Search Results

Vandal: A Scalable Security Analysis Framework for Smart Contracts

2 code implementations11 Sep 2018

In this paper, we present Vandal: a security analysis framework for Ethereum smart contracts.

Programming Languages

EarnHFT: Efficient Hierarchical Reinforcement Learning for High Frequency Trading

1 code implementation22 Sep 2023

In stage II, we construct a pool of diverse RL agents for different market trends, distinguished by return rates, where hundreds of RL agents are trained with different preferences of return rates and only a tiny fraction of them will be selected into the pool based on their profitability.

Algorithmic Trading Hierarchical Reinforcement Learning +1

Evolution of Automated Weakness Detection in Ethereum Bytecode: a Comprehensive Study

2 code implementations18 Mar 2023

Our study is the first that is based on the entire body of deployed bytecode on Ethereum's main chain.

Cryptography and Security Software Engineering

SoK: Cryptojacking Malware

1 code implementation5 Mar 2021

Today, a myriad of blockchain and cryptocurrency systems, applications, and technologies are widely available to companies, end-users, and even malicious actors who want to exploit the computational resources of regular users through \textit{cryptojacking} malware.

Malware Detection Cryptography and Security

Time Series Analysis of Blockchain-Based Cryptocurrency Price Changes

1 code implementation19 Feb 2022

In this paper we apply neural networks and Artificial Intelligence (AI) to historical records of high-risk cryptocurrency coins to train a prediction model that guesses their price.

Time Series Time Series Analysis

Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains

1 code implementation30 Jan 2018

Fabric is a modular and extensible open-source system for deploying and operating permissioned blockchains and one of the Hyperledger projects hosted by the Linux Foundation (www. hyperledger. org).

Distributed, Parallel, and Cluster Computing Cryptography and Security

Verification of Bitcoin Script in Agda using Weakest Preconditions for Access Control

1 code implementation6 Mar 2022

It focuses on the security property of access control for SCRIPT programs that govern the distribution of Bitcoins.

Symbolic Computation Cryptography and Security Logic in Computer Science Social and Information Networks

Targeting the Weakest Link: Social Engineering Attacks in Ethereum Smart Contracts

1 code implementation1 May 2021

Ethereum holds multiple billions of U. S. dollars in the form of Ether cryptocurrency and ERC-20 tokens, with millions of deployed smart contracts algorithmically operating these funds.

Cryptography and Security

Hunting for Re-Entrancy Attacks in Ethereum Smart Contracts via Static Analysis

1 code implementation2 Jul 2020

Ethereum smart contracts are programs that are deployed and executed in a consensus-based blockchain managed by a peer-to-peer network.

Cryptography and Security

A Semantic Framework for the Security Analysis of Ethereum smart contracts

1 code implementation23 Apr 2018

Smart contracts are programs running on cryptocurrency (e. g., Ethereum) blockchains, whose popularity stem from the possibility to perform financial transactions, such as payments and auctions, in a distributed environment without need for any trusted third party.

Cryptography and Security