Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Aashish Kolluri"'
Publikováno v:
Proceedings of the ACM on Programming Languages. 7:201-229
A transpiler converts code from one programming language to another. Many practical uses of transpilers require the user to be able to guide or customize the program produced from a given input program. This customizability is important for satisfyin
Classification tasks on labeled graph-structured data have many important applications ranging from social recommendation to financial modeling. Deep neural networks are increasingly being used for node classification on graphs, wherein nodes with si
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a2474e04cfe4937036569049f3f003ae
Publikováno v:
AsiaCCS
Automatic vulnerability diagnosis can help security analysts identify and, therefore, quickly patch disclosed vulnerabilities. The vulnerability localization problem is to automatically find a program point at which the "root cause" of the bug can be
Publikováno v:
ESEC/SIGSOFT FSE
Programming by Example (PBE) is a program synthesis paradigm in which the synthesizer creates a program that matches a set of given examples. In many applications of such synthesis (e.g., program repair or reverse engineering), we are to reconstruct
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::cc9eca77c3c7839c33f2e656ba816f19
Publikováno v:
CCS
Analyzing structural properties of social networks, such as identifying their clusters or finding their most central nodes, has many applications. However, these applications are not supported by federated social networks that allow users to store th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6d0958093f959c070bfad5eab95d8c90
Publikováno v:
ACSAC
Smart contracts---stateful executable objects hosted on blockchains like Ethereum---carry billions of dollars worth of coins and cannot be updated once deployed. We present a new systematic characterization of a class of trace vulnerabilities, which
Publikováno v:
Information Systems Security ISBN: 9783030051709
ICISS
ICISS
In the last decade, several permissionless proof-of-work blockchain protocols have focused on scalability. Since these protocols are very difficult to change once deployed, their robustness and security are of paramount importance. This paper summari
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b21c8f460121f486fe9e989d6131037c
https://doi.org/10.1007/978-3-030-05171-6_24
https://doi.org/10.1007/978-3-030-05171-6_24
Publikováno v:
ISSTA
We investigate a family of bugs in blockchain-based smart contracts, which we call event-ordering (or EO) bugs. These bugs are intimately related to the dynamic ordering of contract events, i.e., calls of its functions on the blockchain, and enable p
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2c73a123e877aa7e4de370582eb4c60c