Formal Verification of Smart Contracts, Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security, PLAS'16, pp.91-96, 2016. ,
DOI : 10.1145/2535838.2535889
URL : https://hal.archives-ouvertes.fr/hal-01400469
Mirrors: design principles for meta-level facilities of object-oriented programming languages, Proceedings of the International Conference on Object-Oriented Programming, Systems, Languages, and Applications ACM SIGPLAN Notices, pp.331-344, 2004. ,
Polyglot, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.317-329, 2007. ,
DOI : 10.1145/1315245.1315286
The moldable inspector, 2015 ACM International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software (Onward!), Onward! 2015, pp.44-60, 2015. ,
BLOCKBENCH, Proceedings of the 2017 ACM International Conference on Management of Data , SIGMOD '17, pp.1085-1100, 2017. ,
DOI : 10.1145/2814710.2814717
Introduction to Cryptocurrencies, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.1700-1701, 2015. ,
DOI : 10.1007/978-3-662-44381-1_24
From dirt to shovels: Fully automatic tool generation from ad hoc data, Proceedings of the 35th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL '08, pp.421-434, 2008. ,
DOI : 10.1145/1328438.1328488
The Internet Blockchain, Proceedings of the 15th ACM Workshop on Hot Topics in Networks, HotNets '16, pp.204-210, 2016. ,
DOI : 10.1145/279227.279229
Self-managed and blockchainbased vehicular ad-hoc networks, 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct, UbiComp '16, pp.137-140, 2016. ,
Extracting Output Formats from Executables, 2006 13th Working Conference on Reverse Engineering, pp.23-27, 2006. ,
DOI : 10.1109/WCRE.2006.29
URL : http://cs.wisc.edu/~liblit/wcre-2006/wcre-2006.pdf
Making Smart Contracts Smarter, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS'16, pp.254-269, 2016. ,
DOI : 10.1145/359545.359563
URL : http://dl.acm.org/ft_gateway.cfm?id=2978309&type=pdf
Demystifying Incentives in the Consensus Computer, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.706-719, 2015. ,
DOI : 10.1007/978-3-662-46803-6_10
Bitcoin: A peer-to-peer electronic cash system, 2009. ,
Remote Debugging and Reflection in Resource Constrained Devices . Theses, 2013. ,
URL : https://hal.archives-ouvertes.fr/tel-00932796
Debugging reactive programming with reactive inspector, Proceedings of the 38th International Conference on Software Engineering Companion, ICSE '16, pp.728-730, 2016. ,
DOI : 10.1145/2884781.2884815
Recovery of Class Hierarchies and Composition Relationships from Machine Code, pp.61-84, 2014. ,
DOI : 10.1007/978-3-642-54807-9_4