{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T12:53:47Z","timestamp":1743080027625,"version":"3.40.3"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031301216"},{"type":"electronic","value":"9783031301223"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-30122-3_19","type":"book-chapter","created":{"date-parts":[[2023,3,31]],"date-time":"2023-03-31T07:03:57Z","timestamp":1680246237000},"page":"305-321","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Finding Unchecked Low-Level Calls with\u00a0Zero False Positives and\u00a0Negatives in\u00a0Ethereum Smart Contracts"],"prefix":"10.1007","author":[{"given":"Puneet","family":"Gill","sequence":"first","affiliation":[]},{"given":"Indrani","family":"Ray","sequence":"additional","affiliation":[]},{"given":"Alireza Lotfi","family":"Takami","sequence":"additional","affiliation":[]},{"given":"Mahesh","family":"Tripunitara","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,1]]},"reference":[{"doi-asserted-by":"publisher","unstructured":"Amani, S., Begel, M., Bortin, M., Staples, M.: Towards verifying Ethereum smart contract bytecode in Isabelle\/HOL. In: Proceedings of the 7th ACM SIGPLAN International Conference on Certified Programs and Proofs, CPP 2018, New York, NY, USA, pp. 66\u201367 (2018). https:\/\/doi.org\/10.1145\/3167084","key":"19_CR1","DOI":"10.1145\/3167084"},{"doi-asserted-by":"publisher","unstructured":"Bhargavan, K., et al.: Formal verification of smart contracts: short paper. In: Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security, PLAS 2016, New York, NY, USA, pp. 91\u201396 (2016). https:\/\/doi.org\/10.1145\/2993600.2993611","key":"19_CR2","DOI":"10.1145\/2993600.2993611"},{"unstructured":"Bozzano, M., et al.: nuxmv 2.0.0 user manual (2019). https:\/\/es.fbk.eu\/tools\/nuxmv\/downloads\/nuxmv-user-manual.pdf","key":"19_CR3"},{"doi-asserted-by":"publisher","unstructured":"Brent, L., et al.: Vandal: a scalable security analysis framework for smart contracts (2018). https:\/\/doi.org\/10.48550\/ARXIV.1809.03981","key":"19_CR4","DOI":"10.48550\/ARXIV.1809.03981"},{"doi-asserted-by":"publisher","unstructured":"Cecchetti, E., Yao, S., Ni, H., Myers, A.C.: Compositional security for reentrant applications. In: 2021 IEEE Symposium on Security and Privacy (SP), pp. 1249\u20131267 (2021). https:\/\/doi.org\/10.1109\/SP40001.2021.00084","key":"19_CR5","DOI":"10.1109\/SP40001.2021.00084"},{"issue":"2","key":"19_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3460093","volume":"5","author":"W Chen","year":"2021","unstructured":"Chen, W., et al.: SADPonzi: detecting and characterizing Ponzi schemes in Ethereum smart contracts. Proc. ACM Meas. Anal. Comput. Syst. 5(2), 1\u201330 (2021). https:\/\/doi.org\/10.1145\/3460093","journal-title":"Proc. ACM Meas. Anal. Comput. Syst."},{"doi-asserted-by":"publisher","unstructured":"Chinen, Y., Yanai, N., Cruz, J.P., Okamura, S.: RA: hunting for re-entrancy attacks in Ethereum smart contracts via static analysis. In: 2020 IEEE International Conference on Blockchain (Blockchain), pp. 327\u2013336 (2020). https:\/\/doi.org\/10.1109\/Blockchain50366.2020.00048","key":"19_CR7","DOI":"10.1109\/Blockchain50366.2020.00048"},{"doi-asserted-by":"crossref","unstructured":"Durieux, T., Ferreira, J.F., Abreu, R., Cruz, P.: Empirical review of automated analysis tools on 47,587 Ethereum smart contracts. In: Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering, ICSE 2020, New York, NY, USA, pp. 530\u2013541 (2020)","key":"19_CR8","DOI":"10.1145\/3377811.3380364"},{"unstructured":"Durieux, T., Ferreira, J.F., Abreu, R., Cruz, P.: Smartbugs repository. https:\/\/github.com\/smartbugs\/smartbugs. Accessed July 2022","key":"19_CR9"},{"unstructured":"Ethereum: Solidity. https:\/\/docs.soliditylang.org\/. Accessed