{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T05:55:11Z","timestamp":1768283711774,"version":"3.49.0"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031488054","type":"print"},{"value":"9783031488061","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,12,5]],"date-time":"2023-12-05T00:00:00Z","timestamp":1701734400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,5]],"date-time":"2023-12-05T00:00:00Z","timestamp":1701734400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-48806-1_28","type":"book-chapter","created":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T17:02:12Z","timestamp":1701709332000},"page":"439-455","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Consolidation of\u00a0Ground Truth Sets for\u00a0Weakness Detection in\u00a0Smart Contracts"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4217-4530","authenticated-orcid":false,"given":"Monika","family":"di Angelo","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8950-1551","authenticated-orcid":false,"given":"Gernot","family":"Salzer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,5]]},"reference":[{"key":"28_CR1","doi-asserted-by":"publisher","unstructured":"di Angelo, M., Salzer, G.: Consolidation of ground truth sets for weakness detection in smart contracts. arXiv preprint 2304.11624 (2023). https:\/\/doi.org\/10.48550\/arXiv.2304.11624","DOI":"10.48550\/arXiv.2304.11624"},{"key":"28_CR2","doi-asserted-by":"publisher","unstructured":"Bosu, M.F., MacDonell, S.G.: A taxonomy of data quality challenges in empirical software engineering. In: 2013 22nd Australian Software Engineering Conference, pp. 97\u2013106. IEEE (2013). https:\/\/doi.org\/10.1109\/ASWEC.2013.21","DOI":"10.1109\/ASWEC.2013.21"},{"key":"28_CR3","doi-asserted-by":"publisher","unstructured":"Chen, J., Xia, X., Lo, D., Grundy, J., Luo, X., Chen, T.: Defining smart contract defects on ethereum. IEEE Trans. Softw. Eng. (2020). https:\/\/doi.org\/10.1109\/TSE.2020.2989002","DOI":"10.1109\/TSE.2020.2989002"},{"key":"28_CR4","doi-asserted-by":"publisher","unstructured":"Durieux, T., Ferreira, J.F., Abreu, R., Cruz, P.: Empirical review of automated analysis tools on 47,587 Ethereum smart contracts. In: Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering, pp. 530\u2013541. ACM, New York, NY, USA (2020). https:\/\/doi.org\/10.1145\/3377811.3380364","DOI":"10.1145\/3377811.3380364"},{"key":"28_CR5","doi-asserted-by":"publisher","unstructured":"Ferreira, J.F., Cruz, P., Durieux, T., Abreu, R.: SmartBugs: a framework to analyze solidity smart contracts. In: 35th IEEE\/ACM International Conference on Automated Software Engineering (ASE 2020), pp. 1349\u20131352. ACM (2020). https:\/\/doi.org\/10.1145\/3324884.3415298","DOI":"10.1145\/3324884.3415298"},{"key":"28_CR6","doi-asserted-by":"publisher","unstructured":"Ghaleb, A., Pattabiraman, K.: How effective are smart contract analysis tools? evaluating smart contract static analysis tools using bug injection. In: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 415\u2013427. ISSTA 2020, Association for Computing Machinery (2020). https:\/\/doi.org\/10.1145\/3395363.3397385","DOI":"10.1145\/3395363.3397385"},{"key":"28_CR7","doi-asserted-by":"publisher","unstructured":"Grech, N., Brent, L., Scholz, B., Smaragdakis, Y.: Gigahorse: thorough, declarative decompilation of smart contracts. In: 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE), pp. 1176\u20131186. IEEE (2019). https:\/\/doi.org\/10.1109\/ICSE.2019.00120","DOI":"10.1109\/ICSE.2019.00120"},{"key":"28_CR8","doi-asserted-by":"publisher","unstructured":"Jiang, B., Liu, Y., Chan, W.K.: Contractfuzzer: fuzzing smart contracts for vulnerability detection. In: Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering, pp. 259\u2013269. ASE 2018, Association for Computing Machinery (2018). https:\/\/doi.org\/10.1145\/3238147.3238177","DOI":"10.1145\/3238147.3238177"},{"key":"28_CR9","doi-asserted-by":"publisher","unstructured":"Kalra, S., Goel, S., Dhawan, M., Sharma, S.: ZEUS: analyzing safety of smart contracts. In: NDSS Symposion. NDSS, Internet Society (2018). https:\/\/doi.org\/10.14722\/ndss.2018.23082","DOI":"10.14722\/ndss.2018.23082"},{"key":"28_CR10","doi-asserted-by":"publisher","unstructured":"Kolluri, A., Nikolic, I., Sergey, I., Hobor, A., Saxena, P.: Exploiting the laws of order in smart contracts. In: Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 363\u2013373. ISSTA 2019, Association for Computing