A Survey on the security of blockchain systems X Li, P Jiang, T Chen, X Luo, Q Wen Future Generation Computer Systems, 2017 | 2072 | 2017 |
Under-Optimized Smart Contracts Devour Your Money T Chen, X Li, X Luo, X Zhang SANER, 2017 | 463 | 2017 |
Understanding Ethereum via Graph Analysis T Chen, Z Li, Y Zhu, J Chen, X Luo, JC Lui, X Lin, X Zhang ACM Transactions on Internet Technology, 2020 | 402 | 2020 |
Understanding Ethereum via Graph Analysis T Chen, Y Zhu, Z Li, J Chen, X Li, X Luo, X Lin, X Zhang INFOCOM, 2018 | 402 | 2018 |
Transaction-based classification and detection approach for Ethereum smart contract T Hu, X Liu, T Chen, X Zhang, X Huang, W Niu, J Lu, K Zhou, Y Liu Information Processing & Management 58 (2), 102462, 2021 | 193 | 2021 |
Defining smart contract defects on ethereum J Chen, X Xia, D Lo, J Grundy, X Luo, T Chen IEEE Transactions on Software Engineering 48 (1), 327-345, 2020 | 174 | 2020 |
An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS Attacks T Chen, X Li, Y Wang, J Chen, X Luo, MH Au, X Zhang ISPEC, 2017 | 149 | 2017 |
TokenScope: Automatically Detecting Inconsistent Behaviors of Cryptocurrency Tokens in Ethereum T Chen, Y Zhang, Z Li, X Luo, T Wang, R Cao, X Xiao, X Zhang CCS, 2019 | 138 | 2019 |
SODA: A Generic Online Detection Framework for Smart Contracts T Chen, R Cao, T Li, X Luo, G Gu, Y Zhang, Z Liao, H Zhu, G Chen, Z He, ... NDSS, 2020 | 131 | 2020 |
State of the art: Dynamic symbolic execution for automated test generation T Chen, X Zhang, S Guo, H Li, Y Wu Future Generation Computer Systems 29 (7), 1758-1773, 2013 | 127 | 2013 |
DefectChecker: Automated Smart Contract Defect Detection by Analyzing EVM Bytecode J Chen, X Xia, D Lo, J Grundy, X Luo, T Chen IEEE Transactions on Software Engineering 48 (7), 2189-2207, 2021 | 120 | 2021 |
Towards Saving Money in Using Smart Contracts T Chen, Z Li, H Zhou, J Chen, X Li, X Luo, X Zhang ICSE, 2018 | 116 | 2018 |
GasChecker: Scalable Analysis for Discovering Gas-Inefficient Smart Contracts T Chen, Y Feng, Z Li, H Zhou, X Luo, X Li, X Xiao, J Chen, X Zhang IEEE Transactions on Emerging Topics in Computing, 2020 | 100 | 2020 |
Jn-saf: Precise and efficient ndk/jni-aware inter-language static analysis framework for security vetting of android applications with native code F Wei, X Lin, X Ou, T Chen, X Zhang Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 99 | 2018 |
Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART L Xue, Y Zhou, T Chen, X Luo, G Gu UESNIX SECURITY, 2017 | 99 | 2017 |
Towards paving the way for large-scale windows malware analysis: Generic binary unpacking with orders-of-magnitude performance boost B Cheng, J Ming, J Fu, G Peng, T Chen, X Zhang, JY Marion Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 87 | 2018 |
DataEther: Data Exploration Framework For Ethereum T Chen, Z Li, Y Zhang, X Luo, A Chen, K Yang, B Hu, T Zhu, S Deng, T Hu, ... ICDCS, 2019 | 59 | 2019 |
Automated Forensic Analysis of Mobile Applications on Android Devices X Lin, T Chen, T Zhu, K Yang, F Wei DFRWS USA, 2018 | 53 | 2018 |
HEALER: Relation Learning Guided Kernel Fuzzing H Sun, Y Shen, C Wang, J Liu, Y Jiang, T Chen, A Cui SOSP, 2021 | 51 | 2021 |
Smart applications in edge computing: Overview on authentication and data security X Li, T Chen, Q Cheng, S Ma, J Ma IEEE Internet of Things Journal 8 (6), 4063-4080, 2020 | 51 | 2020 |