July 2022","key":"19_CR10"},{"unstructured":"ethereum.org: Welcome to ethereum. https:\/\/ethereum.org\/. Accessed July 2022","key":"19_CR11"},{"unstructured":"Frank, J., Aschermann, C., Holz, T.: ETHBMC: a bounded model checker for smart contracts. In: USENIX Security Symposium, USENIX 2020, pp. 2757\u20132774 (2020)","key":"19_CR12"},{"doi-asserted-by":"crossref","unstructured":"Ghaleb, A., Pattabiraman, K.: How effective are smart contract analysis tools? evaluating smart contract static analysis tools using bug injection. In: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 2020, pp. 415\u2013427. Association for Computing Machinery, New York (2020)","key":"19_CR13","DOI":"10.1145\/3395363.3397385"},{"doi-asserted-by":"crossref","unstructured":"Grech, N., Kong, M., Jurisevic, A., Brent, L., Scholz, B., Smaragdakis, Y.: MadMax: surviving out-of-gas conditions in ethereum smart contracts. In: Proceedings of the ACM on Programming Languages. OOPSLA, vol. 2, pp. 1\u201327. New York (2018)","key":"19_CR14","DOI":"10.1145\/3276486"},{"unstructured":"IBM: What is blockchain technology? https:\/\/www.ibm.com\/topics\/what-is-blockchain. Accessed July 2022","key":"19_CR15"},{"doi-asserted-by":"publisher","unstructured":"Kalra, S., Goel, S., Dhawan, M., Sharma, S.: ZEUS: analyzing safety of smart contracts. In: Network and Distributed Systems Security (NDSS) Symposium, NDSS 2018, pp. 18\u201321 (2018). https:\/\/doi.org\/10.14722\/ndss.2018.23082, http:\/\/pages.cpsc.ucalgary.ca\/~joel.reardon\/blockchain\/readings\/ndss2018_09-1_Kalra_paper.pdf","key":"19_CR16","DOI":"10.14722\/ndss.2018.23082"},{"unstructured":"Kripke, S.: Semantical considerations on modal logic. Acta Philos. Fennica 83\u201394 (1963)","key":"19_CR17"},{"unstructured":"Krupp, J., Rossow, C.: teEther: gnawing at Ethereum to automatically exploit smart contracts. In: USENIX Security Symposium, USENIX 2018, pp. 1317\u20131333 (2018)","key":"19_CR18"},{"doi-asserted-by":"crossref","unstructured":"Luu, L., Chu, D.H., Olickel, H., Saxena, P., Hobor, A.: Making smart contracts smarter. In: CCS, CCS 2016, New York, NY, USA, pp. 254\u2013269 (2016)","key":"19_CR19","DOI":"10.1145\/2976749.2978309"},{"doi-asserted-by":"publisher","unstructured":"Maxino, T.: Revisiting Fletcher and Adler Checksums. DSN 2006 Student Forum (2006). https:\/\/doi.org\/10.1184\/R1\/6625619.v1, https:\/\/kilthub.cmu.edu\/articles\/journal_contribution\/Revisiting_Fletcher_and_Adler_Checksums\/6625619","key":"19_CR20","DOI":"10.1184\/R1\/6625619.v1"},{"doi-asserted-by":"publisher","unstructured":"Mossberg, M., et al.: Manticore: a user-friendly symbolic execution framework for binaries and smart contracts. In: IEEE\/ACM International Conference on Automated Software Engineering (ASE), ASE 2019, pp. 1186\u20131189 (2019). https:\/\/doi.org\/10.1109\/ASE.2019.00133","key":"19_CR21","DOI":"10.1109\/ASE.2019.00133"},{"unstructured":"Mueller, B.: Smashing Ethereum smart contracts for fun and real profit. In: 9th Annual HITB Security Conference (HITBSecConf) (2018)","key":"19_CR22"},{"unstructured":"NCC Group: Decentralized security project (2022). https:\/\/dasp.co","key":"19_CR23"},{"doi-asserted-by":"publisher","unstructured":"Nehai, Z., Piriou, P.Y., Daumas, F.: Model-checking of smart contracts. