Login / Signup
Pied-Piper: Revealing the Backdoor Threats in Ethereum ERC Token Contracts.
Fuchen Ma
Meng Ren
Lerong Ouyang
Yuanliang Chen
Juan Zhu
Ting Chen
Yingli Zheng
Xiao Dai
Yu Jiang
Jiaguang Sun
Published in:
ACM Trans. Softw. Eng. Methodol. (2023)
Keyphrases
</>
electronic commerce
supply chain
countermeasures
information security
security threats
denial of service attacks
malicious attacks
data sets
neural network
social networks
search algorithm
false alarms
national security
security services
moral hazard
insider attacks