, 2018: 259-269. | 
																													
																							| 20 | LIU C, LIU H, CAO Z, et al. Reguard: finding reentrancy bugs in smart contracts[C]//Proceedings of the 40th International Conference on Software Engineering. Washington D. C., USA: IEEE Press, 2018: 65-68. | 
																													
																							| 21 | RODLER M, LI W T, KARAME G O, et al. Sereum: protecting existing smart contracts against re-entrancy attacks[EB/OL]. [2023-04-25]. http://arxiv.org/abs/1812.05934 . | 
																													
																							| 22 | GROSSMAN S, ABRAHAM I, GOLAN-GUETA G, et al. Online detection of effectively callback free objects with applications to smart contracts[C]//Proceedings of the ACM Conference on Programming Languages. New York, USA: ACM Press, 2018: 1-28. | 
																													
																							| 23 | PEREZ D, LIVSHITS B. Smart contract vulnerabilities: vulnerable does not imply exploited[C]//Proceedings of the 30th USENIX Security Symposium. [S. l. ]: USENIX, 2021: 1-10. | 
																													
																							| 24 | BALDONI R, COPPA E, D'ELIA D C, et al. A survey of symbolic execution techniques. ACM Computing Surveys, 2019, 51 (3): 1- 39.  doi: 10.1145/3182657
 | 
																													
																							| 25 | FERREIRA J F, CRUZ P, DURIEUX T, et al. SmartBugs: a framework to analyze solidity smart contracts [C]//Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering. Washington D. C., USA: IEEE Press, 2020: 1349-1352. | 
																													
																							| 26 | GHALEB A, PATTABIRAMAN K. How effective are smart contract analysis tools? Evaluating smart contract static analysis tools using bug injection[C]//Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis. New York, USA: ACM Press, 2020: 415-427. |