{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T13:24:20Z","timestamp":1773840260558,"version":"3.50.1"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,1,31]],"date-time":"2022-01-31T00:00:00Z","timestamp":1643587200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,31]],"date-time":"2022-01-31T00:00:00Z","timestamp":1643587200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. Comput. Sci. Technol."],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s11390-021-1674-4","type":"journal-article","created":{"date-parts":[[2022,2,18]],"date-time":"2022-02-18T05:02:42Z","timestamp":1645160562000},"page":"67-82","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["Characterizing and Detecting Gas-Inefficient Patterns in Smart Contracts"],"prefix":"10.1007","volume":"37","author":[{"given":"Que-Ping","family":"Kong","sequence":"first","affiliation":[]},{"given":"Zi-Yan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yuan","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Xiang-Ping","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xiao-Cong","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Zi-Bin","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,31]]},"reference":[{"key":"1674_CR1","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1016\/j.future.2019.12.019","volume":"105","author":"Z Zheng","year":"2020","unstructured":"Zheng Z, Xie S, Dai H N, Chen W, Chen X, Weng J, Imran M. An overview on smart contracts: Challenges, advances and platforms. Future Generation Computer Systems, 2020, 105: 475-491. https:\/\/doi.org\/10.1016\/j.future.2019.12.019.","journal-title":"Future Generation Computer Systems"},{"key":"1674_CR2","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1109\/OJCS.2020.2990458","volume":"1","author":"P Zheng","year":"2020","unstructured":"Zheng P, Zheng Z, Wu J, Dai H N. XBlock-ETH: Extracting and exploring blockchain data from Ethereum. IEEE Open Journal of the Computer Society, 2020, 1: 95-106. https:\/\/doi.org\/10.1109\/OJCS.2020.2990458.","journal-title":"IEEE Open Journal of the Computer Society"},{"key":"1674_CR3","doi-asserted-by":"publisher","unstructured":"Albert E, Gordillo P, Rubio A, Schett M A. Synthesis of super-optimized smart contracts using Max-SMT. In Proc. the 32nd International Conference on Computer Aided Verification, Jul. 2020, pp.177-200. https:\/\/doi.org\/10.1007\/978-3-030-53288-8_10.","DOI":"10.1007\/978-3-030-53288-8_10"},{"key":"1674_CR4","unstructured":"Nagele J, Schett M A. Blockchain superoptimizer. arXiv:2005.05912, 2020. https:\/\/arxiv.org\/abs\/2005.05912, May 2021."},{"key":"1674_CR5","doi-asserted-by":"publisher","unstructured":"Chen T, Li Z, Zhou H, Chen J, Luo X, Li X, Zhang X. Towards saving money in using smart contracts. In Proc. the 40th IEEE\/ACM International Conference on Software Engineering: New Ideas and Emerging Technologies Results, May 27-Jun. 3, 2018, pp.81-84. https:\/\/doi.org\/10.1145\/3183399.3183420.","DOI":"10.1145\/3183399.3183420"},{"issue":"3","key":"1674_CR6","doi-asserted-by":"publisher","first-page":"1433","DOI":"10.1109\/TETC.2020.2979019","volume":"9","author":"T Chen","year":"2020","unstructured":"Chen T, Feng Y, Li Z, Zhou H, Luo X, Li X, Xiao X, Chen J, Zhang X. GasChecker: Scalable analysis for discovering gas-inefficient smart contracts. IEEE Transactions on Emerging Topics in Computing, 2020, 9(3): 1433-1448. https:\/\/doi.org\/10.1109\/TETC.2020.2979019.","journal-title":"IEEE Transactions on Emerging Topics in Computing"},{"issue":"3","key":"1674_CR7","doi-asserted-by":"publisher","first-page":"1864","DOI":"10.1007\/s10664-019-09796-5","volume":"25","author":"GA