{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T00:32:16Z","timestamp":1770337936678,"version":"3.49.0"},"reference-count":190,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272204"],"award-info":[{"award-number":["62272204"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372105"],"award-info":[{"award-number":["62372105"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Leading-edge Technology Program of Jiangsu Natural Science Foundation","award":["BK20202001"],"award-info":[{"award-number":["BK20202001"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Serv. Comput."],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1109\/tsc.2024.3463394","type":"journal-article","created":{"date-parts":[[2024,9,18]],"date-time":"2024-09-18T17:57:51Z","timestamp":1726682271000},"page":"4522-4539","source":"Crossref","is-referenced-by-count":16,"title":["A Survey on Security Analysis Methods of Smart Contracts"],"prefix":"10.1109","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2751-2607","authenticated-orcid":false,"given":"Huijuan","family":"Zhu","sequence":"first","affiliation":[{"name":"School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, China"}]},{"given":"Lei","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0048-5979","authenticated-orcid":false,"given":"Liangmin","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Southeast University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4960-174X","authenticated-orcid":false,"given":"Victor S.","family":"Sheng","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Texas Tech Uni-versity, Lubbock, TX, USA"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Dune \u2014 Crypto analytics powered by community","year":"2018"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54455-6_8"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C.2019.00086"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SERA.2019.8886793"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/BCCA50787.2020.9274458"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICBDS53701.2022.9935949"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2019.8870156"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110891"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.5220\/0008909803170324"},{"key":"ref10","first-page":"1325","article-title":"Smart contract vulnerabilities: Vulnerable does not imply exploited","volume-title":"Proc. USENIX Secur. Symp.","author":"Perez"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-020-9284-9"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-021-10018-0"},{"key":"ref13","first-page":"530","article-title":"Empirical review of automated analysis tools on 47,587 ethereum smart contracts","volume-title":"Proc. IEEE\/ACM 42th Int. Conf. Softw. Eng.","author":"Durieux"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/DAPPCON.2019.00018"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00061"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464837"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME46990.2020.00023"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/BigData50022.2020.9439088"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101654"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4341"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3593293"},{"key":"ref22","article-title":"Bug searching in smart contract","author":"Feng","year":"2019"},{"key":"ref23","article-title":"Pre-deployment Analysis of Smart Contracts \u2013 A Survey","author":"Munir","year":"2023"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SecDev45635.2020.00026"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3389\/fbloc.2022.814977"},{"issue":"7","key":"ref26","first-page":"1959","article-title":"Research on vulnerability mining technique for smart contracts","volume":"39","author":"Fu","year":"2019","journal-title":"J. Comput. Appl."},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICISCAE51034.2020.9236931"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-66626-2_10"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3390\/e22020203"},{"key":"ref30","article-title":"Security analysis methods on ethereum smart contract vulnerabilities: A survey","author":"Praitheeshan","year":"2020"},{"key":"ref31","article-title":"A survey of security vulnerabilities in ethereum smart contracts","author":"Samreen","year":"2021"},{"key":"ref32","article-title":"Smart contract vulnerability detection technique: A survey","author":"Qian","year":"2022"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3391195"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-78621-2_14"},{"issue":"11","key":"ref35","first-page":"79","article-title":"Survey of vulnerability detection tools for smart contracts","volume":"48","author":"Tu","year":"2021","journal-title":"Comput. Sci."},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2020.2989002"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1002\/spe.3156"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2023.107221"},{"key":"ref39","article-title":"Vulnerabilities of smart contracts and mitigation schemes: A comprehensive survey","author":"Haouari","year":"2024"},{"key":"ref40","article-title":"Chengdu Lianan tech","year":"2018"},{"key":"ref41","article-title":"SlowMist hacked - SlowMist Zone","year":"2019"},{"key":"ref42","article-title":"SmartDec","year":"2022"},{"key":"ref43","article-title":"PeckShield - Industry leading blockchain security company","year":"2018"},{"key":"ref44","article-title":"Quantstamp: The leader in Web3 security","year":"2017"},{"key":"ref45","article-title":"NONEAGE | focus on blockchain ecosystem security","year":"2018"},{"key":"ref46","article-title":"BlockSec building blockchain security infrastructure","year":"2020"},{"key":"ref47","article-title":"Web3 security leaderboard","year":"2018"},{"key":"ref48","article-title":"Blockchain security solutions - beosin","year":"2018"},{"key":"ref49","article-title":"SharkTeam - The world\u2019s leading Web3 security service provider","year":"2021"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397385"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/IWBOSE50093.2020.9050260"},{"key":"ref52","first-page":"65","article-title":"ReGuard: Finding reentrancy bugs in smart contracts","volume-title":"Proc. IEEE\/ACM 40th Int. Conf. Softw. Eng.: Companion","author":"Liu"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3404366"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/tr.2022.3161634"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain50366.2020.00048"},{"key":"ref56","first-page":"1029","article-title":"Cross-contract static analysis for detecting practical reentrancy vulnerabilities in smart contracts","volume-title":"Proc. IEEE\/ACM Int. Conf. Autom. Softw. Eng.","author":"Xue"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/MSN53354.2021.00069"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE52982.2021.00047"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE59848.2023.00024"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3560428"},{"key":"ref61","article-title":"G-Scan: Graph neural networks for line-level vulnerability identification in smart contracts","author":"Sendner","year":"2023"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1360\/sst-2021-0365"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23413"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.3389\/fcomp.2021.598780"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3463274.3463348"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00084"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00036"},{"key":"ref68","article-title":"Solidity \u2014 Solidity 0.8.26 documentation","year":"2024"},{"key":"ref69","article-title":"KotET - post-mortem investigation","year":"2016"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/WETSEB52558.2021.00010"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-72359-4_1"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/3416262"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678932"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-18679-0_9"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534378"},{"key":"ref76","article-title":"BUGX.IO","year":"2018"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274737"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion.2019.00029"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/3377644.3377650"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00032"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.26599\/tst.2020.9010036"},{"key":"ref82","article-title":"Ethereum smart contract best practices","year":"2018"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"ref84","article-title":"OpenZeppelin","year":"2015"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534372"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00087"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598125"},{"key":"ref88","article-title":"Sigma prime"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238177"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1145\/3488245"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2019.8763848"},{"key":"ref92","article-title":"El dorado exchange","year":"2023"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion58688.2023.00019"},{"key":"ref94","article-title":"Overview \u00b7 smart contract weakness classification and test cases","year":"2020"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2024.24713"},{"key":"ref96","first-page":"1591","article-title":"The art of the scam: Demystifying honeypots in ethereum smart contracts","volume-title":"Proc. USENIX Secur. Symp.","author":"Torres"},{"issue":"5","key":"ref97","first-page":"2325","article-title":"Detection of smart contract timestamp vulnerability based on data-flow path learning","volume":"35","author":"Zhang","year":"2023","journal-title":"J. Softw."