<> <http://www.w3.org/2000/01/rdf-schema#comment> "The repository administrator has not yet configured an RDF license."^^<http://www.w3.org/2001/XMLSchema#string> .
<> <http://xmlns.com/foaf/0.1/primaryTopic> <https://discovery.ucl.ac.uk/id/eprint/10182340> .
<https://discovery.ucl.ac.uk/id/eprint/10182340> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Article> .
<https://discovery.ucl.ac.uk/id/eprint/10182340> <http://purl.org/dc/terms/title> "Securify: Practical Security Analysis of Smart Contracts"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10182340> <http://purl.org/ontology/bibo/abstract> "Permissionless blockchains allow the execution of arbitrary programs (called smart contracts), enabling mutually untrusted entities\r\nto interact without relying on trusted third parties. Despite their\r\npotential, repeated security concerns have shaken the trust in handling billions of USD by smart contracts.\r\nTo address this problem, we present Securify, a security analyzer for Ethereum smart contracts that is scalable, fully automated,\r\nand able to prove contract behaviors as safe/unsafe with respect to\r\na given property. Securify’s analysis consists of two steps. First, it\r\nsymbolically analyzes the contract’s dependency graph to extract\r\nprecise semantic information from the code. Then, it checks compliance and violation patterns that capture sufficient conditions\r\nfor proving if a property holds or not. To enable extensibility, all\r\npatterns are specified in a designated domain-specific language.\r\nSecurify is publicly released, it has analyzed > 18K contracts\r\nsubmitted by its users, and is regularly used to conduct security\r\naudits by experts. We present an extensive evaluation of Securify\r\nover real-world Ethereum smart contracts and demonstrate that it\r\ncan effectively prove the correctness of smart contracts and discover\r\ncritical violations."^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10182340> <http://purl.org/dc/terms/date> "2018-10-15" .
<https://discovery.ucl.ac.uk/id/document/1680721> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Document> .
<https://discovery.ucl.ac.uk/id/org/ext-2af1883e4bbfa0356fcedb366171cb38> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Organization> .
<https://discovery.ucl.ac.uk/id/org/ext-2af1883e4bbfa0356fcedb366171cb38> <http://xmlns.com/foaf/0.1/name> "ACM"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10182340> <http://purl.org/dc/terms/publisher> <https://discovery.ucl.ac.uk/id/org/ext-2af1883e4bbfa0356fcedb366171cb38> .
<https://discovery.ucl.ac.uk/id/publication/ext-59fa8448af6f946c862d6cd76053f180> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Collection> .
<https://discovery.ucl.ac.uk/id/publication/ext-59fa8448af6f946c862d6cd76053f180> <http://xmlns.com/foaf/0.1/name> "Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10182340> <http://purl.org/dc/terms/isPartOf> <https://discovery.ucl.ac.uk/id/publication/ext-59fa8448af6f946c862d6cd76053f180> .
<https://discovery.ucl.ac.uk/id/eprint/10182340> <http://purl.org/ontology/bibo/status> <http://purl.org/ontology/bibo/status/published> .
<https://discovery.ucl.ac.uk/id/eprint/10182340> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-8c1e882d9b7df5d77cb54715b0255943> .
<https://discovery.ucl.ac.uk/id/eprint/10182340> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/10182340#authors> .
<https://discovery.ucl.ac.uk/id/eprint/10182340#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_1> <https://discovery.ucl.ac.uk/id/person/ext-8c1e882d9b7df5d77cb54715b0255943> .
<https://discovery.ucl.ac.uk/id/eprint/10182340> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-9b8fd4bf35af751c2aa53a4fed1cc7cd> .
<https://discovery.ucl.ac.uk/id/eprint/10182340> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/10182340#authors> .
<https://discovery.ucl.ac.uk/id/eprint/10182340#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_2> <https://discovery.ucl.ac.uk/id/person/ext-9b8fd4bf35af751c2aa53a4fed1cc7cd> .
