Search filters

Uncover the Premeditated Attacks: Detecting Exploitable Reentrancy Vulnerabilities by Identifying Attacker Contracts

Image Image of a generic work. The text above it indicates that there is no free image of the work available, and that if you own one, you can click on the placeholder link to upload it.
Description scientific article published on 12 April 2024
Author/s

author: Jiachi Chen  Zibin Zheng  Yuan Huang  Shuo Yang  Mingyuan Huang 

Publication date April 12, 2024
Language
Country of origin
Wikipedia link
Copyright status
Missing/wrong data? Edit Wikidata item