{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T09:58:24Z","timestamp":1776074304589,"version":"3.50.1"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T00:00:00Z","timestamp":1770249600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T00:00:00Z","timestamp":1770249600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"University of Piraeus"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Ensuring the security of smart contracts is essential for maintaining the reliability and trustworthiness of decentralized applications, which are deployed across various domains, including industrial applications. In pursuit of this goal, it is imperative to analyze the common errors developers make when crafting smart contracts on the infrastructure that gave birth to them, i.e., the Ethereum blockchain. In this paper, we present a comprehensive analysis of the vulnerabilities in Ethereum smart contracts. Our methodology involves downloading the entire Ethereum blockchain and identifying smart contracts, which we then scan for vulnerabilities using various tools. We have discovered numerous vulnerabilities across many deployed smart contracts, highlighting the need for improved development practices. This analysis provides critical insights into the prevalence of security issues and underscores the urgency of raising development standards. By promoting the adoption of secure-by-design principles, our research seeks to enhance security standards within the Ethereum smart contract ecosystem.<\/jats:p>","DOI":"10.1007\/s10207-026-01208-2","type":"journal-article","created":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T07:42:50Z","timestamp":1770277370000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["In the webs of ethereum: analyzing smart contracts vulnerabilities"],"prefix":"10.1007","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4934-7625","authenticated-orcid":false,"given":"Vaios","family":"Bolgouras","sequence":"first","affiliation":[]},{"given":"Vasilis","family":"Magkoutis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8480-6989","authenticated-orcid":false,"given":"Apostolis","family":"Zarras","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6954-0791","authenticated-orcid":false,"given":"Aristeidis","family":"Farao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6718-122X","authenticated-orcid":false,"given":"Christos","family":"Xenakis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,5]]},"reference":[{"key":"1208_CR1","doi-asserted-by":"publisher","first-page":"2292","DOI":"10.1109\/ACCESS.2016.2566339","volume":"4","author":"K Christidis","year":"2016","unstructured":"Christidis, K., Devetsikiotis, M.: Blockchains and smart contracts for the internet of things. IEEE access 4, 2292\u20132303 (2016)","journal-title":"IEEE access"},{"key":"1208_CR2","doi-asserted-by":"crossref","unstructured":"He, D., Wu, R., Li, X., Chan, S., Guizani, M.: Detection of vulnerabilities of blockchain smart contracts. IEEE Internet Things J. 10(14), 12178\u201312185 (2023)","DOI":"10.1109\/JIOT.2023.3241544"},{"key":"1208_CR3","doi-asserted-by":"crossref","unstructured":"Khan, Z.A., Namin, A.S.: Ethereum smart contracts: Vulnerabilities and their classifications. In 2020 IEEE International Conference on Big Data (Big Data), 1\u201310, Atlanta, GA, USA, (2020) IEEE","DOI":"10.1109\/BigData50022.2020.9439088"},{"issue":"1","key":"1208_CR4","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.7422","volume":"35","author":"S Khanum","year":"2023","unstructured":"Khanum, S., Mustafa, K.: A systematic literature review on sensitive data protection in blockchain applications. Concurrency and Computation: Practice and Experience 35(1), e7422 (2023)","journal-title":"Concurrency and Computation: Practice and Experience"},{"key":"1208_CR5","doi-asserted-by":"publisher","first-page":"6605","DOI":"10.1109\/ACCESS.2021.3140091","volume":"10","author":"SS Kushwaha","year":"2022","unstructured":"Kushwaha, S.S., Joshi, S., Singh, D., Kaur, M., Lee, H.-N.: Systematic review of security vulnerabilities in ethereum blockchain smart contract. IEEE Access 10, 6605\u20136621 (2022)","journal-title":"IEEE Access"},{"key":"1208_CR6","doi-asserted-by":"crossref","unstructured":"Lazarenko, A., Avdoshin, S.: Financial risks of the blockchain industry: A survey of cyberattacks. In Proceedings of the Future Technologies Conference (FTC) 2018: 2, 368\u2013384 (2019). Springer,","DOI":"10.1007\/978-3-030-02683-7_26"},{"key":"1208_CR7","unstructured":"Lutz, O., Chen, H., Fereidooni, H., Sendner, C., Dmitrienko, A., Sadeghi, A.R., Koushanfar, F.: Escort: ethereum smart contracts vulnerability detection using deep neural network and transfer learning. arXiv preprint arXiv:2103.12607, (2021)"},{"key":"1208_CR8","doi-asserted-by":"crossref","unstructured":"Luu, L., Chu, D.