1 code implementation • 7 Jan 2021 • Nami Ashizawa, Naoto Yanai, Jason Paul Cruz, Shingo Okamura
Therefore, Eth2Vec can detect vulnerabilities in smart contracts by comparing the code similarity between target EVM bytecodes and the EVM bytecodes it already learned.
1 code implementation • 2 Jul 2020 • Yuichiro Chinen, Naoto Yanai, Jason Paul Cruz, Shingo Okamura
Ethereum smart contracts are programs that are deployed and executed in a consensus-based blockchain managed by a peer-to-peer network.
Cryptography and Security
no code implementations • 29 Nov 2018 • Hiromasa Kitai, Jason Paul Cruz, Naoto Yanai, Naohisa Nishida, Tatsumi Oba, Yuji Unagami, Tadanori Teruya, Nuttapong Attrapadung, Takahiro Matsuda, Goichiro Hanaoka
A privacy-preserving framework in which a computational resource provider receives encrypted data from a client and returns prediction results without decrypting the data, i. e., oblivious neural network or encrypted prediction, has been studied in machine learning that provides prediction services.