{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T14:32:13Z","timestamp":1771079533310,"version":"3.50.1"},"reference-count":68,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1109\/saner48275.2020.9054825","type":"proceedings-article","created":{"date-parts":[[2020,4,3]],"date-time":"2020-04-03T07:47:32Z","timestamp":1585900052000},"page":"23-34","source":"Crossref","is-referenced-by-count":71,"title":["SMARTSHIELD: Automatic Smart Contract Protection Made Easy"],"prefix":"10.1109","author":[{"given":"Yuyao","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Siqi","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Juanru","family":"Li","sequence":"additional","affiliation":[]},{"given":"Kailai","family":"Li","sequence":"additional","affiliation":[]},{"given":"Surya","family":"Nepal","sequence":"additional","affiliation":[]},{"given":"Dawu","family":"Gu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","year":"0","journal-title":"The beautychain (bec) contract"},{"key":"ref38","year":"0","journal-title":"Spankchain loses $40k in hack due to smart contract bug"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/20.1.45"},{"key":"ref32","year":"0","journal-title":"Contract code size limit"},{"key":"ref31","year":"0","journal-title":"Ethereum (eth) blockchain explorer"},{"key":"ref30","year":"0","journal-title":"Go-ethereum"},{"key":"ref37","year":"0","journal-title":"The ledgerchannel contract"},{"key":"ref36","year":"0","journal-title":"The darkdao contract"},{"key":"ref35","year":"0","journal-title":"The dao contract"},{"key":"ref34","year":"0","journal-title":"Scalable blockchain infrastructure"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/3158136"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00120"},{"key":"ref61","first-page":"1371","article-title":"Erays: reverse engineering ethereum's opaque smart contracts","author":"zhou","year":"0","journal-title":"27th USENIX Security Symposium ( USENIX Security 18)"},{"key":"ref63","first-page":"11","article-title":"Porosity: A decompiler for blockchain-based smart contracts bytecode","volume":"25","author":"suiche","year":"2017","journal-title":"DEF CON"},{"key":"ref28","year":"0","journal-title":"Solidity"},{"key":"ref64","author":"brent","year":"2018","journal-title":"Vandal A scalable security analysis framework for smart contracts"},{"key":"ref27","year":"0","journal-title":"Use the checks-effects-interactions pattern"},{"key":"ref65","first-page":"71","article-title":"Intpatch: Automatically fix integer-overflow-to-buffer-overflow vulnerability at compile-time","author":"zhang","year":"0","journal-title":"European symposium on research in computer security"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970282"},{"key":"ref29","first-page":"1","article-title":"Ethereum: A secure decentralised generalised transaction ledger","volume":"151","author":"wood","year":"2014","journal-title":"Ethereum Project Yellow Paper"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897896"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/3276486"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"ref1","year":"0","journal-title":"A major vulnerability has frozen hundreds of millions of dollars of ethereum"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3105906"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642955"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23255"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.104"},{"key":"ref23","first-page":"329","article-title":"Autopag: towards automated software patch generation with source code root cause identification and repair","author":"lin","year":"0","journal-title":"Proceedings of the 2nd ACM Symposium on Information Computer and Communications Security ACM"},{"key":"ref26","year":"0","journal-title":"Alert New batchoverflow bug in multiple erc20 smart contracts (eve-2018-10299)"},{"key":"ref25","year":"0","journal-title":"Understanding the dao attack"},{"key":"ref50","first-page":"79","article-title":"Step by step towards creating a safe smart contract: Lessons and insights from a cryptocurrency lab","author":"delmolino","year":"0","journal-title":"International Conference on Financial Cryptography and Data Security"},{"key":"ref51","first-page":"164","article-title":"A survey of attacks on ethereum smart contracts (sok)","author":"atzei","year":"0","journal-title":"International Conference on Principles of Security and Trust"},{"key":"ref59","author":"rodler","year":"2018","journal-title":"Sereum Protecting existing smart contracts against re-entrancy attacks"},{"key":"ref58","first-page":"66","article-title":"Towards verifying ethereum smart contract bytecode in isabelle\/hol","author":"amani","year":"0","journal-title":"Proceedings of