-H., Olickel, H., Saxena, P., Hobor, A.: Making smart contracts smarter. In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, 254\u2013269, (2016)","DOI":"10.1145\/2976749.2978309"},{"key":"1208_CR9","first-page":"54","volume":"9","author":"B Mueller","year":"2018","unstructured":"Mueller, B.: Smashing ethereum smart contracts for fun and real profit. HITB SECCONF Amsterdam 9, 54 (2018)","journal-title":"HITB SECCONF Amsterdam"},{"key":"1208_CR10","doi-asserted-by":"crossref","unstructured":"Nikoli\u0107, I., Kolluri, A., Sergey, I., Saxena, P., Hobor, A.: Finding the greedy, prodigal, and suicidal contracts at scale. In Proceedings of the 34th annual computer security applications conference, 653\u2013663, (2018)","DOI":"10.1145\/3274694.3274743"},{"issue":"11","key":"1208_CR11","first-page":"5436","volume":"12","author":"B Prasad","year":"2021","unstructured":"Prasad, B., et al.: Vulnerabilities and attacks on smart contracts over blockchain. Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12(11), 5436\u20135449 (2021)","journal-title":"Turkish Journal of Computer and Mathematics Education (TURCOMAT)"},{"key":"1208_CR12","unstructured":"Qian, P., Liu, Z., He, Q., Huang, B., Tian, D., Wang, X.: Smart contract vulnerability detection technique: A survey. arXiv:2209.05872, (2022)"},{"key":"1208_CR13","unstructured":"Samreen, N.F., Alalfi, M.H.: A survey of security vulnerabilities in ethereum smart contracts. arXiv:2105.06974, (2021)"},{"key":"1208_CR14","doi-asserted-by":"crossref","unstructured":"Sendner, C., Chen, H., Fereidooni, H., Petzi, L., K\u00f6nig, J., Stang, J., Dmitrienko, A., Sadeghi, A.-R., Koushanfar, F.: Smarter contracts: Detecting vulnerabilities in smart contracts with deep transfer learning. In NDSS, (2023)","DOI":"10.14722\/ndss.2023.23263"},{"key":"1208_CR15","doi-asserted-by":"crossref","unstructured":"Tang, X., Zhou, K., Cheng, J., Li, H., Yuan, Y.: The vulnerabilities in smart contracts: A survey. In Advances in Artificial Intelligence and Security: 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part III 7, 177\u2013190 (2021). Springer,","DOI":"10.1007\/978-3-030-78621-2_14"},{"key":"1208_CR16","doi-asserted-by":"crossref","unstructured":"Tikhomirov, S., Voskresenskaya, E., Ivanitskiy, I., Takhaviev, R., Marchenko, E., Alexandrov, Y.: Smartcheck: Static analysis of ethereum smart contracts. In Proceedings of the 1st international workshop on emerging trends in software engineering for blockchain, 9\u201316, (2018)","DOI":"10.1145\/3194113.3194115"},{"key":"1208_CR17","doi-asserted-by":"crossref","unstructured":"Torres, C.F., Sch\u00fctte, J., State, R.: Osiris: Hunting for integer bugs in ethereum smart contracts. In Proceedings of the 34th annual computer security applications conference, 664\u2013676, (2018)","DOI":"10.1145\/3274694.3274737"},{"key":"1208_CR18","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1016\/j.future.2019.12.019","volume":"105","author":"Z Zheng","year":"2020","unstructured":"Zheng, Z., Xie, S., Dai, H.-N., Chen, W., Chen, X., Weng, J., Imran, M.: An overview on smart contracts: Challenges, advances and platforms. Futur. Gener. Comput. Syst. 105, 475\u2013491 (2020)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"2","key":"1208_CR19","doi-asserted-by":"publisher","first-page":"358","DOI":"10.3390\/jcp2020019","volume":"2","author":"H Zhou","year":"2022","unstructured":"Zhou, H., Milani Fard, A., Makanju, A.: The state of ethereum smart contracts security: Vulnerabilities, countermeasures, and tool support. Journal of Cybersecurity and Privacy 2(2), 358\u2013378 (2022)","journal-title":"Journal of Cybersecurity and Privacy"},{"key":"1208_CR20","doi-asserted-by":"crossref","unstructured":"Zhuang, Y., Liu, Z., Qian, P., Liu, Q., Wang, X., He, Q.: Smart contract vulnerability detection using graph neural networks. In Proceedings of the Twenty-Ninth International Conference on International Joint Conferences on Artificial Intelligence, 3283\u20133290, (2021)","DOI":"10.24963\/ijcai.2020\/454"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-026-01208-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-026-01208-2","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-026-01208-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T09:16:17Z","timestamp":1776071777000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-026-01208-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,5]]},"references-count":20,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2026,4]]}},"alternative-id":["1208"],"URL":"https:\/\/doi.org\/10.1007\/s10207-026-01208-2","relation":{},"ISSN":["1615-5270"],"issn-type":[{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,5]]},"assertion":[{"value":"20 October 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 January 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}},{"value":"All data used during this study are included in this published article.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research Data Policy and Data Availability"}}],"article-number":"45"}}