<https://discovery.ucl.ac.uk/id/eprint/10182340> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-10ef9e950602a5db200dc62b46076202> .
<https://discovery.ucl.ac.uk/id/eprint/10182340> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/10182340#authors> .
<https://discovery.ucl.ac.uk/id/eprint/10182340#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_3> <https://discovery.ucl.ac.uk/id/person/ext-10ef9e950602a5db200dc62b46076202> .
<https://discovery.ucl.ac.uk/id/eprint/10182340> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-6881a186183a522ea0d76104099018e6> .
<https://discovery.ucl.ac.uk/id/eprint/10182340> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/10182340#authors> .
<https://discovery.ucl.ac.uk/id/eprint/10182340#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_4> <https://discovery.ucl.ac.uk/id/person/ext-6881a186183a522ea0d76104099018e6> .
<https://discovery.ucl.ac.uk/id/eprint/10182340> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-c83fa8256ac84f1ec523b4e523340531> .
<https://discovery.ucl.ac.uk/id/eprint/10182340> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/10182340#authors> .
<https://discovery.ucl.ac.uk/id/eprint/10182340#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_5> <https://discovery.ucl.ac.uk/id/person/ext-c83fa8256ac84f1ec523b4e523340531> .
<https://discovery.ucl.ac.uk/id/eprint/10182340> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-1f7484a4c0318db2762e0a468943c2a3> .
<https://discovery.ucl.ac.uk/id/eprint/10182340> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/10182340#authors> .
<https://discovery.ucl.ac.uk/id/eprint/10182340#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_6> <https://discovery.ucl.ac.uk/id/person/ext-1f7484a4c0318db2762e0a468943c2a3> .
<https://discovery.ucl.ac.uk/id/person/ext-9b8fd4bf35af751c2aa53a4fed1cc7cd> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> .
<https://discovery.ucl.ac.uk/id/person/ext-9b8fd4bf35af751c2aa53a4fed1cc7cd> <http://xmlns.com/foaf/0.1/givenName> "Andrei"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-9b8fd4bf35af751c2aa53a4fed1cc7cd> <http://xmlns.com/foaf/0.1/familyName> "Dan"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-9b8fd4bf35af751c2aa53a4fed1cc7cd> <http://xmlns.com/foaf/0.1/name> "Andrei Dan"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-1f7484a4c0318db2762e0a468943c2a3> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> .
<https://discovery.ucl.ac.uk/id/person/ext-1f7484a4c0318db2762e0a468943c2a3> <http://xmlns.com/foaf/0.1/givenName> "Martin"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-1f7484a4c0318db2762e0a468943c2a3> <http://xmlns.com/foaf/0.1/familyName> "Vechev"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-1f7484a4c0318db2762e0a468943c2a3> <http://xmlns.com/foaf/0.1/name> "Martin Vechev"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-c83fa8256ac84f1ec523b4e523340531> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> .
<https://discovery.ucl.ac.uk/id/person/ext-c83fa8256ac84f1ec523b4e523340531> <http://xmlns.com/foaf/0.1/givenName> "Florian"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-c83fa8256ac84f1ec523b4e523340531> <http://xmlns.com/foaf/0.1/familyName> "Bünzli"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-c83fa8256ac84f1ec523b4e523340531> <http://xmlns.com/foaf/0.1/name> "Florian Bünzli"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-10ef9e950602a5db200dc62b46076202> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> .
<https://discovery.ucl.ac.uk/id/person/ext-10ef9e950602a5db200dc62b46076202> <http://xmlns.com/foaf/0.1/givenName> "Dana"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-10ef9e950602a5db200dc62b46076202> <http://xmlns.com/foaf/0.1/familyName> "Drachsler-Cohen"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-10ef9e950602a5db200dc62b46076202> <http://xmlns.com/foaf/0.1/name> "Dana Drachsler-Cohen"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-8c1e882d9b7df5d77cb54715b0255943> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> .
