{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:33:27Z","timestamp":1754159607210,"version":"3.41.2"},"publisher-location":"Cham","reference-count":64,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031957604"},{"type":"electronic","value":"9783031957611"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-95761-1_5","type":"book-chapter","created":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T09:30:07Z","timestamp":1750498207000},"page":"123-152","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["HCC: A Language-Independent Hardening Contract Compiler for\u00a0Smart Contracts"],"prefix":"10.1007","author":[{"given":"Jens-Rene","family":"Giesen","sequence":"first","affiliation":[]},{"given":"Sebastien","family":"Andreina","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Rodler","sequence":"additional","affiliation":[]},{"given":"Ghassan","family":"Karame","sequence":"additional","affiliation":[]},{"given":"Lucas","family":"Davi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,22]]},"reference":[{"key":"5_CR1","doi-asserted-by":"publisher","unstructured":"Abadi, M., et al.: Control-flow Integrity. In: Proceedings of the ACM Conference on Computer and Communications Security (2005). https:\/\/doi.org\/10.1145\/1102120.1102165.","DOI":"10.1145\/1102120.1102165."},{"key":"5_CR2","unstructured":"Akhunov, A., Salem, M.: EIP-1153: Transient storage opcodes [DRAFT], June 2018. https:\/\/eips.ethereum.org\/EIPS\/eip-1153. Accessed 25 Mar 2022"},{"key":"5_CR3","doi-asserted-by":"publisher","unstructured":"Androulaki, E., et al.: Hyperledger fabric. In: Proceedings of the Thirteenth EuroSys Conference (2018). https:\/\/doi.org\/10.1145\/3190508.3190538","DOI":"10.1145\/3190508.3190538"},{"key":"5_CR4","unstructured":"Benson, J.: Grim Finance Hacked for \\$30 Million in Fantom Tokens. en-US, December 2021. https:\/\/decrypt.co\/88727\/grim-finance-hacked-30-million-fantom-tokens. Accessed 25 Mar 2022"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Bose, P., et al.: SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds (2021). arXiv: 2104.08638","DOI":"10.2139\/ssrn.4106945"},{"key":"5_CR6","unstructured":"Brent, L., et al. Vandal: A Scalable Security Analysis Framework for Smart Contracts (2018). arXiv: 1809.03981"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Callens, V., Meghji, Z., Gorzny, J.: Temporarily Restricting Solidity Smart Contract Interactions (2024). arXiv: 2405.09084 [cs.CR]","DOI":"10.1109\/DAPPS61106.2024.00008"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Chen, T., et al.: SODA: a generic online detection framework for smart contracts. In: Annual Network and Distributed System Security Symposium (NDSS) (2020)","DOI":"10.14722\/ndss.2020.24449"},{"key":"5_CR9","unstructured":"ConsenSys. Blockchain Technology Solutions|Ethereum Solutions. en-us. May 2022. https:\/\/consensys.net\/. Accessed 12 Mar 2022"},{"key":"5_CR10","unstructured":"ConsenSys. Mythril (2018). https:\/\/github.com\/ConsenSys\/mythril. Accessed 01 Mar 2021"},{"key":"5_CR11","unstructured":"ANTLR Developers. ANTLR (2014). https:\/\/www.antlr.org\/. Accessed 01 Feb 2021"},{"key":"5_CR12","unstructured":"ewasm. Ethereum WebAssembly (ewasm) (2018). https:\/\/ewasm.readthedocs.io\/. Accessed 01 Mar 2021"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Feist, J., Greico, G., Groce, A.: Slither: a static analysis framework for smart contracts. In: 2019 IEEE\/ACM 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB) (2019)","DOI":"10.1109\/WETSEB.2019.00008"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Torres, C.F., Jonker, H., State, R.: Elysium: context-aware bytecode-level patching to automatically heal vulnerable smart contracts. In: Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses. RAID 2022. Limassol, Cyprus: Association for Computing Machinery, pp. 115\u2013128, October 2022","DOI":"10.1145\/3545948.3545975"},{"key":"5_CR15","unstructured":"Frank, J., Aschermann, C., Holz, T.: ETHBMC: a bounded model checker for smart contracts. In: USENIX Security Symposium, USENIX Security 2020 (2020)"},{"key":"5_CR16","unstructured":"Stefan George. gnosis\/MultiSigWallet (2019). https:\/\/github.com\/gnosis\/MultiSigWallet\/blob\/master\/contracts\/. Accessed 01 Apr 2021"},{"key":"5_CR17","doi-asserted-by":"publisher","unstructured":"Giesen, J.