{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T19:07:28Z","timestamp":1771614448303,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,2,10]],"date-time":"2025-02-10T00:00:00Z","timestamp":1739145600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,2,10]],"date-time":"2025-02-10T00:00:00Z","timestamp":1739145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972360"],"award-info":[{"award-number":["61972360"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072392"],"award-info":[{"award-number":["62072392"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1007\/s10664-025-10623-3","type":"journal-article","created":{"date-parts":[[2025,2,10]],"date-time":"2025-02-10T01:12:51Z","timestamp":1739149971000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["CSAFuzzer: Fuzzing smart contracts combining with static analysis"],"prefix":"10.1007","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-4578-8624","authenticated-orcid":false,"given":"Jiahui","family":"Yang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5870-5730","authenticated-orcid":false,"given":"Xiangfu","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Hanfeng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Long","family":"He","sequence":"additional","affiliation":[]},{"given":"Shiji","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Naixiang","family":"Gou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,10]]},"reference":[{"key":"10623_CR1","doi-asserted-by":"crossref","unstructured":"Albert E, Gordillo P, Livshits B, Rubio A, Sergey I (2018) Ethir: A framework for high-level analysis of ethereum bytecode. In: International symposium on automated technology for verification and analysis (ATVA). Springer, pp 513\u2013520","DOI":"10.1007\/978-3-030-01090-4_30"},{"key":"10623_CR2","doi-asserted-by":"crossref","unstructured":"Atzei N, Bartoletti M, Cimoli T (2017) A survey of attacks on ethereum smart contracts (sok). In: Principles of Security and Trust: 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings 6. Springer, pp 164\u2013186","DOI":"10.1007\/978-3-662-54455-6_8"},{"key":"10623_CR3","unstructured":"BeautyChain integer overflow (2018). https:\/\/etherscan.io\/token\/0xc5d105e63711398af9bbff092d4b6769c82f793d"},{"key":"10623_CR4","doi-asserted-by":"crossref","unstructured":"Bhargavan K, Delignat-Lavaud A, Fournet C, Gollamudi A, Gonthier G, Kobeissi N, Kulatova N, Rastogi A, Sibut-Pinote T, Swamy N et al (2016) Formal verification of smart contracts. In: Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security (PLAS), pp 91\u201396","DOI":"10.1145\/2993600.2993611"},{"key":"10623_CR5","unstructured":"Brent L, Jurisevic A, Kong M, Liu E, Gauthier F, Gramoli V, Holz R, Scholz B (2018) Vandal: A scalable security analysis framework for smart contracts. arXiv:1809.03981"},{"issue":"6","key":"10623_CR6","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/s10664-021-10018-0","volume":"26","author":"J Chen","year":"2021","unstructured":"Chen J, Xia X, Lo D, Grundy J, Yang X (2021) Maintenance-related concerns for post-deployed ethereum smart contract development: issues, techniques, and future challenges. Empir Softw Eng 26(6):117","journal-title":"Empir Softw Eng"},{"key":"10623_CR7","unstructured":"Contract ABI Specification (2023). https:\/\/docs.soliditylang.org\/"},{"key":"10623_CR8","unstructured":"Crytic (2020) Echidna: Ethereum fuzz testing framework. https:\/\/github.com\/crytic\/echidna"},{"key":"10623_CR9","unstructured":"Dune Analytics (2024). https:\/\/dune.com\/browse\/dashboards"},{"key":"10623_CR10","unstructured":"Ethereum virtual machine operation codes (2023). https:\/\/ethervm.io"},{"key":"10623_CR11","doi-asserted-by":"crossref","unstructured":"Feist J, Grieco G, Groce A (2019) Slither: a static analysis framework for smart contracts. In: 2019 IEEE\/ACM 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB). IEEE, pp 8\u201315","DOI":"10.1109\/WETSEB.2019.00008"},{"key":"10623_CR12","doi-asserted-by":"publisher","first-page":"102635","DOI":"10.1016\/j.jnca.2020.102635","volume":"163","author":"A Ghosh","year":"2020","unstructured":"Ghosh A, Gupta S, Dua A, Kumar N (2020) Security of cryptocurrencies in blockchain technology: state-of-art, challenges and future prospects. J Netw Comput Appl 163:102635","journal-title":"J Netw Comput Appl"},{"key":"10623_CR13","doi-asserted-by":"crossref","unstructured":"He J, Balunovi\u0107 M, Ambroladze N, Tsankov P, Vechev M (2019) Learning to fuzz from symbolic execution with application to smart contracts. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS), pp 531\u2013548","DOI":"10.1145\/3319535.3363230"},{"key":"10623_CR14","doi-asserted-by":"crossref","unstructured":"He D, Wu R, Li X, Chan S, Guizani M (2023) Detection of vulnerabilities of blockchain smart contracts. IEEE Internet Things J","DOI":"10.1109\/JIOT.2023.3241544"},{"key":"10623_CR15","doi-asserted-by":"crossref","unstructured":"He L, Zhao X, Wang Y, Yang J, Sun X (2023) Graphsa: Smart contract vulnerability detection combining graph neural networks and static analysis. In: Proceedings of the 26th European Conference on Artificial Intelligence (ECAI), pp 1020\u20131027","DOI":"10.3233\/FAIA230374"},{"key":"10623_CR16","doi-asserted-by":"crossref","unstructured":"Hildenbrandt E, Saxena M, Rodrigues N, Zhu X, Daian P, Guth D, Moore B, Park D, Zhang Y, Stefanescu A et al (2018) Kevm: A complete formal semantics of the ethereum virtual machine. In: 2018 IEEE 31st Computer Security Foundations Symposium (CSF). IEEE, pp 204\u2013217","DOI":"10.1109\/CSF.2018.00022"},{"key":"10623_CR17","unstructured":"Ispoglou K, Austin D, Mohan V, Payer M (2020) FuzzGen: Automatic fuzzer generation. In: 29th USENIX Security Symposium (USENIX Security 20), pp 2271\u20132287"},{"key":"10623_CR18","doi-asserted-by":"crossref","unstructured":"Jiang B, Liu Y, Chan WK (2018) Contractfuzzer: Fuzzing smart contracts for vulnerability detection. In: Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering (ASE), pp 259\u2013269","DOI":"10.1145\/3238147.3238177"},{"key":"10623_CR19","unstructured":"Krupp J, Rossow C (2018) teEther: Gnawing at ethereum to automatically exploit smart contracts. In: 27th USENIX Security Symposium (USENIX Security 18), pp 1317\u20131333"},{"issue":"4","key":"10623_CR20","doi-asserted-by":"publisher","first-page":"2490","DOI":"10.1109\/TSC.2020.3038641","volume":"15","author":"J Leng","year":"2020","unstructured":"Leng J, Zhou M, Zhao JL, Huang Y, Bian Y (2020) Blockchain security: a survey of techniques and research directions. IEEE Trans Serv Comput 15(4):2490\u20132510","journal-title":"IEEE Trans Serv Comput"},{"key":"10623_CR21","doi-asserted-by":"publisher","first-page":"841","DOI":"10.1016\/j.future.2017.08.020","volume":"107","author":"X Li","year":"2020","unstructured":"Li X, Jiang P, Chen T, Luo X, Wen Q (2020) A survey on the security of blockchain systems. Futur Gener Comput Syst 107:841\u2013853","journal-title":"Futur Gener Comput Syst"},{"issue":"7","key":"10623_CR22","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/s10664-022-10218-2","volume":"27","author":"Z Li","year":"2022","unstructured":"Li Z, Lu S, Zhang R, Xue R, Ma W, Liang R, Zhao Z, Gao S (2022) Smartfast: an accurate and robust formal analysis tool for ethereum smart contracts. Empir Softw Eng 27(7):197","journal-title":"Empir Softw Eng"},{"key":"10623_CR23","doi-asserted-by":"publisher","first-page":"1237","DOI":"10.1109\/TIFS.2023.3237370","volume":"18","author":"Z Liu","year":"2023","unstructured":"Liu Z, Qian P, Yang J, Liu L, Xu X, He Q, Zhang X (2023) Rethinking smart contract fuzzing: fuzzing with invocation ordering and important branch revisiting. IEEE Trans Inf Forensics Secur 18:1237\u20131251","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10623_CR24","doi-asserted-by":"crossref","unstructured":"Luu L, Chu D-H, Olickel H, Saxena P, Hobor A (2016) Making smart contracts smarter. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS), pp 254\u2013269","DOI":"10.1145\/2976749.2978309"},{"key":"10623_CR25","doi-asserted-by":"crossref","unstructured":"Nguyen TD, Pham LH, Sun J, Lin Y, Minh QT (2020) sfuzz: An efficient adaptive fuzzer for solidity smart contracts. In: Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering (ICSE), pp 778\u2013788","DOI":"10.1145\/3377811.3380334"},{"key":"10623_CR26","unstructured":"Reentrancy attack on cream finance (2021). https:\/\/inspexco.medium.com\/"},{"key":"10623_CR27","unstructured":"Solidity Documentation (2016). http:\/\/docs.soliditylang.org\/en\/v0.8.13\/"},{"issue":"1","key":"10623_CR28","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/s10664-023-10398-5","volume":"29","author":"M Soud","year":"2024","unstructured":"Soud M, Liebel G, Hamdaqa M (2024) A fly in the ointment: an empirical study on the characteristics of ethereum smart contract code weaknesses. Empir Softw Eng 29(1):13","journal-title":"Empir Softw Eng"},{"key":"10623_CR29","doi-asserted-by":"crossref","unstructured":"Tikhomirov S, Voskresenskaya E, Ivanitskiy I, Takhaviev R, Marchenko E, Alexandrov Y (2018) Smartcheck: Static analysis of ethereum smart contracts. In: Proceedings of the 1st International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB), pp 9\u201316","DOI":"10.1145\/3194113.3194115"},{"key":"10623_CR30","doi-asserted-by":"crossref","unstructured":"Torres CF, Iannillo AK, Gervais A, State R (2021) Confuzzius: A data dependency-aware hybrid fuzzer for smart contracts. In: 2021 IEEE European Symposium on Security and Privacy (EuroS &P). IEEE, pp 