Yang, S., Chen, J., Huang, M., Zheng, Z., & Huang, Y. (2024, April 14). Uncover the Premeditated Attacks: Detecting Exploitable Reentrancy Vulnerabilities by Identifying Attacker Contracts. Proceedings / International Conference on Software Engineering, 1573-1584. https://doi.org/10.1145/3597503.3639153
Citace podle Chicago (17th ed.)Yang, Shuo, Jiachi Chen, Mingyuan Huang, Zibin Zheng, a Yuan Huang. "Uncover the Premeditated Attacks: Detecting Exploitable Reentrancy Vulnerabilities by Identifying Attacker Contracts." Proceedings / International Conference on Software Engineering 14 Apr. 2024: 1573-1584. https://doi.org/10.1145/3597503.3639153.
Citace podle MLA (9th ed.)Yang, Shuo, et al. "Uncover the Premeditated Attacks: Detecting Exploitable Reentrancy Vulnerabilities by Identifying Attacker Contracts." Proceedings / International Conference on Software Engineering, 14 Apr. 2024, pp. 1573-1584, https://doi.org/10.1145/3597503.3639153.