{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,11]],"date-time":"2025-07-11T00:03:48Z","timestamp":1752192228331,"version":"3.41.2"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031976223","type":"print"},{"value":"9783031976230","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-97623-0_17","type":"book-chapter","created":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T09:20:44Z","timestamp":1752139244000},"page":"275-296","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A History of\u00a0Greed: Practical Symbolic Execution for\u00a0Ethereum Smart Contracts"],"prefix":"10.1007","author":[{"given":"Nicola","family":"Ruaro","sequence":"first","affiliation":[]},{"given":"Fabio","family":"Gritti","sequence":"additional","affiliation":[]},{"given":"Robert","family":"McLaughlin","sequence":"additional","affiliation":[]},{"given":"Dongyu","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Ilya","family":"Grishchenko","sequence":"additional","affiliation":[]},{"given":"Christopher","family":"Kruegel","sequence":"additional","affiliation":[]},{"given":"Giovanni","family":"Vigna","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,10]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Baldoni, R., Coppa, E., D\u2019elia, D.C., Demetrescu, C., Finocchi, I.: A survey of symbolic execution techniques. ACM Comput. Surv. (CSUR) (2018)","DOI":"10.1145\/3182657"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van\u00a0Assche, G.: Keccak. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer (2013)","DOI":"10.1007\/978-3-642-38348-9_19"},{"key":"17_CR3","unstructured":"Binance: Binance Smart Chain. https:\/\/binance.com\/en (2024)"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Bose, P., Das, D., Chen, Y., Feng, Y., Kruegel, C., Vigna, G.: Sailfish: Vetting smart contract state-inconsistency bugs in seconds. In: 2022 IEEE Symposium on Security and Privacy (SP). IEEE (2022)","DOI":"10.1109\/SP46214.2022.9833721"},{"key":"17_CR5","unstructured":"Bradley, A.R., Manna, Z.: The calculus of computation: decision procedures with applications to verification. Springer Science & Business Media (2007)"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Brent, L., Grech, N., Lagouvardos, S., Scholz, B., Smaragdakis, Y.: Ethainter: a smart contract security analyzer for composite vulnerabilities. In: Proceedings of the 41st ACM SIGPLAN Conference on Programming Language Design and Implementation (2020)","DOI":"10.1145\/zenodo.3760403"},{"key":"17_CR7","unstructured":"Brent, L., et al.: Vandal: A scalable security analysis framework for smart contracts. arXiv preprint (2018)"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Brummayer, R., Biere, A.: Boolector: An efficient SMT solver for bit-vectors and arrays. In: Tools and Algorithms for the Construction and Analysis of Systems (TACAS). Springer (2009)","DOI":"10.1007\/978-3-642-00768-2_16"},{"key":"17_CR9","unstructured":"CISA: Cybersecurity and Infrastructure Security Agency. https:\/\/www.cisa.gov (2024)"},{"key":"17_CR10","unstructured":"ConsenSys: Mythril. https:\/\/github.com\/ConsenSys\/mythril (2022)"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"De\u00a0Moura, L., Bj\u00f8rner, N.: Z3: An efficient SMT solver. In: International Conference on Tools and Algorithms for the Construction and Analysis of Systems. Springer (2008)","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"17_CR12","unstructured":"DefiLlama: Ethereum. https:\/\/defillama.com\/chain\/Ethereum (2024)"},{"key":"17_CR13","unstructured":"DefiLlama: Hacks. https:\/\/defillama.com\/hacks (2024)"},{"key":"17_CR14","unstructured":"Dutertre, B., De\u00a0Moura, L.: The yices smt solver (2006)"},{"key":"17_CR15","unstructured":"Ethereum: Ethereum. https:\/\/ethereum.org\/en (2024)"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Falke, S., Merz, F., Sinz, C.: Extending the theory of arrays: memset, memcpy, and beyond. In: Verified Software: Theories, Tools, Experiments (VSTTE). Springer (2014)","DOI":"10.1007\/978-3-642-54108-7_6"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Feist, J., Grieco, G., Groce, A.: Slither: a static analysis framework for smart contracts. In: 2019 IEEE\/ACM 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB). IEEE (2019)","DOI":"10.1109\/WETSEB.2019.00008"},{"key":"17_CR18","unstructured":"Frank, J., Aschermann, C., Holz, T.: ETHBMC: A bounded model checker for smart contracts. In: Proceedings of the 29th USENIX Conference on Security Symposium (2020)"},{"key":"17_CR19","doi-asserted-by":"crossref","unstructured":"Fr\u00f6wis, M., Fuchs, A., B\u00f6hme, R.: Detecting token systems on ethereum. In: Financial Cryptography and Data Security (FC). Springer (2019)","DOI":"10.1007\/978-3-030-32101-7_7"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Grech, N., Brent, L., Scholz, B., Smaragdakis, Y.: Gigahorse: thorough, declarative decompilation of smart contracts. In: 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE). IEEE (2019)","DOI":"10.1109\/ICSE.2019.00120"},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"Grech, N., Lagouvardos, S., Tsatiris, I., Smaragdakis, Y.: Elipmoc: advanced decompilation of Ethereum smart