Finding permission bugs in smart contracts with role mining.
Ye LiuYi LiShang-Wei LinCyrille ArthoPublished in: ISSTA (2022)
Keyphrases
- role based access control
- source code
- knowledge discovery
- mining algorithm
- redescription mining
- text mining
- discovering interesting
- supply chain
- access control
- association rule mining
- moral hazard
- smart grid
- smart environments
- pattern discovery
- data mining methods
- sequential patterns
- data mining
- software systems
- data analysis
- artificial intelligence
- genetic algorithm
- machine learning