Cited By
View all- Zhou LWei CZhu TChen GZhang XDu SCao HZhu HCalandrino JTroncoso C(2023)POLICYCOMPProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620298(1073-1090)Online publication date: 9-Aug-2023
- Pan YXu ZLi LYang YZhang MJust RFraser G(2023)Automated Generation of Security-Centric Descriptions for Smart Contract BytecodeProceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis10.1145/3597926.3598132(1244-1256)Online publication date: 12-Jul-2023
- Tan ZSong WGrundy JPollock LPenta M(2023)PTPDroid: Detecting Violated User Privacy Disclosures to Third-Parties of Android AppsProceedings of the 45th International Conference on Software Engineering10.1109/ICSE48619.2023.00050(473-485)Online publication date: 14-May-2023
- Show More Cited By