
Title |
|---|
![]() Penetrating the Hostile: Detecting DeFi Protocol Exploits through Cross-Contract AnalysisIEEE Transactions on Information Forensics and Security (TIFS), 2025 |
![]() SoK: Design, Vulnerabilities, and Security Measures of Cryptocurrency WalletsComputer Networks (CN), 2023 |