<https://discovery.ucl.ac.uk/id/person/ext-8c1e882d9b7df5d77cb54715b0255943> <http://xmlns.com/foaf/0.1/givenName> "Petar"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-8c1e882d9b7df5d77cb54715b0255943> <http://xmlns.com/foaf/0.1/familyName> "Tsankov"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-8c1e882d9b7df5d77cb54715b0255943> <http://xmlns.com/foaf/0.1/name> "Petar Tsankov"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-6881a186183a522ea0d76104099018e6> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> .
<https://discovery.ucl.ac.uk/id/person/ext-6881a186183a522ea0d76104099018e6> <http://xmlns.com/foaf/0.1/givenName> "Arthur"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-6881a186183a522ea0d76104099018e6> <http://xmlns.com/foaf/0.1/familyName> "Gervais"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-6881a186183a522ea0d76104099018e6> <http://xmlns.com/foaf/0.1/name> "Arthur Gervais"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10182340> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Article> .
<https://discovery.ucl.ac.uk/id/eprint/10182340> <http://purl.org/ontology/bibo/presentedAt> <https://discovery.ucl.ac.uk/id/event/ext-f6733645ddf2505b32f7fd225c6fd618> .
<https://discovery.ucl.ac.uk/id/event/ext-f6733645ddf2505b32f7fd225c6fd618> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Conference> .
<https://discovery.ucl.ac.uk/id/event/ext-f6733645ddf2505b32f7fd225c6fd618> <http://purl.org/dc/terms/title> "CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10182340> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/EPrint> .
<https://discovery.ucl.ac.uk/id/eprint/10182340> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/ProceedingsSectionEPrint> .
<https://discovery.ucl.ac.uk/id/eprint/10182340> <http://purl.org/dc/terms/isPartOf> <https://discovery.ucl.ac.uk/id/repository> .
<https://discovery.ucl.ac.uk/id/eprint/10182340> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/1680721> .
<https://discovery.ucl.ac.uk/id/document/1680721> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/1680721> <http://www.w3.org/2000/01/rdf-schema#label> "Securify: Practical Security Analysis of Smart Contracts (Text)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10182340> <http://eprints.org/ontology/hasOther> <https://discovery.ucl.ac.uk/id/document/1680721> .
<https://discovery.ucl.ac.uk/id/document/1680721> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10182340/1/1806.01143.pdf> .
<https://discovery.ucl.ac.uk/id/document/1680721> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10182340/1/1806.01143.pdf> .
<https://discovery.ucl.ac.uk/id/eprint/10182340/1/1806.01143.pdf> <http://www.w3.org/2000/01/rdf-schema#label> "1806.01143.pdf"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10182340> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/1705314> .
<https://discovery.ucl.ac.uk/id/document/1705314> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/1705314> <http://www.w3.org/2000/01/rdf-schema#label> "Securify: Practical Security Analysis of Smart Contracts (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/1705314> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/1680721> .
<https://discovery.ucl.ac.uk/id/document/1705314> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/1680721> .
<https://discovery.ucl.ac.uk/id/document/1705314> <http://eprints.org/relation/isIndexCodesVersionOf> <https://discovery.ucl.ac.uk/id/document/1680721> .
<https://discovery.ucl.ac.uk/id/document/1705314> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10182340/2/indexcodes.txt> .
<https://discovery.ucl.ac.uk/id/document/1705314> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10182340/2/indexcodes.txt> .
<https://discovery.ucl.ac.uk/id/eprint/10182340/2/indexcodes.txt> <http://www.w3.org/2000/01/rdf-schema#label> "indexcodes.txt"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10182340> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/1705315> .
<https://discovery.ucl.ac.uk/id/document/1705315> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/1705315> <http://www.w3.org/2000/01/rdf-schema#label> "Securify: Practical Security Analysis of Smart Contracts (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/1705315> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/1680721> .