contracts. In: Proceedings of the ACM on Programming Languages (2022)","DOI":"10.1145\/3527321"},{"key":"17_CR22","unstructured":"Gritti, F., et al.: Confusum contractum: confused deputy vulnerabilities in ethereum smart contracts. In: 32nd USENIX Security Symposium (USENIX Security 23) (2023)"},{"key":"17_CR23","unstructured":"Krupp, J., Rossow, C.: teether: Gnawing at Ethereum to automatically exploit smart contracts. In: 27th USENIX Security Symposium (USENIX Security 18) (2018)"},{"key":"17_CR24","doi-asserted-by":"crossref","unstructured":"Luu, L., Chu, D.H., Olickel, H., Saxena, P., Hobor, A.: Making smart contracts smarter. In: 2016 ACM SIGSAC Conference on Computer and Communications Security (2016)","DOI":"10.1145\/2976749.2978309"},{"key":"17_CR25","doi-asserted-by":"crossref","unstructured":"Mossberg, M., et al.: Manticore: A user-friendly symbolic execution framework for binaries and smart contracts. In: 2019 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE). IEEE (2019)","DOI":"10.1109\/ASE.2019.00133"},{"key":"17_CR26","doi-asserted-by":"crossref","unstructured":"Nikoli\u0107, I., Kolluri, A., Sergey, I., Saxena, P., Hobor, A.: Finding the greedy, prodigal, and suicidal contracts at scale. In: Proceedings of the 34th Annual Computer Security Applications Conference (2018)","DOI":"10.1145\/3274694.3274743"},{"key":"17_CR27","doi-asserted-by":"crossref","unstructured":"Permenev, A., Dimitrov, D., Tsankov, P., Drachsler-Cohen, D., Vechev, M.: Verx: safety verification of smart contracts. In: 2020 IEEE Symposium on Security And Privacy (SP). IEEE (2020)","DOI":"10.1109\/SP40000.2020.00024"},{"key":"17_CR28","doi-asserted-by":"crossref","unstructured":"Ruaro, N., Gritti, F., McLaughlin, R., Grishchenko, I., Kruegel, C., Vigna, G.: Not your type! detecting storage collision vulnerabilities in Ethereum smart contracts. In: Network and Distributed Systems Security (NDSS) Symposium 2024 (2024)","DOI":"10.14722\/ndss.2024.24713"},{"key":"17_CR29","doi-asserted-by":"crossref","unstructured":"Schneidewind, C., Grishchenko, I., Scherer, M., Maffei, M.: Ethor: Practical and provably sound static analysis of Ethereum smart contracts. In: 2020 ACM SIGSAC Conference on Computer and Communications Security (2020)","DOI":"10.1145\/3372297.3417250"},{"key":"17_CR30","doi-asserted-by":"crossref","unstructured":"Shoshitaishvili, Y., Wang, R., et\u00a0al.: Sok:(state of) the art of war: Offensive techniques in binary analysis. In: 2016 IEEE Symposium on Security and Privacy (SP), IEEE (2016)","DOI":"10.1109\/SP.2016.17"},{"key":"17_CR31","unstructured":"So, S., Hong, S., Oh, H.: SmarTest: effectively hunting vulnerable transaction sequences in smart contracts through language Model-Guided symbolic execution. In: 30th USENIX Security Symposium (USENIX Security 21) (2021)"},{"key":"17_CR32","doi-asserted-by":"crossref","unstructured":"So, S., Lee, M., Park, J., Lee, H., Oh, H.: Verismart: a highly precise safety verifier for Ethereum smart contracts. In: 2020 IEEE Symposium on Security and Privacy (SP). IEEE (2020)","DOI":"10.1109\/SP40000.2020.00032"},{"key":"17_CR33","doi-asserted-by":"crossref","unstructured":"Stephens, J., Ferles, K., Mariano, B., Lahiri, S., Dillig, I.: SmartPulse: automated checking of temporal properties in smart contracts. In: 2021 IEEE Symposium on Security and Privacy (SP). IEEE (2021)","DOI":"10.1109\/SP40001.2021.00085"},{"key":"17_CR34","unstructured":"Tange, O.: Gnu parallel-the command-line power tool. Usenix Mag (2011)"},{"key":"17_CR35","doi-asserted-by":"crossref","unstructured":"Tikhomirov, S., Voskresenskaya, E., Ivanitskiy, I., Takhaviev, R., Marchenko, E., Alexandrov, Y.: Smartcheck: static analysis of ethereum smart contracts. In: Proceedings of the 1st International Workshop on Emerging Trends in Software Engineering for Blockchain (2018)","DOI":"10.1145\/3194113.3194115"},{"key":"17_CR36","doi-asserted-by":"crossref","unstructured":"Tsankov, P., Dan, A., Drachsler-Cohen, D., Gervais, A., Buenzli, F., Vechev, M.: Securify: practical security analysis of smart contracts. In: 2018 ACM SIGSAC Conference on Computer and Communications Security (2018)","DOI":"10.1145\/3243734.3243780"},{"key":"17_CR37","unstructured":"Zellic: Your Sandwich is My Lunch: How to Drain MEV Contracts V2. https:\/\/zellic.io\/blog\/your-sandwich-is-my-lunch-how-to-drain-mev-contracts-v2 (2023)"}],"container-title":["Lecture Notes in Computer Science","Detection of Intrusions and Malware, and Vulnerability Assessment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-97623-0_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T09:20:59Z","timestamp":1752139259000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-97623-0_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031976223","9783031976230"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-97623-0_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"10 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DIMVA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Graz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dimva2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dimva.org\/dimva2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}