Smart contracts manage a large number of digital assets which is attractive to attackers. There have been many attacks that have caused huge financial losses. Therefore, it is of great importance to detect vulnerabili...
详细信息
ISBN:
(纸本)9798350327830
Smart contracts manage a large number of digital assets which is attractive to attackers. There have been many attacks that have caused huge financial losses. Therefore, it is of great importance to detect vulnerabilities in smart contracts. Fuzzing is considered a promising approach to test smart contracts. However, the complexity of changing state variables and the handling of external parameters during mutation pose critical technical challenges for current smart contract fuzzers, hindering their ability to cover branches under complex constraints and leaving potential vulnerabilities for attackers to exploit. To tackle these problems, we design a guided mutation strategy combined with two novel techniques: dynamic Dependency Learning (DDL) and dynamic Variables Analysis (DVA). DDL learns the dependencies of sequences to provide guided transaction sequence generation for handling state variables in complex constraints, while DVA leverages variable-level dynamic taint analysis to process the external parameters and guide the mutation. We implement the proposed strategy on a fuzzer, called SeqFuzz. The experimental results show that SeqFuzz could cover more branches and detect more bugs in real-world smart contracts compared with state-of-the-art tools.
With the rapidly development of the computer and internet technology, the security problem of software is more and more concerned. In this paper we present a runtime protecting system for java applications with dynami...
详细信息
ISBN:
(纸本)9781424458219;9781424458240
With the rapidly development of the computer and internet technology, the security problem of software is more and more concerned. In this paper we present a runtime protecting system for java applications with dynamic data flow analyzing. We proposed the runtime software protecting algorithm and discussed the design and implementation of the runtime protecting system for java applications. At last, we compared runtime protecting system with static code analysis and analyze the performance of our implementation.
This paper presents a generic multi-processor architecture for video processing(1), featuring an array of programmable application-specific coprocessors and a programmable switch-bar communication network. Key advanta...
详细信息
This paper presents a generic multi-processor architecture for video processing(1), featuring an array of programmable application-specific coprocessors and a programmable switch-bar communication network. Key advantages of the platform are that the order of functions can be changed and that video tasks can be programmed at system and functional level using tasks of any length, by applying dynamicdata-flow. This modular concept is cost-effective and suitable for a large range of applications and features in the video domain. The system can be well applied in combination with microcontrollers or media processors and it is used for implementing an experimental TV platform.
暂无评论