<https://discovery.ucl.ac.uk/id/document/1705315> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/1680721> .
<https://discovery.ucl.ac.uk/id/document/1705315> <http://eprints.org/relation/islightboxThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/1680721> .
<https://discovery.ucl.ac.uk/id/document/1705315> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10182340/3/lightbox.jpg> .
<https://discovery.ucl.ac.uk/id/document/1705315> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10182340/3/lightbox.jpg> .
<https://discovery.ucl.ac.uk/id/eprint/10182340/3/lightbox.jpg> <http://www.w3.org/2000/01/rdf-schema#label> "lightbox.jpg"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10182340> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/1705316> .
<https://discovery.ucl.ac.uk/id/document/1705316> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/1705316> <http://www.w3.org/2000/01/rdf-schema#label> "Securify: Practical Security Analysis of Smart Contracts (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/1705316> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/1680721> .
<https://discovery.ucl.ac.uk/id/document/1705316> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/1680721> .
<https://discovery.ucl.ac.uk/id/document/1705316> <http://eprints.org/relation/ispreviewThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/1680721> .
<https://discovery.ucl.ac.uk/id/document/1705316> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10182340/4/preview.jpg> .
<https://discovery.ucl.ac.uk/id/document/1705316> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10182340/4/preview.jpg> .
<https://discovery.ucl.ac.uk/id/eprint/10182340/4/preview.jpg> <http://www.w3.org/2000/01/rdf-schema#label> "preview.jpg"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10182340> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/1705317> .
<https://discovery.ucl.ac.uk/id/document/1705317> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/1705317> <http://www.w3.org/2000/01/rdf-schema#label> "Securify: Practical Security Analysis of Smart Contracts (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/1705317> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/1680721> .
<https://discovery.ucl.ac.uk/id/document/1705317> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/1680721> .
<https://discovery.ucl.ac.uk/id/document/1705317> <http://eprints.org/relation/ismediumThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/1680721> .
<https://discovery.ucl.ac.uk/id/document/1705317> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10182340/5/medium.jpg> .
<https://discovery.ucl.ac.uk/id/document/1705317> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10182340/5/medium.jpg> .
<https://discovery.ucl.ac.uk/id/eprint/10182340/5/medium.jpg> <http://www.w3.org/2000/01/rdf-schema#label> "medium.jpg"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10182340> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/1705318> .
<https://discovery.ucl.ac.uk/id/document/1705318> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/1705318> <http://www.w3.org/2000/01/rdf-schema#label> "Securify: Practical Security Analysis of Smart Contracts (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/1705318> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/1680721> .
<https://discovery.ucl.ac.uk/id/document/1705318> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/1680721> .
<https://discovery.ucl.ac.uk/id/document/1705318> <http://eprints.org/relation/issmallThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/1680721> .
<https://discovery.ucl.ac.uk/id/document/1705318> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10182340/6/small.jpg> .
<https://discovery.ucl.ac.uk/id/document/1705318> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10182340/6/small.jpg> .
<https://discovery.ucl.ac.uk/id/eprint/10182340/6/small.jpg> <http://www.w3.org/2000/01/rdf-schema#label> "small.jpg"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10182340> <http://www.w3.org/2000/01/rdf-schema#seeAlso> <https://discovery.ucl.ac.uk/id/eprint/10182340/> .
<https://discovery.ucl.ac.uk/id/eprint/10182340/> <http://purl.org/dc/elements/1.1/title> "HTML Summary of #10182340 \n\nSecurify: Practical Security Analysis of Smart Contracts\n\n" .
<https://discovery.ucl.ac.uk/id/eprint/10182340/> <http://purl.org/dc/elements/1.1/format> "text/html" .
<https://discovery.ucl.ac.uk/id/eprint/10182340/> <http://xmlns.com/foaf/0.1/primaryTopic> <https://discovery.ucl.ac.uk/id/eprint/10182340> .