{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T18:12:14Z","timestamp":1764785534954,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031800191"},{"type":"electronic","value":"9783031800207"}],"license":[{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-80020-7_15","type":"book-chapter","created":{"date-parts":[[2024,12,14]],"date-time":"2024-12-14T07:30:29Z","timestamp":1734161429000},"page":"265-285","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Semantics-Based Static Vulnerability Detection in\u00a0Solidity Using Abstract Interpretation"],"prefix":"10.1007","author":[{"given":"Maitri","family":"Kushwaha","sequence":"first","affiliation":[]},{"given":"Arnab","family":"Mukherjee","sequence":"additional","affiliation":[]},{"given":"Aishwarya","family":"Pandey","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8873-8258","authenticated-orcid":false,"given":"Raju","family":"Halder","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,15]]},"reference":[{"issue":"1","key":"15_CR1","first-page":"24","volume":"37","author":"A Cortesi","year":"2011","unstructured":"Cortesi, A., Zanioli, M.: Widening and narrowing operators for abstract interpretation. Comput. Lang. Syst. Struct. 37(1), 24\u201342 (2011)","journal-title":"Comput. Lang. Syst. Struct."},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Cousot, P., Cousot, R.: Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. In: Proceedings of the 4th Symposium on Principles of Programming Languages, pp. 238\u2013252 (1977)","DOI":"10.1145\/512950.512973"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Cousot, P., Cousot, R.: Abstract interpretation: past, present and future. In: Proceedings of the Joint Meeting of the 23rd EACSL Annual Conference on Computer Science Logic and the 29th Annual Symposium on Logic in Computer Science, pp. 1\u201310 (2014)","DOI":"10.1145\/2603088.2603165"},{"key":"15_CR4","unstructured":"Daian, P.: Analysis of the DAO exploit. Hacking, Distributed, vol. 6 (2016)"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Durieux, T., et\u00a0al.: Empirical review of automated analysis tools on 47,587 ethereum smart contracts. In: Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering, pp. 530\u2013541 (2020)","DOI":"10.1145\/3377811.3380364"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Albert, E., et\u00a0al.: EthIR: a framework for high-level analysis of ethereum bytecode. In: International Symposium on Automated Technology for Verification and Analysis, pp. 513\u2013520. Springer (2018)","DOI":"10.1007\/978-3-030-01090-4_30"},{"key":"15_CR7","unstructured":"Brent, L., et\u00a0al.: Vandal: a scalable security analysis framework for smart contracts. arXiv preprint arXiv:1809.03981 (2018)"},{"issue":"3","key":"15_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3391195","volume":"53","author":"H Chen","year":"2020","unstructured":"Chen, H., et al.: A survey on ethereum systems security: vulnerabilities, attacks, and defenses. ACM Comput. Surv. (CSUR) 53(3), 1\u201343 (2020)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"15_CR9","unstructured":"Salzer, G., et\u00a0al.: SB Curated dataset. https:\/\/github.com\/smartbugs\/smartbugs-curated. Accessed 24 July 2024"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Feist, J., Grieco, G., Groce, A.: Slither: a static analysis framework for smart contracts. In: 2019 IEEE\/ACM 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB), pp. 8\u201315. IEEE (2019)","DOI":"10.1109\/WETSEB.2019.00008"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Halder, R.: State-based invariant property generation of solidity smart contracts using abstract interpretation. In: 7th IEEE International Conference on Blockchain (IEEE Blockchain 2024), Copenhagen, Denmark, pp. 235\u2013242. IEEE Press (2024)","DOI":"10.1109\/Blockchain62396.2024.00038"},{"issue":"9","key":"15_CR12","doi-asserted-by":"publisher","first-page":"1240","DOI":"10.1016\/j.scico.2012.05.007","volume":"78","author":"R Halder","year":"2013","unstructured":"Halder, R., Cortesi, A.: Abstract program slicing on dependence condition graphs. Sci. Comput. Program. 78(9), 1240\u20131263 (2013)","journal-title":"Sci. Comput. Program."},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Halder, R., Zanioli, M., Cortesi, A.: Information leakage analysis of database query languages. In: Proceedings of the 29th Annual ACM Symposium on Applied Computing, pp. 813\u2013820 (2014)","DOI":"10.1145\/2554850.2554862"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Jeannet, B., Min\u00e9, A.: Apron: a library of numerical abstract domains for static analysis. In: International Conference on Computer Aided Verification, pp. 661\u2013667. Springer (2009)","DOI":"10.1007\/978-3-642-02658-4_52"},{"key":"15_CR15","unstructured":"Jeon, S., Lee, G., Kim, H., Woo, S.S.: SmartCondetect: highly accurate smart contract code vulnerability detection mechanism using BERT. In: KDD Workshop on Programming Language Processing (2021)"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Kalra, S., Goel, S., Dhawan, M., Sharma, S.: ZEUS: analyzing safety of smart contracts. In: NDSS, pp. 1\u201312 (2018)","DOI":"10.14722\/ndss.2018.23082"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"K\u00fcchler, A., Wenning, L., Wendland, F.: AbsIntIO: towards showing the absence of integer overflows in binaries using abstract interpretation. In: Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, pp. 247\u2013258 (2023)","DOI":"10.1145\/3579856.3582814"},{"issue":"1","key":"15_CR18","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/s10515-024-00418-z","volume":"31","author":"Y Liu","year":"2024","unstructured":"Liu, Y., Wang, C., Ma, Y.: DL4SC: a novel deep learning-based vulnerability detection framework for smart contracts. Autom. Softw. Eng. 31(1), 24 (2024)","journal-title":"Autom. Softw. Eng."},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Luu, L., et\u00a0al.: Making smart contracts smarter. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 254\u2013269 (2016)","DOI":"10.1145\/2976749.2978309"},{"key":"15_CR20","unstructured":"Mueller, B.: Smashing ethereum smart contracts for fun and actual profit. In: Proceedings of the HITB Security Conference (2018)"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Nikoli\u0107, I., Kolluri, A., Sergey, I., Saxena, P., Hobor, A.: Finding the greedy, prodigal, and suicidal contracts at scale. In: Proceedings of the 34th Annual Computer Security Applications Conference, pp. 653\u2013663 (2018)","DOI":"10.1145\/3274694.3274743"},{"key":"15_CR22","unstructured":"Suiche, M.: The \\$280 m ethereum\u2019s parity bug. A Critical Security Vulnerability in Parity Multi-sig Wallet (2017)"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Tikhomirov, S., et\u00a0al.: SmartCheck: Static analysis of ethereum smart contracts. In: Proceedings of the 1st International Workshop on Emerging Trends in Software Engineering for Blockchain, pp. 9\u201316 (2018)","DOI":"10.1145\/3194113.3194115"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-80020-7_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,14]],"date-time":"2024-12-14T08:05:52Z","timestamp":1734163552000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-80020-7_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,15]]},"ISBN":["9783031800191","9783031800207"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-80020-7_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,12,15]]},"assertion":[{"value":"15 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICISS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jaipur","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciss2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iciss.isrdc.in","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}