Oliva","year":"2020","unstructured":"Oliva G A, Hassan A E, Jiang Z M. An exploratory study of smart contracts in the Ethereum blockchain platform. Empirical Software Engineering, 2020, 25(3): 1864-1904. https:\/\/doi.org\/10.1007\/s10664-019-09796-5.","journal-title":"Empirical Software Engineering"},{"key":"1674_CR8","doi-asserted-by":"publisher","unstructured":"Durieux T, Ferreira J F, Abreu R, Cruz P. Empirical review of automated analysis tools on 47,587 Ethereum smart contracts. In Proc. the 42nd IEEE\/ACM International Conference on Software Engineering, Oct. 2020, pp.530-541. https:\/\/doi.org\/10.1145\/3377811.3380364.","DOI":"10.1145\/3377811.3380364"},{"issue":"1","key":"1674_CR9","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1109\/TSE.2020.2989002","volume":"48","author":"J Chen","year":"2022","unstructured":"Chen J, Xia X, Lo D, Grundy J, Luo X, Chen T. Defining smart contract defects on Ethereum. IEEE Transactions on Software Engineering, 2022, 48(1): 327-345. https:\/\/doi.org\/10.1109\/TSE.2020.2989002.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"1674_CR10","doi-asserted-by":"publisher","unstructured":"Jiang B, Liu Y, Chan W. ContractFuzzer: Fuzzing smart contracts for vulnerability detection. In Proc. the 33rd IEEE\/ACM International Conference on Automated Software Engineering, Sept. 2018, pp.259-269. https:\/\/doi.org\/10.1145\/3238147.3238177.","DOI":"10.1145\/3238147.3238177"},{"key":"1674_CR11","doi-asserted-by":"publisher","unstructured":"Grech N, Kong M, Jurisevic A, Brent L, Scholz B, Smaragdakis Y. MadMax: Surviving out-of-gas conditions in Ethereum smart contracts. Proceedings of the ACM on Programming Languages, 2018, 2(OOPSLA): Article No. 116. https:\/\/doi.org\/10.1145\/3276486.","DOI":"10.1145\/3276486"},{"key":"1674_CR12","doi-asserted-by":"publisher","unstructured":"Liu C, Liu H, Cao Z, Chen Z, Chen B, Roscoe B. ReGuard: Finding reentrancy bugs in smart contracts. In Proc. the 40th IEEE\/ACM International Conference on Software Engineering: Companion, May 27-June 3, 2018, pp.65-68. https:\/\/doi.org\/10.1145\/3183440.3183495.","DOI":"10.1145\/3183440.3183495"},{"key":"1674_CR13","doi-asserted-by":"publisher","unstructured":"Li Z, Wu H, Xu J, Wang X, Zhang L, Chen Z. MuSC: A tool for mutation testing of Ethereum smart contract. In Proc. the 34th IEEE\/ACM International Conference on Automated Software Engineering, Nov. 2019, pp.1198-1201. https:\/\/doi.org\/10.1109\/ASE.2019.00136.","DOI":"10.1109\/ASE.2019.00136"},{"key":"1674_CR14","doi-asserted-by":"publisher","unstructured":"Wang X, Wu H, Sun W, Zhao Y. Towards generating cost-effective test-suite for Ethereum smart contract. In Proc. the 26th IEEE International Conference on Software Analysis, Evolution and Reengineering, Feb. 2019, pp.549-553. https:\/\/doi.org\/10.1109\/SANER.2019.8668020.","DOI":"10.1109\/SANER.2019.8668020"},{"key":"1674_CR15","doi-asserted-by":"publisher","unstructured":"Grech N, Brent L, Scholz B, Smaragdakis Y. Gigahorse: Thorough, declarative decompilation of smart contracts. In Proc. the 41st IEEE\/ACM International Conference on Software Engineering, May 2019, pp.1176-1186. https:\/\/doi.org\/10.1109\/ICSE.2019.00120.","DOI":"10.1109\/ICSE.2019.00120"},{"key":"1674_CR16","doi-asserted-by":"publisher","unstructured":"Chen T, Li X, Luo X, Zhang X. Under-optimized smart contracts devour your money. In Proc. the 24th IEEE International Conference on Software Analysis, Evolution and Reengineering, Feb. 