the 7th ACM SIGPLAN International Conference on Certified Programs and Proofs ACM"},{"key":"ref57","first-page":"520","article-title":"Defining the ethereum virtual machine for interactive theorem provers","author":"hirai","year":"0","journal-title":"International Conference on Financial Cryptography and Data Security"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-89722-6_10"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2993600.2993611"},{"key":"ref54","first-page":"653","article-title":"Finding the greedy, prodigal, and suicidal contracts at scale","author":"nikolic","year":"0","journal-title":"Proceedings of the 34th Annual Computer Security Applications Conference ACM"},{"key":"ref53","first-page":"478","article-title":"A concurrent perspective on smart contracts","author":"sergey","year":"0","journal-title":"International Conference on Financial Cryptography and Data Security"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.08.014"},{"key":"ref10","year":"0","journal-title":"Security considerations"},{"key":"ref11","year":"0","journal-title":"Ethereum smart contract security best practices"},{"key":"ref40","year":"0","journal-title":"The smartmesh (smt) contract"},{"key":"ref12","year":"0","journal-title":"Solidity security Comprehensive list of known attack vectors and common anti-patterns"},{"key":"ref13","year":"0","journal-title":"Decentralized application security project (or dasp) top 10 of 2018"},{"key":"ref14","year":"0","journal-title":"Scanning live ethereum contracts for the &#x201C;unchecked-send&#x201D; bug"},{"key":"ref15","year":"0","journal-title":"25% of all smart contracts contain critical bugs"},{"key":"ref16","first-page":"664","article-title":"Osiris: Hunting for integer bugs in ethereum smart contracts","author":"torres","year":"0","journal-title":"Proceedings of the 34th Annual Computer Security Applications Conference ACM"},{"key":"ref17","year":"0","journal-title":"Mythril"},{"key":"ref18","year":"0","journal-title":"Watch out for insecure stackoverflow answers!"},{"key":"ref19","first-page":"229","article-title":"Vurle: Automatic vulnerability detection and repair by learning from examples","author":"ma","year":"0","journal-title":"European symposium on research in computer security"},{"key":"ref4","author":"torres","year":"2019","journal-title":"The art of the scam Demystifying honeypots in ethereum smart contracts"},{"key":"ref3","first-page":"1317","article-title":"teether: Gnawing at ethereum to automatically exploit smart contracts","author":"krupp","year":"0","journal-title":"27th USENIX Security Symposium ( USENIX Security 18)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243780"},{"key":"ref5","first-page":"531","article-title":"Learning to fuzz from symbolic execution with application to smart contracts","author":"he","year":"0","journal-title":"Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security ACM"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238177"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23082"},{"key":"ref49","year":"0","journal-title":"Post-mortem investigation (feb 2016)"},{"key":"ref9","first-page":"363","article-title":"Exploiting the laws of order in smart contracts","author":"kolluri","year":"0","journal-title":"Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis ACM"},{"key":"ref46","year":"0","journal-title":"The hexagon (hxg) contract"},{"key":"ref45","year":"0","journal-title":"New multioverflow bug identified in multiple erc20 smart contracts (cve-2018-10706)"},{"key":"ref48","year":"0","journal-title":"The kotet contract"},{"key":"ref47","year":"0","journal-title":"New burn overflow bug identified in multiple erc20 smart contracts (cve-2018-11239)"},{"key":"ref42","year":"0","journal-title":"The uselessethereumtoken (uet) contract"},{"key":"ref41","year":"0","journal-title":"New proxy overflow bug in multiple erc20 smart contracts (cve-2018-10376)"},{"key":"ref44","year":"0","journal-title":"The social chain (sca) contract"},{"key":"ref43","year":"0","journal-title":"Your tokens are mine A suspicious scam token in a top exchange"}],"event":{"name":"2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER)","location":"London, ON, Canada","start":{"date-parts":[[2020,2,18]]},"end":{"date-parts":[[2020,2,21]]}},"container-title":["2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9040394\/9054788\/09054825.pdf?arnumber=9054825","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:52:52Z","timestamp":1656453172000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9054825\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2]]},"references-count":68,"URL":"https:\/\/doi.org\/10.1109\/saner48275.2020.9054825","relation":{},"subject":[],"published":{"date-parts":[[2020,2]]}}}