[1] |
Szabo N. Formalizing and securing relationships on public networks[J]. First Monday, 1997, 2(9):1-21.
|
[2] |
Li R, Song T, Mei B, et al. Blockchain for large-scale internet of things data storage and protection[J]. IEEE Transactions on Services Computing, 2019, 12(1):762-771.
|
[3] |
Guo H, Yu X. A survey on blockchain technology and its security[J]. Blockchain:Research and Applications, 2022, 3(2):67-82.
|
[4] |
Buterin V. A next-generation smart contract and decentralized application platform[J]. White Paper, 2014, 3(37):1-33.
|
[5] |
Bouichou A, Mezroui S, El Oualkadi A. An overview of ethereum and solidity vulnerabilities[C]. Marrakech: International Symposium on Advanced Electrical and Communication Technologies,IEEE, 2020:1-7.
|
[6] |
李洋, 李洁, 葛宁, 等. 面向金融领域的智能合约特定语言设计[J]. 信息安全研究, 2022, 8(5):468-474.
|
|
Li Yang, Li Jie, Ge Ning, et al. Design of a smart contract specific language for financial field[J]. Journal of Information Security Research, 2022, 8(5):468-474.
|
[7] |
李佳利, 杨涵, 钱建平. 新冠肺炎疫情下中国农产品冷链物流可信追溯研究[J]. 农业大数据学报, 2022, 4(1):14-24.
doi: 10.19788/j.issn.2096-6369.220101
|
|
Li Jiali, Yang Han, Qian Jianping. An credible traceability system for coldchain logistics developed for China's agricultural products in the context of COVID-19[J]. Journal of Agricultural Big Data, 2022, 4(1):14-24.
doi: 10.19788/j.issn.2096-6369.220101
|
[8] |
王晟典, 陈娥, 朱岩, 等. 一种基于区块链智能合约的软件服务交易方法[J]. 工程科学学报, 2023, 45(3):475-488.
|
|
Wang Shengdian, Chen E, Zhu Yan, et al. A software service transaction approach based on blockchain smart contracts[J]. Chinese Journal of Engineering, 2023, 45(3):475-488.
|
[9] |
Nishi F K, Shams-E-Mofiz M, Khan M M, et al. Electronic healthcare data record security using blockchain and smart contract[J]. Journal of Sensors, 2022(5):1-22.
|
[10] |
倪远东, 张超, 殷婷婷. 智能合约安全漏洞研究综述[J]. 信息安全学报, 2020, 5(3):78-99.
|
|
Ni Yuandong, Zhang Chao, Yin Tingting. A suvery of smart contract vulnerability research[J]. Journalof Cyber Security, 2020, 5(3):78-99.
|
[11] |
Zhou H, Milani Fard A, Makanju A. The state of ethereum smart contracts security:Vulnerabilities, countermeasures and tool support[J]. Journal of Cyber Security and Privacy, 2022, 2(2):358-378.
|
[12] |
Feist J, Grieco G, Groce A. Slither:A static analysis framework for smart contracts[C]. Montreal: IEEE/ACM the Second International Workshop on Emerging Trends in Software Engineering for Blockchain, 2019:8-15.
|
[13] |
Tikhomirov S, Voskresenskaya E, Ivanitskiy I, et al. Smartcheck:Static analysis of ethereum smart contracts[C]. Gothenburg: Proceedings of the First International Workshop on Emerging Trends in Software Engineering for Blockchain, 2018:9-16.
|
[14] |
Albert E, Gordillo P, Livshits B, et al. Ethir:A framework for high-level analysis of ethereum bytecode[C]. Los Angeles:Automated Technology for Verification and Analysis: The Sixteenth International Symposium, 2018:513-520.
|
[15] |
Wood G. Solidity 0.8.0 documentation[EB/OL].(2020-03-01)[2023-04-08]https://docs.soliditylang.org/en/v0.8.0.
|
[16] |
ETH. The ethereum blockchain explorer[EB/OL].(2020-06-21)[2023-04-08]https://etherscan.io.
|
[17] |
Daian P. Analysis of the dao exploit[EB/OL].(2016-06-18)[2023-04-08]https://hackingdistributed.com/2016/06/18/analysis-of-the-dao-exploit.
|
[18] |
Spank Chain. We got spanked:What we know so far[EB/OL].(2018-10-09)[2023-04-08]https://medium.com/spankchain/we-got-spanked-what-we-know-so-far-d5ed3a0f38fe.
|