2017, pp.442-446. https:\/\/doi.org\/10.1109\/SANER.2017.7884650.","DOI":"10.1109\/SANER.2017.7884650"},{"key":"1674_CR17","doi-asserted-by":"publisher","unstructured":"Tikhomirov S, Voskresenskaya E, Ivanitskiy I, Takhaviev R, Marchenko E, Alexandrov Y. SmartCheck: Static analysis of Ethereum smart contracts. In Proc. the 1st International Workshop on Emerging Trends in Software Engineering for Blockchain, May 27-June 3, 2018, pp.9-16. https:\/\/doi.org\/10.1145\/3194113.3194115.","DOI":"10.1145\/3194113.3194115"},{"key":"1674_CR18","unstructured":"Zhang P, Xiao F, Luo X. SolidityCheck: Quickly detecting smart contract problems through regular expressions. arXiv:1911.09425, 2019. https:\/\/arxiv.org\/abs\/1911.09425, Nov. 2021."},{"key":"1674_CR19","doi-asserted-by":"publisher","first-page":"25495","DOI":"10.1109\/ACCESS.2021.3057565","volume":"9","author":"J Correas","year":"2021","unstructured":"Correas J, Gordillo P, Rom\u00e1n-D\u00edez G. Static profiling and optimization of Ethereum smart contracts using resource analysis. IEEE Access, 2021, 9: 25495-25507. https:\/\/doi.org\/10.1109\/ACCESS.2021.3057565.","journal-title":"IEEE Access"},{"key":"1674_CR20","doi-asserted-by":"publisher","unstructured":"Li Z, Chen T H, Yang J, Shang W. DLFinder: Characterizing and detecting duplicate logging code smells. In Proc. the 41st IEEE\/ACM International Conference on Software Engineering, May 2019, pp.152-163. https:\/\/doi.org\/10.1109\/ICSE.2019.00032.","DOI":"10.1109\/ICSE.2019.00032"},{"key":"1674_CR21","doi-asserted-by":"publisher","unstructured":"Vassallo C, Proksch S, Gall H C, Di Penta M. Automated reporting of anti-patterns and decay in continuous integration. In Proc. the 41st IEEE\/ACM International Conference on Software Engineering, May 2019, pp.105-115. https:\/\/doi.org\/10.1109\/ICSE.2019.00028.","DOI":"10.1109\/ICSE.2019.00028"},{"issue":"6","key":"1674_CR22","doi-asserted-by":"publisher","first-page":"3484","DOI":"10.1007\/s10664-019-09703-y","volume":"24","author":"SS Afjehei","year":"2019","unstructured":"Afjehei S S, Chen T H, Tsantalis N. iPerfDetector: Characterizing and detecting performance antipatterns in iOS applications. Empirical Software Engineering, 2019, 24(6): 3484-3513. https:\/\/doi.org\/10.1007\/s10664-019-09703-y.","journal-title":"Empirical Software Engineering"},{"key":"1674_CR23","doi-asserted-by":"publisher","unstructured":"Dintyala P, Narechania A, Arulraj J. SQLCheck: Automated detection and diagnosis of SQL anti-patterns. In Proc. the 2020 ACM SIGMOD International Conference on Management of Data, Jun. 2020, pp.2331-2345. https:\/\/doi.org\/10.1145\/3318464.3389754.","DOI":"10.1145\/3318464.3389754"}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-021-1674-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11390-021-1674-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-021-1674-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,18]],"date-time":"2022-02-18T05:20:33Z","timestamp":1645161633000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11390-021-1674-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,31]]},"references-count":23,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["1674"],"URL":"https:\/\/doi.org\/10.1007\/s11390-021-1674-4","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"value":"1000-9000","type":"print"},{"value":"1860-4749","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,31]]},"assertion":[{"value":"2 June 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 December 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 January 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}