{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T11:00:34Z","timestamp":1761562834678,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,11,22]],"date-time":"2021-11-22T00:00:00Z","timestamp":1637539200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,11,22]],"date-time":"2021-11-22T00:00:00Z","timestamp":1637539200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,22]],"date-time":"2021-11-22T00:00:00Z","timestamp":1637539200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,22]]},"DOI":"10.1109\/sbesc53686.2021.9628229","type":"proceedings-article","created":{"date-parts":[[2021,12,6]],"date-time":"2021-12-06T21:15:42Z","timestamp":1638825342000},"page":"1-8","source":"Crossref","is-referenced-by-count":9,"title":["Verifying Security Vulnerabilities for Blockchain-based Smart Contracts"],"prefix":"10.1109","author":[{"given":"Nedas","family":"Matulevicius","sequence":"first","affiliation":[]},{"given":"Lucas C.","family":"Cordeiro","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","article-title":"Security analysis methods on ethereum smart contract vulnerabilities:A survey","volume":"abs 1908 8605","author":"praitheeshan","year":"2019","journal-title":"CoRR"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54455-6_8"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3391195"},{"journal-title":"Trail of Bits","article-title":"solc-select: A tool to quickly switch between solidity compiler versions","year":"0","key":"ref30"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3240481"},{"key":"ref34","volume":"15","author":"wang","year":"2020","journal-title":"Ethereum smart contract security research survey and future research opportunities"},{"key":"ref10","article-title":"Most common smart contract bugs of 2020","author":"pramesh","year":"0","journal-title":"A Medium Corporation"},{"journal-title":"Smart contract security What are the weak spots of ethereum eos and neo networks? TechNative","year":"0","author":"gogan","key":"ref11"},{"journal-title":"Remix Team","article-title":"Remix analyzer","year":"0","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/WETSEB.2019.00008"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"journal-title":"Smashing ethereum smart contracts for fun and real profit","year":"2018","author":"mueller","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3194113.3194115"},{"journal-title":"Carnegie Mellon University Software Engineering Institute","article-title":"How this coding standard is organized - risk assessment","year":"0","key":"ref17"},{"key":"ref18","article-title":"The cia strikes back: Redefining confidentiality, integrity and availability in security","volume":"10","author":"samonas","year":"2014","journal-title":"JISSec"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-017-0467-3"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45237-7_7"},{"key":"ref4","article-title":"30 blockchain applications and real-world use cases disrupting the status quo","author":"daley","year":"0","journal-title":"Built"},{"journal-title":"The hyperfine developers","article-title":"hyperfine - a command-line benchmarking tool","year":"0","key":"ref27"},{"key":"ref3","article-title":"Ethereum whitepaper","author":"buterin","year":"0","journal-title":"Ethereum org"},{"key":"ref6","article-title":"The blockchain phenomenon &#x2013; the disruptive potential of distributed consensus architectures","author":"mattila","year":"2016","journal-title":"Helsinki ETLA Working Papers 38"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3276486"},{"journal-title":"About solidity Solidity Team","year":"0","key":"ref5"},{"key":"ref8","article-title":"Blockchain technology overview","volume":"abs 1906 11078","author":"yaga","year":"2019","journal-title":"CoRR"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s00287-020-01246-7"},{"key":"ref2","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"nakamoto","year":"0","journal-title":"Bitcoin org"},{"journal-title":"Hacken OU","article-title":"Most common smart contract vulnerabilities","year":"0","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-017-0506-0"},{"key":"ref20","first-page":"521","article-title":"A comparative study on software vulnerability static analysis techniques and tools","author":"li","year":"2010","journal-title":"IEEE ICIT 2010"},{"journal-title":"Solana","year":"0","author":"rafaloff","key":"ref22"},{"journal-title":"Maian","year":"0","author":"nikolic","key":"ref21"},{"journal-title":"Remix - ethereum ide remix-project org","year":"0","key":"ref24"},{"journal-title":"Sif (solidity instrumentation framework) - issue no 6 terminate called after throwing an instance of &#x2019;nlohmann detail out_of range&#x2019;","year":"0","author":"peng","key":"ref23"},{"journal-title":"htop Team","article-title":"htop - an interactive process viewer","year":"0","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"}],"event":{"name":"2021 XI Brazilian Symposium on Computing Systems Engineering (SBESC)","start":{"date-parts":[[2021,11,22]]},"location":"Florianopolis, Brazil","end":{"date-parts":[[2021,11,26]]}},"container-title":["2021 XI Brazilian Symposium on Computing Systems Engineering (SBESC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9628149\/9628198\/09628229.pdf?arnumber=9628229","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:54:03Z","timestamp":1652201643000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9628229\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,22]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/sbesc53686.2021.9628229","relation":{},"subject":[],"published":{"date-parts":[[2021,11,22]]}}}