- Security and Verification in Computing
- Blockchain Technology Applications and Security
- Generative Adversarial Networks and Image Synthesis
- Distributed systems and fault tolerance
- Advanced Malware Detection Techniques
- Cryptography and Data Security
- Face recognition and analysis
- Advanced Memory and Neural Computing
- Formal Methods in Verification
- Physical Unclonable Functions (PUFs) and Hardware Security
Nanyang Technological University
2020-2022
Institute of High Performance Computing
2020-2022
Agency for Science, Technology and Research
2020-2022
Most of the existing smart contract symbolic execution tools perform analysis on bytecode, which loses high-level semantic information presented in source code. This makes interactive tasks—such as visualization and debugging—extremely challenging, significantly limits tool usability. In this paper, we present SolSEE, a source-level engine for Solidity contracts. We describe design highlight its key features, demonstrate usages through Web-based user interface. SolSEE demonstrates advantages...
Decentralized finance (DeFi) has become one of the most successful applications blockchain and smart contracts. The DeFi ecosystem enables a wide range crypto-financial activities, while underlying contracts often contain bugs, with many vulnerabilities arising from unforeseen consequences composing protocols together. In this paper, we propose formal process-algebraic technique that models in compositional manner to allow for efficient property verification. We also conduct case study...
A smart contract is a computer program which allows users to automate their actions on the blockchain platform. Given significance of contracts in supporting important activities across industry sectors including supply chain, finance, legal and medical services, there strong demand for verification validation techniques. Yet, vast majority lack any kind formal specification, essential establishing correctness. In this survey, we investigate models specifications presented literature present...
Programming errors enable security attacks on smart contracts, which are used to manage large sums of financial assets. Automated program repair (APR) techniques aim reduce developers' burden manually fixing bugs by automatically generating patches for a given issue. Existing APR tools contracts focus mitigating typical contract vulnerabilities rather than violations functional specification. However, in decentralized (DeFi) the inconsistency between intended behavior and implementation...
Deep learning-based facial recognition systems have experienced increased media attention due to exhibiting unfair behavior. Large enterprises, such as IBM, shut down their and age prediction a consequence. Age is an especially difficult application with the issue of fairness remaining open research problem (e.g., predicting for different ethnicity equally accurate). One main causes behavior in methods lies distribution diversity training data. In this work, we present two novel approaches...