},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2016.7778635"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833721"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2023.3271417"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1145\/3391195"},{"key":"ref102","article-title":"Smart contract security field guide","author":"Dominik","year":"2023"},{"key":"ref103","article-title":"Smart contract best practice","author":"Agrawal","year":"2023"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9020255"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2018.00022"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1145\/3167084"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00024"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-58387-6_28"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23082"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32101-7_27"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/mis.2020.2977594"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/CIRSYSSIM.2019.8935603"},{"key":"ref113","article-title":"Python. Consensys","year":"2018"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243780"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29959-0_36"},{"key":"ref116","first-page":"1317","article-title":"teEther: Gnawing at ethereum to automatically exploit smart contracts","volume-title":"Proc. USENIX Secur. Symp.","author":"Krupp"},{"key":"ref117","first-page":"1361","article-title":"SmarTest: Effectively hunting vulnerable transaction sequences in smart contracts through language model-guided symbolic execution","volume-title":"Proc. USENIX Secur. Symp.","author":"So"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2021.3054928"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2021.3117966"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534395"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2022.3141396"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274743"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00133"},{"key":"ref124","first-page":"2757","article-title":"ETHBMC: A bounded model checker for smart contracts","volume-title":"Proc. USENIX Secur. Symp.","author":"Frank"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598063"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363230"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.02.002"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/IOTSMS48152.2019.8939256"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/SANER48275.2020.9054822"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2022.3182373"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3560429"},{"key":"ref132","first-page":"778","article-title":"sFuzz: An efficient adaptive fuzzer for solidity smart contracts","volume-title":"Proc. IEEE\/ACM 42th Int. Conf. Softw. Eng.","author":"Nguyen"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3417064"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678888"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP51992.2021.00018"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2023.3237370"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598059"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP57164.2023.00034"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/tnse.2020.2968505"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00221"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1145\/3457337.3457841"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2019.00067"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.23263"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN52387.2021.9534324"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109289"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1145\/1122445.1122456"},{"key":"ref147","article-title":"Smart learning to find dumb contracts","author":"Abdelaziz","year":"2023"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108766"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2023.3317209"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-024-00418-z"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639117"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE59848.2023.00030"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2020\/454"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC54236.2022.00277"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3558927"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2023.111775"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.3233\/faia230374"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639213"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-024-00965-2"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/tkde.2023.3333371"},{"key":"ref161","article-title":"Vandal: A scalable security analysis framework for smart contracts","author":"Brent","year":"2018"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417250"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2018.8328743"},{"key":"ref164","first-page":"9","article-title":"SmartCheck: Static analysis of ethereum smart contracts","volume-title":"Proc. IEEE\/ACM Int. Workshop Emerg. Trends Softw. Eng. Blockchain","author":"Tikhomirov"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/WETSEB.2019.00008"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC48747.2019.00071"},{"key":"ref167","first-page":"2775","article-title":"TXSPECTOR: Uncovering attacks in ethereum from transactions","volume-title":"Proc. USENIX Secur. Symp.","author":"Zhang"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2745"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534222"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-022-10218-2"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-37105-9_39"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598111"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/tr.2023.3233999"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385990"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24449"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1109\/tsc.2019.2949561"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-NIER.2019.00009"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102530"},{"key":"ref179","first-page":"1371","article-title":"Erays: Reverse engineering ethereum\u2019s opaque smart contracts","volume-title":"Proc. USENIX Secur. Symp.","author":"Zhou"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1145\/3464421"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2021.3123170"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1145\/3402450"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1109\/SANER48275.2020.9054825"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00057"},{"key":"ref185","first-page":"1289","article-title":"EVMPatch: Timely and automated patching of ethereum smart contracts","volume-title":"Proc. USENIX Secur. Symp.","author":"Rodler"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1145\/3545948.3545975"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1109\/SANER56733.2023.00027"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3616341"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-023-00392-y"},{"key":"ref190","article-title":"EIPs\/EIPS\/eip-20.md at master \u00b7 ethereum\/EIPs"}],"container-title":["IEEE Transactions on Services Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/4629386\/10818968\/10683998.pdf?arnumber=10683998","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,14]],"date-time":"2025-01-14T19:55:29Z","timestamp":1736884529000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10683998\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11]]},"references-count":190,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tsc.2024.3463394","relation":{},"ISSN":["1939-1374","2372-0204"],"issn-type":[{"value":"1939-1374","type":"electronic"},{"value":"2372-0204","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11]]}}}