-R., et al.: HCC: A Language-Independent Hardening Contract Compiler for Smart Contracts (2024). https:\/\/doi.org\/10.48550\/ARXIV.2203.00364","DOI":"10.48550\/ARXIV.2203.00364"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Grech, N., et al.: Gigahorse: thorough, declarative decompilation of smart contracts. In: IEEE\/ACM International Conference on Software Engineering (ICSE) (2019)","DOI":"10.1109\/ICSE.2019.00120"},{"key":"5_CR19","unstructured":"NCC Group. Decentralized Application Security Project (DASP) - Top 10 (2018). https:\/\/www.dasp.co\/index.html. Accessed 17 Nov 2022"},{"key":"5_CR20","doi-asserted-by":"publisher","unstructured":"Hildenbrandt, E., et al.: KEVM: a complete formal semantics of the Ethereum virtual machine. In: IEEE Computer Security Foundations Symposium (CSF) (2018). https:\/\/doi.org\/10.1109\/CSF.2018.00022","DOI":"10.1109\/CSF.2018.00022"},{"key":"5_CR21","unstructured":"SourceHat Labs Inc.: Peapods Finance Smart Contract Audit Report. en-us. January 2024. https:\/\/sourcehat.com\/audits\/PeapodsFinance\/. Accessed 01 July 2024"},{"key":"5_CR22","doi-asserted-by":"publisher","unstructured":"Jiao, J., et al.: Semantic understanding of smart contracts: executable operational semantics of solidity. In: IEEE Symposium on Security and Privacy (2020). https:\/\/doi.org\/10.1109\/SP40000.2020.00066","DOI":"10.1109\/SP40000.2020.00066"},{"key":"5_CR23","unstructured":"Sukrit, K., et al.: ZEUS: analyzing safety of smart contracts. In: Proceedings Network and Distributed System Security Symposium. Internet Society (2018)"},{"key":"5_CR24","unstructured":"Krupp, J., Rossow, C.: teEther: gnawing at ethereum to automatically exploit smart contracts. In: USENIX Security Symposium (USENIX Security 2018) (2018)"},{"key":"5_CR25","doi-asserted-by":"publisher","unstructured":"Li, A., Choi, J.A., Long, F.: Securing smart contract with runtime validation. In: Proceedings of ACM SIGPLAN International Conference on Programming Language Design and Implementation (PLDI) (2020). https:\/\/doi.org\/10.1145\/3385412.3385982","DOI":"10.1145\/3385412.3385982"},{"key":"5_CR26","doi-asserted-by":"crossref","unstructured":"Luu, L., et al.: Making smart contracts smarter. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (2016)","DOI":"10.1145\/2976749.2978309"},{"key":"5_CR27","doi-asserted-by":"publisher","unstructured":"Mossberg, M., et al.: Manticore: a user-friendly symbolic execution framework for binaries and smart contracts. In: 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE) (2019). https:\/\/doi.org\/10.1109\/ASE.2019.00133","DOI":"10.1109\/ASE.2019.00133"},{"key":"5_CR28","unstructured":"Neo-Project. Neo-Project (2016). https:\/\/neo.org\/. Accessed 01 Apr 2021"},{"key":"5_CR29","doi-asserted-by":"publisher","unstructured":"Nguyen, T.D., Pham, L.H., Sun, J.: SGUARD: towards fixing vulnerable smart contracts automatically. In: 2021 IEEE Symposium on Security and Privacy (S &P), pp. 1215\u20131229 (2021). https:\/\/doi.org\/10.1109\/SP40001.2021.00057","DOI":"10.1109\/SP40001.2021.00057"},{"key":"5_CR30","doi-asserted-by":"crossref","unstructured":"Nikoli\u0107, I., et al.: Finding the greedy, prodigal, and suicidal contracts at scale. In: Proceedings of the Annual Computer Security Applications Conference (2018)","DOI":"10.1145\/3274694.3274743"},{"key":"5_CR31","unstructured":"OpenSea. OpenSea, the largest NFT marketplace. OpenSea (2017). https:\/\/opensea.io\/. Accessed 12 May 2022"},{"key":"5_CR32","unstructured":"OpenZeppelin. Digital currency Ethereum is cratering because of a \\$50 million hack (2017). https:\/\/github.com\/OpenZeppelin\/openzeppelin-contracts\/blob\/d6a45ef14e64e034cc14fce16b073d3b4e8a4f91\/contracts\/SafeMath.sol. Accessed 01 May 2022"},{"key":"5_CR33","unstructured":"OpenZeppelin: ReentrancyGuard (2018). https:\/\/docs.openzeppelin.com\/contracts\/3.x\/api\/utils#ReentrancyGuard. Accessed 