{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T11:28:43Z","timestamp":1764588523451},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,2,27]],"date-time":"2024-02-27T00:00:00Z","timestamp":1708992000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,2,27]],"date-time":"2024-02-27T00:00:00Z","timestamp":1708992000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s10207-024-00817-z","type":"journal-article","created":{"date-parts":[[2024,2,27]],"date-time":"2024-02-27T05:01:57Z","timestamp":1709010117000},"page":"1805-1819","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Pioneering automated vulnerability detection for smart contracts in blockchain using KEVM: Guardian ADRGAN"],"prefix":"10.1007","volume":"23","author":[{"given":"Rohini G.","family":"Pise","sequence":"first","affiliation":[]},{"given":"Sonali","family":"Patil","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,27]]},"reference":[{"issue":"2","key":"817_CR1","doi-asserted-by":"publisher","first-page":"984","DOI":"10.1109\/TR.2022.3161634","volume":"71","author":"B Li","year":"2022","unstructured":"Li, B., Pan, Z., Hu, T.: Redefender: detecting reentrancy vulnerabilities in smart contracts automatically. IEEE Trans. Reliab. 71(2), 984\u2013999 (2022)","journal-title":"IEEE Trans. Reliab."},{"key":"817_CR2","unstructured":"Hasan, Q.O.M.:\u00a0Machine Learning Based Framework for Smart Contract Vulnerability Detection in Ethereum Blockchain, Doctoral dissertation, Rochester Institute of Technology (2023)"},{"key":"817_CR3","doi-asserted-by":"crossref","unstructured":"Dwivedi, S.K., Amin, R., Lazarus, J.D., Pandi, V.: Blockchain-based electronic medical records system with smart contract and consensus algorithm in cloud environment.\u00a0Secur. Commun. Netw.\u00a02022 (2022)","DOI":"10.1155\/2022\/4645585"},{"issue":"10","key":"817_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3567582","volume":"55","author":"A Pasdar","year":"2023","unstructured":"Pasdar, A., Lee, Y.C., Dong, Z.: Connect API with blockchain: a survey on blockchain oracle implementation. ACM Comput. Surv. 55(10), 1\u201339 (2023)","journal-title":"ACM Comput. Surv."},{"key":"817_CR5","doi-asserted-by":"crossref","unstructured":"Wang, Y., Lahiri, S.K., Chen, S., Pan, R., Dillig, I., Born, C., Naseer, I., Ferles, K.: Formal verification of workflow policies for smart contracts in azure blockchain. In: Verified Software. Theories, Tools, and Experiments: 11th International Conference, VSTTE 2019, New York City, NY, USA, July 13\u201314, 2019, Revised Selected Papers 11, pp. 87\u2013106. Springer International Publishing (2020)","DOI":"10.1007\/978-3-030-41600-3_7"},{"key":"817_CR6","doi-asserted-by":"crossref","unstructured":"Tabassum, T., Akter, F., Uddin, M.N.: An Ethereum blockchain-based healthcare system using smart contract. In: Applied Informatics for Industry 4.0, pp. 34\u201345. Chapman and Hall\/CRC (2020)","DOI":"10.1201\/9781003256069-4"},{"key":"817_CR7","unstructured":"Goodarzi, S., Kayvanfar, V., Haji, A., Shirzad, A.: Cold Supply Chain Planning including Smart Contracts: An Intelligent Blockchain-based approach.\u00a0arXiv preprint arXiv:2209.10410 (2022)"},{"key":"817_CR8","doi-asserted-by":"publisher","first-page":"53786","DOI":"10.1109\/ACCESS.2021.3070911","volume":"9","author":"O Alkhoori","year":"2021","unstructured":"Alkhoori, O., Hassan, A., Almansoori, O., Debe, M., Salah, K., Jayaraman, R., Arshad, J., Rehman, M.H.U.: Design and implementation of CryptoCargo: a blockchain-powered smart shipping container for vaccine distribution. IEEE Access 9, 53786\u201353803 (2021)","journal-title":"IEEE Access"},{"key":"817_CR9","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1016\/j.ins.2019.09.073","volume":"512","author":"W Shao","year":"2020","unstructured":"Shao, W., Wang, Z., Wang, X., Qiu, K., Jia, C., Jiang, C.: LSC: online auto-update smart contracts for fortifying blockchain-based log systems. Inf. Sci. 512, 506\u2013517 (2020)","journal-title":"Inf. Sci."