Sign in

DeFiTainter: Detecting Price Manipulation Vulnerabilities in DeFi Protocols.

Queping KongJiachi ChenYanlin WangZigui JiangZibin Zheng
Published in: ISSTA (2023)
Keyphrases
  • information security
  • voting protocols
  • information retrieval
  • learning algorithm
  • automatic detection
  • multi agent
  • security flaws