|
[1]
|
Guo, L., Chen, J., Li, S., Li, Y. and Lu, J. (2022) A Blockchain and IoT-Based Lightweight Framework for Enabling Information Transparency in Supply Chain Finance. Digital Communications and Networks, 8, 576-587. [Google Scholar] [CrossRef]
|
|
[2]
|
Rejeb, A., Keogh, J.G. and Treiblmaier, H. (2019) Leveraging the Internet of Things and Blockchain Technology in Supply Chain Management. Future Internet, 11, Article 161. [Google Scholar] [CrossRef]
|
|
[3]
|
Ou, W., Huang, S., Zheng, J., Zhang, Q., Zeng, G. and Han, W. (2022) An Overview on Cross-Chain: Mechanism, Platforms, Challenges and Advances. Computer Networks, 218, Article 109378. [Google Scholar] [CrossRef]
|
|
[4]
|
Lan, R., Upadhyaya, G., Tse, S., et al. (2021) Horizon: A Gas-Efficient, Trustless Bridge for Cross-Chain Transactions.
|
|
[5]
|
(2021) pNetwork. https://medium.com/pnetwork/pnetwork-post-mortem-pbtc-on-bsc-exploit-170890c58d5f
|
|
[6]
|
(2021) Thorchain. https://medium.com/thorchain/eth-parsing-error-and-exploit-3b343aa6466f
|
|
[7]
|
Tang, Q., Sang, N. and Liu, H. (2020) Learning Nonclassical Receptive Field Modulation for Contour Detection. IEEE Transactions on Image Processing, 29, 1192-1203. [Google Scholar] [CrossRef] [PubMed]
|
|
[8]
|
Wang, S. and Zhao, X. (2024) Contractsentry: A Static Analysis Tool for Smart Contract Vulnerability Detection. Automated Software Engineering, 32, Article No. 1. [Google Scholar] [CrossRef]
|
|
[9]
|
Liao, Z., Nan, Y., Liang, H., Hao, S., Zhai, J., Wu, J., et al. (2024) Smartaxe: Detecting Cross-Chain Vulnerabilities in Bridge Smart Contracts via Fine-Grained Static Analysis. Proceedings of the ACM on Software Engineering, 1, 249-270. [Google Scholar] [CrossRef]
|
|
[10]
|
Ferreira Torres, C., Baden, M., Norvill, R., Fiz Pontiveros, B.B., Jonker, H. and Mauw, S. (2020) ÆGIS: Shielding Vulnerable Smart Contracts against Attacks. Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, Taipei, 5-9 October 2020, 584-597. [Google Scholar] [CrossRef]
|
|
[11]
|
Zhang, J., Gao, J., Li, Y., Chen, Z., Guan, Z. and Chen, Z. (2022) Xscope: Hunting for Cross-Chain Bridge Attacks. Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, Rochester, 10-14 October 2022, 1-4. [Google Scholar] [CrossRef]
|
|
[12]
|
(2025) Phalcon Explorer. https://app.blocksec.com/
|