},{"key":"817_CR10","doi-asserted-by":"publisher","first-page":"2497","DOI":"10.1109\/ACCESS.2021.3139582","volume":"10","author":"Y Zuo","year":"2020","unstructured":"Zuo, Y., Qi, Z.: A blockchain-based IoT framework for oil field remote monitoring and control. IEEE Access 10, 2497\u20132514 (2020)","journal-title":"IEEE Access"},{"key":"817_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/6953125","volume":"2022","author":"AS Yahaya","year":"2022","unstructured":"Yahaya, A.S., Javaid, N., Ullah, S., Khalid, R., Javed, M.U., Khan, R.U., Wadud, Z., Khan, M.A.: A secure and efficient energy trading model using blockchain for a 5G-deployed smart community. Wirel. Commun. Mob. Comput. 2022, 1\u201327 (2022)","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"817_CR12","doi-asserted-by":"crossref","unstructured":"Jean-Louis, N., Li, Y., Ji, Y., Malvai, H., Yurek, T., Bellemare, S., Miller, A.: Sgxonerated: Finding (and partially fixing) privacy flaws in tee-based smart contract platforms without breaking the tee.\u00a0Cryptology ePrint Archive (2023)","DOI":"10.56553\/popets-2024-0035"},{"issue":"3","key":"817_CR13","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1002\/spe.3163","volume":"53","author":"R Xi","year":"2023","unstructured":"Xi, R., Pattabiraman, K.: A large-scale empirical study of low-level function use in Ethereum smart contracts and automated replacement. Softw. Pract. Exp. 53(3), 631\u2013664 (2023)","journal-title":"Softw. Pract. Exp."},{"issue":"2","key":"817_CR14","doi-asserted-by":"publisher","first-page":"770","DOI":"10.3390\/app13020770","volume":"13","author":"H Wu","year":"2023","unstructured":"Wu, H., Dong, H., He, Y., Duan, Q.: Smart contract vulnerability detection based on hybrid attention mechanism model. Appl. Sci. 13(2), 770 (2023)","journal-title":"Appl. Sci."},{"issue":"2","key":"817_CR15","doi-asserted-by":"publisher","first-page":"710","DOI":"10.1109\/JBHI.2022.3187037","volume":"27","author":"S Rahmadika","year":"2022","unstructured":"Rahmadika, S., Astillo, P.V., Choudhary, G., Duguma, D.G., Sharma, V., You, I.: Blockchain-based privacy preservation scheme for misbehavior detection in lightweight IoMT devices. IEEE J. Biomed. Health Inform. 27(2), 710\u2013721 (2022)","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"817_CR16","doi-asserted-by":"crossref","unstructured":"Bhardwaj, A., Goundar, S.: Attack vectors for blockchain and mapping OWASP vulnerabilities to smart contracts. In: Blockchain Technologies, Applications and Cryptocurrencies: Current Practice and Future Trends, pp. 139\u2013156 (2021)","DOI":"10.1142\/9789811205279_0006"},{"issue":"7","key":"817_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3464421","volume":"54","author":"P Tolmach","year":"2021","unstructured":"Tolmach, P., Li, Y., Lin, S.W., Liu, Y., Li, Z.: A survey of smart contract formal specification and verification. ACM Comput. Surv. (CSUR) 54(7), 1\u201338 (2021)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"817_CR18","doi-asserted-by":"crossref","unstructured":"Nelaturu, K., Mavridou, A., Stachtiari, E., Veneris, A., Laszka, A.: Correct-by-design interacting smart contracts and a systematic approach for verifying ERC20 and ERC721 contracts with VeriSolid.