Machinery, New York, NY, USA (2019). https:\/\/doi.org\/10.1145\/3293882.3330560","DOI":"10.1145\/3293882.3330560"},{"key":"28_CR11","doi-asserted-by":"publisher","DOI":"10.3389\/fbloc.2022.814977","author":"H Rameder","year":"2022","unstructured":"Rameder, H., Angelo, M.D., Salzer, G.: Review of automated vulnerability analysis of smart contracts on ethereum. Front. Blockchain - Smart Contracts (2022). https:\/\/doi.org\/10.3389\/fbloc.2022.814977","journal-title":"Front. Blockchain - Smart Contracts"},{"key":"28_CR12","doi-asserted-by":"publisher","unstructured":"Ren, M., et al.: Empirical evaluation of smart contract testing: what is the best choice? In: Proceedings of the 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 566\u2013579 (2021). https:\/\/doi.org\/10.1145\/3460319.3464837","DOI":"10.1145\/3460319.3464837"},{"key":"28_CR13","doi-asserted-by":"publisher","unstructured":"Schneidewind, C., Grishchenko, I., Scherer, M., Maffei, M.: EThor: practical and provably sound static analysis of ethereum smart contracts. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 621\u2013640 (2020). https:\/\/doi.org\/10.1145\/3372297.3417250","DOI":"10.1145\/3372297.3417250"},{"key":"28_CR14","doi-asserted-by":"publisher","unstructured":"Soud, M., Qasse, I., Liebel, G., Hamdaqa, M.: Automesc: automatic framework for mining and classifying ethereum smart contract vulnerabilities and their fixes. arXiv preprint arXiv:2212.10660 (2022). https:\/\/doi.org\/10.48550\/arXiv.2212.10660","DOI":"10.48550\/arXiv.2212.10660"},{"issue":"189","key":"28_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3360615","volume":"3","author":"S Wang","year":"2019","unstructured":"Wang, S., Zhang, C., Su, Z.: Detecting nondeterministic payment bugs in ethereum smart contracts. Proc. ACM Program. Lang. (PACMPL) 3(189), 1\u201329 (2019). https:\/\/doi.org\/10.1145\/3360615","journal-title":"Proc. ACM Program. Lang. (PACMPL)"},{"key":"28_CR16","doi-asserted-by":"publisher","unstructured":"Xue, Y., et al.: Doublade: unknown vulnerability detection in smart contracts via abstract signature matching and refined detection rules. arXiv preprint arXiv:1912.04466 (2019). https:\/\/doi.org\/10.48550\/arXiv.1912.04466","DOI":"10.48550\/arXiv.1912.04466"},{"key":"28_CR17","doi-asserted-by":"publisher","unstructured":"Yashavant, C.S., Kumar, S., Karkare, A.: Scrawld: a dataset of real world ethereum smart contracts labelled with vulnerabilities. arXiv preprint arXiv:2202.11409 (2022). https:\/\/doi.org\/10.48550\/arXiv.2202.11409","DOI":"10.48550\/arXiv.2202.11409"},{"key":"28_CR18","doi-asserted-by":"publisher","unstructured":"Zhang, P., Xiao, F., Luo, X.: A framework and dataset for bugs in ethereum smart contracts. In: IEEE International Conference on Software Maintenance and Evolution (ICSME), pp. 139\u2013150. ICSME 2020, IEEE (2020). https:\/\/doi.org\/10.1109\/icsme46990.2020.00023","DOI":"10.1109\/icsme46990.2020.00023"},{"key":"28_CR19","unstructured":"Zhou, S., Yang, Z., Xiang, J., Cao, Y., Yang, Z., Zhang, Y.: An ever-evolving game: evaluation of real-world attacks and defenses in ethereum ecosystem. In: 29th USENIX Security Symposium (USENIX Security 20), pp. 2793\u20132810. USENIX Security 2020, USENIX Association (2020). https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/zhou-shunfan"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security. FC 2023 International Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-48806-1_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T17:06:35Z","timestamp":1701709595000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-48806-1_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,5]]},"ISBN":["9783031488054","9783031488061"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-48806-1_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,5]]},"assertion":[{"value":"5 December 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bol, Bra\u010d","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Croatia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 May 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 May 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc23.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"HotCRP","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"182","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"For the workshops 7 full papers have been accepted from 18 submissions.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}