K. Bhargavan, A. Delignat-lavaud, C. Fournet, A. Gollamudi, G. Gonthier et al., Formal Verification of Smart Contracts, Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security, PLAS'16, pp.91-96, 2016.
DOI : 10.1145/2535838.2535889

URL : https://hal.archives-ouvertes.fr/hal-01400469

V. Buterin, A Next-Generation Smart Contract and Decentralized Application Platform, pp.2016-2027, 2014.

R. Canetti, B. Riva, and G. N. Rothblum, Practical delegation of computation using multiple servers, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.445-454, 2011.
DOI : 10.1145/2046707.2046759

R. Edstroem and J. Pettersson, Safer smart contracts through type-driven development, 2016.

S. Jain, P. Saxena, F. Stephan, and J. Teutsch, How to verify computation with a rational network, 2016.

J. Teutsch and C. Reitwiessner, A scalable verification solution for blockchains, 2017.

L. Kislay-anand-kartik-rai and . Madan, Software Crisis, International Joutnal of Innovative Research in Technology, vol.1, 2014.

L. Luu, D. Chu, and H. Olickel, Prateek Saxena, and Aquinas Hobor Making Smart Contracts Smarter, Cryptology ePrint Archive, 2016.
DOI : 10.1145/2976749.2978309

URL : http://dl.acm.org/ft_gateway.cfm?id=2978309&type=pdf

C. Reitwiessner, Security Alert Solidity Variables can be overwritten in storage. https://blog.ethereum.org/2016/11/09/analysis-storage-corruption-bug, pp.2016-2028, 2016.

P. Vessenes, Deconstructing theDAO Attack: A Brief Code Tour. http://vessenes.com/deconstructing-thedao-attack-a-brief-code-tour, pp.2016-2028, 2016.

G. Wood, Ethereum: A Secure Decentralised Generalised Transaction Ledger Accessed, pp.2016-2028, 2015.