\u00a0IEEE Trans. Dependable Secur. Comput. (2022)","DOI":"10.1109\/TDSC.2022.3200840"},{"key":"817_CR19","unstructured":"Arga\u00f1araz, M., Ber\u00f3n, M., Pereira, M.J., Henriques, P.R.: Detection of vulnerabilities in smart contracts specifications in ethereum platforms. In: 9th Symposium on Languages, Applications and Technologies (SLATE 2020), vol. 83, pp. 1\u201316. Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik (2020)"},{"issue":"4","key":"817_CR20","doi-asserted-by":"publisher","first-page":"597","DOI":"10.3390\/electronics11040597","volume":"11","author":"D Zhu","year":"2022","unstructured":"Zhu, D., Yue, F., Pang, J., Zhou, X., Han, W., Liu, F.: Bytecode similarity detection of smart contract across optimization options and compiler versions based on triplet network. Electronics 11(4), 597 (2022)","journal-title":"Electronics"},{"key":"817_CR21","unstructured":"https:\/\/www.kaggle.com\/datasets\/prasoonkottarathil\/ethereum-historical-dataset"},{"key":"817_CR22","doi-asserted-by":"crossref","unstructured":"He, D., Wu, R., Li, X., Chan, S., Guizani, M.: Detection of vulnerabilities of blockchain smart contracts. IEEE Internet Things J. (2023)","DOI":"10.1109\/JIOT.2023.3241544"},{"key":"817_CR23","doi-asserted-by":"crossref","unstructured":"Xie, X., Wang, H., Jian, Z., Fang, Y., Wang, Z., Li, T.: Block-gram: mining knowledgeable features for efficiently smart contract vulnerability detection. Digit. Commun. Netw. (2023)","DOI":"10.1016\/j.dcan.2023.07.009"},{"key":"817_CR24","doi-asserted-by":"publisher","first-page":"6605","DOI":"10.1109\/ACCESS.2021.3140091","volume":"10","author":"SS Kushwaha","year":"2022","unstructured":"Kushwaha, S.S., Joshi, S., Singh, D., Kaur, M., Lee, H.N.: Systematic review of security vulnerabilities in ethereum blockchain smart contract. IEEE Access 10, 6605\u20136621 (2022)","journal-title":"IEEE Access"},{"key":"817_CR25","doi-asserted-by":"publisher","first-page":"190760","DOI":"10.1109\/ACCESS.2020.3032239","volume":"8","author":"\u00c1 Hajdu","year":"2020","unstructured":"Hajdu, \u00c1., Ivaki, N., Kocsis, I., Klenik, A., G\u00f6nczy, L., Laranjeiro, N., Madeira, H., Pataricza, A.: Using fault injection to assess blockchain systems in presence of faulty smart contracts. IEEE Access 8, 190760\u2013190783 (2020)","journal-title":"IEEE Access"},{"issue":"2","key":"817_CR26","doi-asserted-by":"publisher","first-page":"70","DOI":"10.34306\/bfront.v2i2.229","volume":"2","author":"D Rustiana","year":"2023","unstructured":"Rustiana, D., Ramadhan, D., Wibowo, L., Nugroho, A.W.: State of the art blockchain enabled smart contract applications in the university. Blockchain Front. Technol. 2(2), 70\u201380 (2023)","journal-title":"Blockchain Front. Technol."},{"key":"817_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2023.111653","volume":"200","author":"M Pasqua","year":"2023","unstructured":"Pasqua, M., Benini, A., Contro, F., Crosara, M., DallaPreda, M., Ceccato, M.: Enhancing Ethereum smart-contracts static analysis by computing a precise Control-Flow Graph of Ethereum bytecode. J. Syst. Softw. 200, 111653 (2023)","journal-title":"J. Syst. Softw."},{"issue":"6","key":"817_CR28","doi-asserted-by":"publisher","first-page":"1985","DOI":"10.3390\/s21061985","volume":"21","author":"JG Song","year":"2021","unstructured":"Song, J.G., Kang, E.S., Shin, H.W., Jang, J.W.: A smart contract-based p2p energy trading system with dynamic pricing on ethereumblockchain. Sensors 21(6), 1985 (2021)","journal-title":"Sensors"},{"key":"817_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.segan.2022.100860","volume":"32","author":"PR Padghan","year":"2022","unstructured":"Padghan, P.R., Daniel, S.A., Pitchaimuthu, R.: Grid-tied energy cooperative trading framework between Prosumer to Prosumer based on Ethereum smart contracts. Sustain. Energy Grids Netw. 32, 100860 (2022)","journal-title":"Sustain. Energy Grids Netw."