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 980\u2013987 (2018). https:\/\/doi.org\/10.1109\/Cybermatics_2018.2018.00185","key":"19_CR24","DOI":"10.1109\/Cybermatics_2018.2018.00185"},{"doi-asserted-by":"publisher","unstructured":"Nikolic, I., Kolluri, A., Sergey, I., Saxena, P., Hobor, A.: Finding the greedy, prodigal, and suicidal contracts at scale. In: Proceedings of the 34th Annual Computer Security Applications Conference, ACSAC 2018, New York, NY, USA, pp. 653\u2013663 (D2018). https:\/\/doi.org\/10.1145\/3274694.3274743","key":"19_CR25","DOI":"10.1145\/3274694.3274743"},{"unstructured":"Perez, D., Livshits, B.: Smart contract vulnerabilities: vulnerable does not imply exploited. In: USENIX Security Symposium, pp. 1325\u20131341 (2021)","key":"19_CR26"},{"unstructured":"Rameder, H.: Systematic review of Ethereum smart contract security vulnerabilities, analysis methods and tools. Diploma thesis (2021). https:\/\/doi.org\/10.34726\/hss.2021.86784","key":"19_CR27"},{"unstructured":"Rodler, M., Li, W., Karame, G.O., Davi, L.: EVMPatch: timely and automated patching of ethereum smart contracts. In: USENIX Security Symposium, pp. 1289\u20131306 (2021)","key":"19_CR28"},{"issue":"2","key":"19_CR29","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/S0022-0000(70)80006-X","volume":"4","author":"WJ Savitch","year":"1970","unstructured":"Savitch, W.J.: Relationships between nondeterministic and deterministic tape complexities. J. Comput. Syst. Sci. 4(2), 177\u2013192 (1970). https:\/\/doi.org\/10.1016\/S0022-0000(70)80006-X","journal-title":"J. Comput. Syst. Sci."},{"doi-asserted-by":"publisher","unstructured":"Schneidewind, C., Grishchenko, I., Scherer, M., Maffe, M.: eThor: practical and provably sound static analysis of Ethereum smart contracts. In: CCS, CCS 2020, New York, NY, USA, pp. 621\u2013640 (2020). https:\/\/doi.org\/10.1145\/3372297.3417250","key":"19_CR30","DOI":"10.1145\/3372297.3417250"},{"issue":"7","key":"19_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3464421","volume":"54","author":"P Tolmach","year":"2021","unstructured":"Tolmach, P., Li, Y., Lin, S.W., Liu, Y., Li, Z.: A survey of smart contract formal specification and verification. ACM Comput. Surv. 54(7), 1\u201338 (2021)","journal-title":"ACM Comput. Surv."},{"doi-asserted-by":"publisher","unstructured":"Tsankov, P., Dan, A., Cohen, D.D., Gervais, A., Buenzli, F., Vechev, M.: Securify: practical security analysis of smart contracts. In: CCS, CCS 2018, New York, NY, USA, pp. 67\u201382 (2018). https:\/\/doi.org\/10.1145\/3243734.3243780","key":"19_CR32","DOI":"10.1145\/3243734.3243780"},{"unstructured":"Wood, G.: Ethereum: a secure decentralised generalised transaction ledger. Technical report Version 3078285, Ethereum & Parity (2022). https:\/\/ethereum.github.io\/yellowpaper\/paper.pdf","key":"19_CR33"},{"doi-asserted-by":"crossref","unstructured":"Xi, R., Pattabiraman, K.: When they go low: Automated replacement of low-level functions in Ethereum smart contracts. In: 2022 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), pp. 995\u20131005 (2022)","key":"19_CR34","DOI":"10.1109\/SANER53432.2022.00117"},{"unstructured":"Zhang, M., Zhang, X., Zhang, Y., Lin, Z.: TXSPECTOR: uncovering attacks in Ethereum from transactions. In: USENIX Security Symposium, pp. 2775\u20132792 (2020)","key":"19_CR35"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-30122-3_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,31]],"date-time":"2023-03-31T07:12:50Z","timestamp":1680246770000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-30122-3_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031301216","9783031301223"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-30122-3_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"1 April 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FPS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Foundations and Practice of Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ottawa, ON","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fps2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.fps-2022.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easy chair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"83","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}