Follow
Ningyu He (贺宁宇)
Ningyu He (贺宁宇)
Ph.D. candidate, Peking University
Verified email at pku.edu.cn - Homepage
Title
Cited by
Cited by
Year
{EOSAFE}: Security analysis of {EOSIO} smart contracts
N He, R Zhang, H Wang, L Wu, X Luo, Y Guo, T Yu, X Jiang
30th USENIX Security Symposium (USENIX Security 21), 1271-1288, 2021
87*2021
Characterizing code clones in the Ethereum smart contract ecosystem
N He, L Wu, H Wang, Y Guo, X Jiang
The 24th International Conference on Financial Cryptography and Data …, 2020
872020
Sadponzi: Detecting and characterizing ponzi schemes in ethereum smart contracts
W Chen, X Li, Y Sui, N He, H Wang, L Wu, X Luo
Proceedings of the ACM on Measurement and Analysis of Computing Systems 5 (2 …, 2021
562021
DEPOSafe: Demystifying the Fake Deposit Vulnerability in Ethereum Smart Contracts
R Ji, N He, L Wu, H Wang, G Bai, Y Guo
The 25th International Conference on Engineering of Complex Computer Systems …, 2020
152020
A survey on eosio systems security: Vulnerability, attack, and mitigation
N He, H Wang, L Wu, X Luo, Y Guo, X Chen
arXiv preprint arXiv:2207.09227, 2022
72022
Understanding the evolution of blockchain ecosystems: a longitudinal measurement study of bitcoin, ethereum, and eosio
N He, W Su, Z Yu, X Liu, F Zhao, H Wang, X Luo, G Tyson, L Wu, Y Guo
arXiv preprint arXiv:2110.07534, 2021
62021
Eunomia: Enabling User-specified Fine-Grained Search in Symbolically Executing WebAssembly Binaries
N He, Z Zhao, J Wang, Y Hu, S Guo, H Wang, G Liang, D Li, X Chen, ...
The ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), 2023
42023
A Deep Dive into NFT Rug Pulls
J Huang, N He, K Ma, J Xiao, H Wang
arXiv preprint arXiv:2305.06108, 2023
32023
Symgx: Detecting cross-boundary pointer vulnerabilities of sgx applications via static symbolic execution
Y Wang, Z Zhang, N He, Z Zhong, S Guo, Q Bao, D Li, Y Guo, X Chen
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
22023
Put Your Memory in Order: Efficient Domain-based Memory Isolation for WASM Applications
H Lei, Z Zhang, S Zhang, P Jiang, Z Zhong, N He, D Li, Y Guo, X Chen
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
22023
BREWasm: A General Static Binary Rewriting Framework for WebAssembly
S Cao, N He, Y Guo, H Wang
International Static Analysis Symposium, 139-163, 2023
22023
WRTester: Differential Testing of WebAssembly Runtimes via Semantic-aware Binary Generation
S Cao, N He, X She, Y Zhang, M Zhang, H Wang
arXiv preprint arXiv:2312.10456, 2023
12023
Miracle or Mirage? A Measurement Study of NFT Rug Pulls
J Huang, N He, K Ma, J Xiao, H Wang
Proceedings of the ACM on Measurement and Analysis of Computing Systems 7 (3 …, 2023
12023
WASMixer: Binary Obfuscation for WebAssembly
S Cao, N He, Y Guo, H Wang
arXiv preprint arXiv:2308.03123, 2023
12023
Abusing the Ethereum Smart Contract Verification Services for Fun and Profit
P Ma, N He, Y Huang, H Wang, X Luo
arXiv preprint arXiv:2307.00549, 2023
12023
WalletRadar: towards automating the detection of vulnerabilities in browser-based cryptocurrency wallets
P Xia, Y Guo, Z Lin, J Wu, P Duan, N He, K Wang, T Liu, Y Yue, G Xu, ...
Automated Software Engineering 31 (1), 32, 2024
2024
SoK: On the Security of Non-Fungible Tokens
K Ma, J Huang, N He, Z Wang, H Wang
arXiv preprint arXiv:2312.08000, 2023
2023
Fuzzing the Latest NTFS in Linux with Papora: An Empirical Study
E Lo, N He, Y Shi, J Xu, C Wu, D Li, Y Guo
17th IEEE Workshop on Offensive Technologies, 2023
2023
VETEOS: Statically Vetting EOSIO Contracts for the “Groundhog Day” Vulnerabilities
LT Li, N He, H Wang, M Zhang
The system can't perform the operation now. Try again later.
Articles 1–19