},{"key":"817_CR30","doi-asserted-by":"crossref","unstructured":"Liu, Z., Jiang, M., Zhang, S., Zhang, J., Liu, Y.: A smart contract vulnerability detection mechanism based on deep learning and expert rules.\u00a0IEEE Access (2023)","DOI":"10.1109\/ACCESS.2023.3298048"},{"key":"817_CR31","doi-asserted-by":"publisher","first-page":"175713","DOI":"10.1109\/ACCESS.2020.3026180","volume":"8","author":"S Seven","year":"2020","unstructured":"Seven, S., Yao, G., Soran, A., Onen, A., Muyeen, S.M.: Peer-to-peer energy trading in virtual power plant based on blockchain smart contracts. IEEE Access 8, 175713\u2013175726 (2020)","journal-title":"IEEE Access"},{"issue":"4","key":"817_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2021.102565","volume":"58","author":"F Ma","year":"2021","unstructured":"Ma, F., Ren, M., Fu, Y., Wang, M., Li, H., Song, H., Jiang, Y.: Security reinforcement for Ethereum virtual machine. Inf. Process. Manag. 58(4), 102565 (2021)","journal-title":"Inf. Process. Manag."},{"key":"817_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40594-021-00294-z","volume":"8","author":"C Jackson","year":"2021","unstructured":"Jackson, C., Mohr-Schroeder, M.J., Bush, S.B., Maiorca, C., Roberts, T., Yost, C., Fowler, A.: Equity-oriented conceptual framework for K-12 STEM literacy. Int. J. STEM Educ. 8, 1\u201316 (2021)","journal-title":"Int. J. STEM Educ."},{"key":"817_CR34","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1016\/j.future.2019.12.019","volume":"105","author":"Z Zheng","year":"2020","unstructured":"Zheng, Z., Xie, S., Dai, H.N., Chen, W., Chen, X., Weng, J., Imran, M.: An overview on smart contracts: challenges, advances and platforms. Future Gener. Comput. Syst. 105, 475\u2013491 (2020)","journal-title":"Future Gener. Comput. Syst."},{"key":"817_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.cmpb.2022.107030","volume":"224","author":"E Kaplan","year":"2022","unstructured":"Kaplan, E., Altunisik, E., Firat, Y.E., Barua, P.D., Dogan, S., Baygin, M., Demir, F.B., Tuncer, T., Palmer, E., Tan, R.S., Yu, P.: Novel nested patch-based feature extraction model for automated Parkinson\u2019s Disease symptom classification using MRI images. Comput. Methods Programs Biomed. 224, 107030 (2022)","journal-title":"Comput. Methods Programs Biomed."},{"key":"817_CR36","doi-asserted-by":"crossref","unstructured":"Luo, Q., He, H., Liu, K., Yang, C., Silven, O., Liu, L.: Rain-like layer removal from hot-rolled steel strip based on attentive dual residual generative adversarial network.\u00a0IEEE Trans. Instrum. Meas. (2023)","DOI":"10.1109\/TIM.2023.3265761"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00817-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00817-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00817-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T02:05:52Z","timestamp":1716775552000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00817-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,27]]},"references-count":36,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["817"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00817-z","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2,27]]},"assertion":[{"value":"23 January 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 February 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}