K. Bhargavan, A. Delignat-lavaud, C. Fournet, A. Gollamudi, G. Gonthier et al., Formal Verification of Smart Contracts, Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security, PLAS'16, pp.91-96, 2016.
DOI : 10.1145/2535838.2535889

URL : https://hal.archives-ouvertes.fr/hal-01400469

G. Bracha and D. Ungar, Mirrors: design principles for meta-level facilities of object-oriented programming languages, Proceedings of the International Conference on Object-Oriented Programming, Systems, Languages, and Applications ACM SIGPLAN Notices, pp.331-344, 2004.

J. Caballero, H. Yin, Z. Liang, and D. Song, Polyglot, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.317-329, 2007.
DOI : 10.1145/1315245.1315286

A. Chi¸schi¸s, O. Nierstrasz, A. Syrel, and T. Gîrba, The moldable inspector, 2015 ACM International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software (Onward!), Onward! 2015, pp.44-60, 2015.

T. T. Dinh, J. Wang, G. Chen, R. Liu, B. C. Ooi et al., BLOCKBENCH, Proceedings of the 2017 ACM International Conference on Management of Data , SIGMOD '17, pp.1085-1100, 2017.
DOI : 10.1145/2814710.2814717

S. Dziembowski, Introduction to Cryptocurrencies, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.1700-1701, 2015.
DOI : 10.1007/978-3-662-44381-1_24

K. Fisher, D. Walker, K. Q. Zhu, and P. White, From dirt to shovels: Fully automatic tool generation from ad hoc data, Proceedings of the 35th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL '08, pp.421-434, 2008.
DOI : 10.1145/1328438.1328488

A. Hari and T. V. Lakshman, The Internet Blockchain, Proceedings of the 15th ACM Workshop on Hot Topics in Networks, HotNets '16, pp.204-210, 2016.
DOI : 10.1145/279227.279229

B. Leiding, P. Memarmoshrefi, and D. Hogrefe, Self-managed and blockchainbased vehicular ad-hoc networks, 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct, UbiComp '16, pp.137-140, 2016.

J. Lim, T. W. Reps, and B. Liblit, Extracting Output Formats from Executables, 2006 13th Working Conference on Reverse Engineering, pp.23-27, 2006.
DOI : 10.1109/WCRE.2006.29

URL : http://cs.wisc.edu/~liblit/wcre-2006/wcre-2006.pdf

L. Luu, D. Chu, H. Olickel, P. Saxena, and A. Hobor, Making Smart Contracts Smarter, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS'16, pp.254-269, 2016.
DOI : 10.1145/359545.359563

URL : http://dl.acm.org/ft_gateway.cfm?id=2978309&type=pdf

L. Luu, J. Teutsch, R. Kulkarni, and P. Saxena, Demystifying Incentives in the Consensus Computer, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.706-719, 2015.
DOI : 10.1007/978-3-662-46803-6_10

S. Nakamoto, Bitcoin: A peer-to-peer electronic cash system, 2009.

N. Papoulias, Remote Debugging and Reflection in Resource Constrained Devices . Theses, 2013.
URL : https://hal.archives-ouvertes.fr/tel-00932796

G. Salvaneschi and M. Mezini, Debugging reactive programming with reactive inspector, Proceedings of the 38th International Conference on Software Engineering Companion, ICSE '16, pp.728-730, 2016.
DOI : 10.1145/2884781.2884815

V. Srinivasan and T. Reps, Recovery of Class Hierarchies and Composition Relationships from Machine Code, pp.61-84, 2014.
DOI : 10.1007/978-3-642-54807-9_4