Defining Smart Contract Defects on Ethereum

J. Chen , X. Xia , D. Lo , John C. Grundy
arXiv: Software Engineering

87
2019
DEFECTCHECKER: Automated Smart Contract Defect Detection by Analyzing EVM Bytecode

J. Chen , X. Xia , D. Lo , John C. Grundy
IEEE Transactions on Software Engineering 48 ( 7)

94
2022
A Survey on the Security of Blockchain Systems

Ting Chen , Xiapu Luo , Peng Jiang , Qiaoyan Wen
arXiv: Cryptography and Security

1,444
2018
Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART.

Ting Chen , Ting Chen , Yajin Zhou , Xiapu Luo
usenix security symposium 289 -306

31
2017
Domain Specific Code Smells in Smart Contracts.

Ting Chen , David Lo , Xin Xia , Jiachi Chen

3
2019
Targeting the Weakest Link: Social Engineering Attacks in Ethereum Smart Contracts

Ting Chen , Jin Li , Qiben Yan , Nikolay Ivanov
arXiv: Cryptography and Security

9
2021
CLUE: towards discovering locked cryptocurrencies in ethereum

Ting Chen , Xiapu Luo , Chenxu Wang , Xiaoqi Li
acm symposium on applied computing 1584 -1587

2021
Design and implementation of a dynamic symbolic execution tool for windows executables

Ting Chen , Xiao-song Zhang , Cong Zhu , Xiao-li Ji
Journal of Software: Evolution and Process 25 ( 12) 1249 -1272

9
2013
STAN: Towards Describing Bytecodes of Smart Contract

Xiaoqi Li , Ting Chen , Xiapu Luo , Tao Zhang
2020 IEEE 20th International Conference on Software Quality, Reliability and Security (QRS) 273 -284

3
2020
Discovering Vulnerabilities in COTS IoT Devices through Blackbox Fuzzing Web Management Interface

Dong Wang , Xiaosong Zhang , Ting Chen , Jingwei Li
Security and Communication Networks 2019 1 -19

4
2019
Fast quarantining of proactive worms in unstructured P2P networks

Ting Chen , Xiao-song Zhang , Hua Li , Xiong-da Li
Journal of Network and Computer Applications 34 ( 5) 1648 -1659

6
2011
Is what you measure what you expect? Factors affecting smartphone-based mobile network measurement

Lei Xue , Xiaobo Ma , Xiapu Luo , Le Yu
IEEE INFOCOM 2017 - IEEE Conference on Computer Communications 1 -9

7
2017
Propagation modeling of active P2P worms based on ternary matrix

Ting Chen , Xiao-song Zhang , Hong-yuan Li , Dong Wang
Journal of Network and Computer Applications 36 ( 5) 1387 -1394

7
2013
Characterizing Erasable Accounts in Ethereum

Xiaoqi Li , Ting Chen , Xiapu Luo , Jiangshan Yu
information security conference 352 -371

1
2020
GasChecker: Scalable Analysis for Discovering Gas-Inefficient Smart Contracts

Ting Chen , Youzheng Feng , Zihao Li , Hao Zhou
IEEE Transactions on Emerging Topics in Computing ( 01) 1 -1

54
2020
Understanding Ethereum via Graph Analysis

Ting Chen , Yuxiao Zhu , Zihao Li , Jiachi Chen
ACM Transactions on Internet Technology 20 ( 2) 1 -32

251
2020
CRBA: A Capacity Restricted Model Evolved from BA Model for Complex Network

Xiao-song Zhang , Ting Chen , Xiao-lin Wang , Yong Huang
Journal of Networks 6 ( 8) 1163 -1170

2
2011
Proactive worm propagation modeling and analysis in unstructured peer-to-peer networks

Xiao-song Zhang , Ting Chen , Jiong Zheng , Hua Li
Journal of Zhejiang University Science C 11 ( 2) 119 -129

16
2010
SEVE: Symbolic Execution based Vulnerability Exploring system

Ting Chen , Xiao‐song Zhang , Xu Xiao , Yue Wu
Compel-the International Journal for Computation and Mathematics in Electrical and Electronic Engineering 32 ( 2) 620 -637

3
2013
Proactive P2P worm containment via automatic authentication

Xiao‐song Zhang , Ting Chen , Chun‐xiang Xu , Xiao‐hui Pan
Compel-the International Journal for Computation and Mathematics in Electrical and Electronic Engineering 32 ( 2) 661 -673

2013