In this paper, we present Vandal: a security analysis framework for Ethereum smart contracts.
Programming Languages
In stage II, we construct a pool of diverse RL agents for different market trends, distinguished by return rates, where hundreds of RL agents are trained with different preferences of return rates and only a tiny fraction of them will be selected into the pool based on their profitability.
Our study is the first that is based on the entire body of deployed bytecode on Ethereum's main chain.
Cryptography and Security Software Engineering
Today, a myriad of blockchain and cryptocurrency systems, applications, and technologies are widely available to companies, end-users, and even malicious actors who want to exploit the computational resources of regular users through \textit{cryptojacking} malware.
Malware Detection
Cryptography and Security
In this paper we apply neural networks and Artificial Intelligence (AI) to historical records of high-risk cryptocurrency coins to train a prediction model that guesses their price.
Fabric is a modular and extensible open-source system for deploying and operating permissioned blockchains and one of the Hyperledger projects hosted by the Linux Foundation (www. hyperledger. org).
Distributed, Parallel, and Cluster Computing Cryptography and Security
It focuses on the security property of access control for SCRIPT programs that govern the distribution of Bitcoins.
Symbolic Computation Cryptography and Security Logic in Computer Science Social and Information Networks
Ethereum holds multiple billions of U. S. dollars in the form of Ether cryptocurrency and ERC-20 tokens, with millions of deployed smart contracts algorithmically operating these funds.
Cryptography and Security
Ethereum smart contracts are programs that are deployed and executed in a consensus-based blockchain managed by a peer-to-peer network.
Cryptography and Security
Smart contracts are programs running on cryptocurrency (e. g., Ethereum) blockchains, whose popularity stem from the possibility to perform financial transactions, such as payments and auctions, in a distributed environment without need for any trusted third party.
Cryptography and Security