01 May 2022"},{"key":"5_CR34","unstructured":"p0n1. A disastrous vulnerability found in smart contracts of BeautyChain (BEC) (2018). https:\/\/medium.com\/secbit-media\/a-disastrous-vulnerability-found-in-smart-contracts-of-beautychain-bec-dbf24ddbc30e. Accessed 01 May 2022"},{"key":"5_CR35","doi-asserted-by":"crossref","unstructured":"Permenev, A., et al.: Verx: safety verification of smart contracts. In: IEEE Symposium on Security and Privacy (S &P) (2020)","DOI":"10.1109\/SP40000.2020.00024"},{"key":"5_CR36","doi-asserted-by":"crossref","unstructured":"Rodler, M., et al.: EF\/CF: high performance smart contract fuzzing for exploit generation. In: IEEE European Symposium on Security and Privacy (EuroS &P). IEEE (2023, to appear)","DOI":"10.1109\/EuroSP57164.2023.00034"},{"key":"5_CR37","unstructured":"Rodler, M., et al.: EVMPatch: timely and automated patching of ethereum smart contracts. In: USENIX Security Symposium, USENIX Security 2021 (2021)"},{"key":"5_CR38","doi-asserted-by":"crossref","unstructured":"Rodler, M., et al.: Sereum: protecting existing smart contracts against re-entrancy attacks. In: Proceedings of the Network and Distributed System Security Symposium (NDSS) (2019)","DOI":"10.14722\/ndss.2019.23413"},{"key":"5_CR39","unstructured":"Hyperledger Sawtooth. Hyperledger Sawtooth (2018). https:\/\/sawtooth.hyperledger.org\/. Accessed 01 Apr 2021"},{"key":"5_CR40","doi-asserted-by":"publisher","unstructured":"Schneidewind, C., Scherer, M., Maffei, M.: the good, the bad and the ugly: pitfalls and best practices in automated sound static analysis of Ethereum smart contracts. In: Leveraging Applications of Formal Methods, Verification and Validation: Applications - International Symposium on Leveraging Applications of Formal Methods (ISoLA) (2020). https:\/\/doi.org\/10.1007\/978-3-030-61467-6_14","DOI":"10.1007\/978-3-030-61467-6_14"},{"key":"5_CR41","doi-asserted-by":"publisher","unstructured":"Schneidewind, C., et al.: eThor: practical and provably sound static analysis of Ethereum smart contracts. In: CCS 2020: ACM SIGSAC Conference on Computer and Communications Security (2020). https:\/\/doi.org\/10.1145\/3372297.3417250.","DOI":"10.1145\/3372297.3417250."},{"key":"5_CR42","unstructured":"Sharma, T., et al.: Exploring security practices of smart contract developers, April 2022. arXiv:2204.11193 [cs]. Accessed 04 May 2022"},{"key":"5_CR43","unstructured":"SWC-106 - Unprotected SELFDESTRUCT Instruction. en. https:\/\/swcregistry.io\/docs\/SWC-106. Accessed 17 Nov 2022"},{"key":"5_CR44","unstructured":"SWC-112 - Delegatecall to Untrusted Callee. en. https:\/\/swcregistry.io\/docs\/SWC-112. Accessed 17 Nov 2022"},{"key":"5_CR45","unstructured":"SWC-113 - DoS with Failed Call. en. https:\/\/swcregistry.io\/docs\/SWC-113. Accessed 17 Nov 2022"},{"key":"5_CR46","unstructured":"SWC-115 - Authorization through tx.origin. en. https:\/\/swcregistry.io\/docs\/SWC-115. Accessed 17 Nov 2022"},{"key":"5_CR47","unstructured":"Polygon technology. Bring the World to Ethereum | Polygon. en-us. May 2022. https:\/\/polygon.technology\/ . Accessed 12 May 2022"},{"key":"5_CR48","unstructured":"The Solidity Programming Language. Solidity Developers (2015). https:\/\/github.com\/ethereum\/solidity\/"},{"key":"5_CR49","doi-asserted-by":"crossref","unstructured":"Tikhomirov, S., et al.: SmartCheck: static analysis of Ethereum smart contracts. In: IEEE\/ACM International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB@ICSE) (2018)","DOI":"10.1145\/3194113.3194115"},{"key":"5_CR50","doi-asserted-by":"crossref","unstructured":"Torres, C.F., Sch\u00fctte, J., et al.: Osiris: hunting for integer bugs in Ethereum smart contracts. In: 34th Annual Computer Security Applications Conference (ACSAC 2018) (2018)","DOI":"10.1145\/3274694.3274737"},{"key":"5_CR51","doi-asserted-by":"publisher","unstructured":"Torres, C.F., et al.: \u00c6GIS: smart shielding of smart contracts. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, CCS 2019 (2019). https:\/\/doi.org\/10.1145\/3319535.3363263","DOI":"10.1145\/3319535.3363263"},{"key":"5_CR52","doi-asserted-by":"publisher","unstructured":"Torres, C.F., et al.: ConFuzzius: a data dependency-aware hybrid fuzzer for smart contracts. In: IEEE European Symposium on Security and Privacy (EuroS &P) (2021). https:\/\/doi.org\/10.1109\/EuroSP51992.2021.00018","DOI":"10.1109\/EuroSP51992.2021.00018"},{"key":"5_CR53","doi-asserted-by":"crossref","unstructured":"Tsankov, P., et al.: Securify: practical security analysis of smart contracts. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (2018)","DOI":"10.1145\/3243734.3243780"},{"key":"5_CR54","unstructured":"Waas, M.: Stack Too Deep (2020). https:\/\/soliditydeveloper.com\/stacktoodeep. Accessed May 2021"},{"key":"5_CR55","unstructured":"White, M.: Dolomite exchange exploited for \\$1.8 million. en-us. Mar 2024. https:\/\/www.web3isgoinggreat.com\/?id=dolomite-exchange-hack. Accessed 29 Apr 2024"},{"key":"5_CR56","unstructured":"White, M.: \u201cNFT mortgage lender\" Bacon Protocol is hacked for \\$1 million. en-us, March 2022. https:\/\/web3isgoinggreat.com\/?id=bacon-protocolhacked-for-1-million. Accessed 28 Apr 2024"},{"key":"5_CR57","unstructured":"White, M.: Orion Protocol suffers \\$2.9 million hack. en-us. February 2023. https:\/\/web3isgoinggreat.com\/?blockchain=ethereum&id=orion-protocolsuffers-2-9-million-hack. Accessed 07 Feb 2023"},{"key":"5_CR58","unstructured":"Williams, C.: \\$8.2M Lost as Visor Finance Suffers Latest DeFi Hack. en-US, December 2021. https:\/\/cryptobriefing.com\/8-2m-lost-visor-financesuffers-latest-defi-hack\/. Accessed 25 Mar 2022"},{"key":"5_CR59","doi-asserted-by":"publisher","unstructured":"W\u00fcstholz, V., Christakis, M.: Harvey: a greybox fuzzer for smart contracts. In: ESEC\/FSE 2020: ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (2020). https:\/\/doi.org\/10.1145\/3368089.3417064","DOI":"10.1145\/3368089.3417064"},{"key":"5_CR60","doi-asserted-by":"crossref","unstructured":"Xue, Y., et al.: Cross-contract static analysis for detecting practical reentrancy vulnerabilities in smart contracts. In: 2020 35th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 1029\u20131040 (2020)","DOI":"10.1145\/3324884.3416553"},{"key":"5_CR61","doi-asserted-by":"publisher","unstructured":"Yamaguchi, F., et al.: Modeling and discovering vulnerabilities with code property graphs. In: IEEE Symposium on Security and Privacy (2014). https:\/\/doi.org\/10.1109\/SP.2014.44","DOI":"10.1109\/SP.2014.44"},{"issue":"4","key":"5_CR62","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3402450","volume":"29","author":"XL Yu","year":"2020","unstructured":"Yu, X.L., et al.: Smart contract repair. ACM Trans. Softw. Eng. Methodol. 29(4), 1\u201332 (2020). https:\/\/doi.org\/10.1145\/3402450","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"5_CR63","doi-asserted-by":"publisher","unstructured":"Zhang, Y., et al.: SMARTSHIELD: automatic smart contract protection made easy. In: IEEE International Conference on Software Analysis, Evolution and Reengineering (2020). https:\/\/doi.org\/10.1109\/SANER48275.2020.9054825","DOI":"10.1109\/SANER48275.2020.9054825"},{"key":"5_CR64","unstructured":"Zhou, S., et al.: An ever-evolving game: evaluation of real-world attacks and defenses in Ethereum ecosystem. In: USENIX Security Symposium, USENIX Security 2020 (2020)"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-95761-1_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T14:36:39Z","timestamp":1753454199000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-95761-1_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031957604","9783031957611"],"references-count":64,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-95761-1_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"22 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACNS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Cryptography and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Munich","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acns2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/acns2025.fordaysec.de\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}