103\u2013119","DOI":"10.1109\/EuroSP51992.2021.00018"},{"key":"10623_CR31","doi-asserted-by":"crossref","unstructured":"Torres CF, Sch\u00fctte J, State R (2018) Osiris: Hunting for integer bugs in ethereum smart contracts. In: Proceedings of the 34th Annual Computer Security Applications Conference (ACSAC), pp 664\u2013676","DOI":"10.1145\/3274694.3274737"},{"key":"10623_CR32","doi-asserted-by":"crossref","unstructured":"Tsankov P, Dan A, Drachsler-Cohen D, Gervais A, Buenzli F, Vechev M (2018) Securify: Practical security analysis of smart contracts. In: Proceedings of the 2018 ACM SIGSAC conference on computer and communications security (CCS), pp 67\u201382","DOI":"10.1145\/3243734.3243780"},{"key":"10623_CR33","unstructured":"VaaS (2019) Automated formal verification platform for smart contract. https:\/\/www.lianantech.com\/"},{"key":"10623_CR34","doi-asserted-by":"publisher","first-page":"110891","DOI":"10.1016\/j.jss.2020.110891","volume":"174","author":"A Vacca","year":"2021","unstructured":"Vacca A, Di Sorbo A, Visaggio CA, Canfora G (2021) A systematic literature review of blockchain and smart contract development: Techniques, tools, and open challenges. J Syst Softw 174:110891","journal-title":"J Syst Softw"},{"issue":"2","key":"10623_CR35","doi-asserted-by":"publisher","first-page":"1133","DOI":"10.1109\/TNSE.2020.2968505","volume":"8","author":"W Wang","year":"2020","unstructured":"Wang W, Song J, Xu G, Li Y, Wang H, Su C (2020) Contractward: Automated vulnerability detection models for ethereum smart contracts. IEEE Trans Netw Sci Eng 8(2):1133\u20131144","journal-title":"IEEE Trans Netw Sci Eng"},{"issue":"2014","key":"10623_CR36","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood G et al (2014) Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151(2014):1\u201332","journal-title":"Ethereum Project Yellow Paper"},{"key":"10623_CR37","doi-asserted-by":"crossref","unstructured":"Wu S, Li Z, Yan L, Chen W, Jiang M, Wang C, Luo X, Zhou H (2024) Are we there yet? unraveling the state-of-the-art smart contract fuzzers. In: Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering (ICSE), pp 1\u201313","DOI":"10.1145\/3597503.3639152"},{"key":"10623_CR38","doi-asserted-by":"crossref","unstructured":"W\u00fcstholz V, Christakis M (2020) Harvey: A greybox fuzzer for smart contracts. In: Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC\/FSE), pp 1398\u20131409","DOI":"10.1145\/3368089.3417064"},{"key":"10623_CR39","doi-asserted-by":"crossref","unstructured":"Zhang W, Banescu S, Pasos L, Stewart S, Ganesh V (2019) Mpro: Combining static and symbolic analysis for scalable testing of smart contract. In: 2019 IEEE 30th International Symposium on Software Reliability Engineering (ISSRE). IEEE, pp 456\u2013462","DOI":"10.1109\/ISSRE.2019.00052"},{"key":"10623_CR40","doi-asserted-by":"crossref","unstructured":"Zheng Z, Zhang N, Su J, Zhong Z, Ye M, Chen J (2023) Turn the rudder: A beacon of reentrancy detection for smart contracts on ethereum. In: 2023 IEEE\/ACM 45th International Conference on Software Engineering (ICSE). IEEE, pp 295\u2013306","DOI":"10.1109\/ICSE48619.2023.00036"},{"issue":"4","key":"10623_CR41","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1504\/IJWGS.2018.095647","volume":"14","author":"Z Zheng","year":"2018","unstructured":"Zheng Z, Xie S, Dai H-N, Chen X, Wang H (2018) Blockchain challenges and opportunities: a survey. Int J Web Grid Serv 14(4):352\u2013375","journal-title":"Int J Web Grid Serv"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-025-10623-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10664-025-10623-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-025-10623-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T13:26:59Z","timestamp":1763645219000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10664-025-10623-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,10]]},"references-count":41,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,5]]}},"alternative-id":["10623"],"URL":"https:\/\/doi.org\/10.1007\/s10664-025-10623-3","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,10]]},"assertion":[{"value":"31 January 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 February 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The datasets used in this study are publicly available from previous studies, and the sources have been indicated in the manuscript. All data were used in accordance with the terms and conditions specified by the provider. In addition, no human or animal data were involved in this study.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"This study did not involve human participants. In addition, all co-authors were informed about the study.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}}],"article-number":"62"}}