发表论文
- [ASE'24] ContractTinker: LLM-Empowered Vulnerability Repair for Real-World Smart Contracts 2025-01-02
- [FSE'24] XGuard Detecting Inconsistency Behaviors of Crosschain Bridges 2025-01-02
- [ICSE'24] When Contracts Meets Crypto: Exploring Developers' Struggles with Ethereum Cryptographic APIs 2025-01-02
- [ISSRE'24] Understanding and Detecting Privacy Leakage Vulnerabilities in Hyperledger Fabric Chaincodes 2025-01-02
- [INFOCOM'24] RollupNet: Trustless State Channels for Real-time Cross Rollup Contract Execution 2025-01-02
- [ICPC'24] SolaSim: Clone Detection for Solana Smart Contracts via Program Representation 2025-01-02
- [ACSAC'23] Hades: Practical Decentralized Identity with Full Accountability and Fine-grained Sybil-resistance 2025-01-02
- [ICSE 2023] Siguard: Detecting Signature-Related Vulnerabilities in Smart Contracts 2023-04-03
- [ASE 2022] Xscope: Hunting for Cross-Chain Bridge Attacks 2022-07-29
- [ICDCS 2021] FastBlock: Accelerating Blockchains via Hardware Transactional Memory 2021-09-07
- [ICSME 2020] Kaya: A Testing Framework for Blockchain-based Decentralized Applications 2021-09-07
- [ISSTA 2020] EShield: Protect Smart Contracts against Reverse Engineering 2021-09-07
- [ICSE 2020] Towards Automated Migration for Blockchain-based Decentralized Application 2020-02-04
- [ICSE 2019] Finding Concurrency Exploits on Smart Contracts 2019-02-23
- [ICSE 2019] Guided, Automated Testing of Blockchain-based Decentralized Applications 2019-02-23
- [ICSE 2019] EASYFLOW: Keep Ethereum Away From Overflow 2019-02-23
- [ICETE 2018] Analysis of Man-In-The-Middle of Attack on Bitcoin Address 2019-02-23