{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T14:25:03Z","timestamp":1771079103394,"version":"3.50.1"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2020YFB1006000"],"award-info":[{"award-number":["2020YFB1006000"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072202"],"award-info":[{"award-number":["62072202"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62002125"],"award-info":[{"award-number":["62002125"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology Program of Guangzhou, China","award":["201902020016"],"award-info":[{"award-number":["201902020016"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2020JYCXJJ068"],"award-info":[{"award-number":["2020JYCXJJ068"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2022,11,1]]},"DOI":"10.1109\/tse.2021.3123170","type":"journal-article","created":{"date-parts":[[2021,10,27]],"date-time":"2021-10-27T19:52:34Z","timestamp":1635364354000},"page":"4611-4629","source":"Crossref","is-referenced-by-count":36,"title":["Aroc: An Automatic Repair Framework for On-Chain Smart Contracts"],"prefix":"10.1109","volume":"48","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3934-7605","authenticated-orcid":false,"given":"Hai","family":"Jin","sequence":"first","affiliation":[{"name":"National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Cluster and Grid Computing Lab, School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5053-5201","authenticated-orcid":false,"given":"Zeli","family":"Wang","sequence":"additional","affiliation":[{"name":"National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Cluster and Grid Computing Lab, School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5588-9618","authenticated-orcid":false,"given":"Ming","family":"Wen","sequence":"additional","affiliation":[{"name":"National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0666-8231","authenticated-orcid":false,"given":"Weiqi","family":"Dai","sequence":"additional","affiliation":[{"name":"National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"}]},{"given":"Yu","family":"Zhu","sequence":"additional","affiliation":[{"name":"National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8534-5048","authenticated-orcid":false,"given":"Deqing","family":"Zou","sequence":"additional","affiliation":[{"name":"National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48063.2020.00039"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385982"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3404366"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380334"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238177"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385990"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24449"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00024"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00032"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SANER48275.2020.9054822"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23413"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2019.8668038"},{"key":"ref11","first-page":"1335","article-title":"Enter the Hydra: Towards principled bug bounties and exploit-resistant smart contracts","author":"breidenbach","year":"2018","journal-title":"Proc 27th USENIX Secur Symp"},{"key":"ref12","year":"0"},{"key":"ref13","year":"2020"},{"key":"ref14","article-title":"Decentralized application security project (or DASP) top 10 of 2018","author":"group","year":"2018"},{"key":"ref15","first-page":"530","article-title":"Empirical review of automated analysis tools on 47, 587 Ethereum smart contracts","author":"durieux","year":"2020","journal-title":"Proc IEEE\/ACM 42nd Int Conf Softw Eng"},{"key":"ref16","first-page":"1289","article-title":"EVMPatch: Timely and automated patching of Ethereum smart contracts","author":"rodler","year":"2021","journal-title":"Proc 30th USENIX Secur Symp"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2019.2949561"},{"key":"ref18","article-title":"Ethereum yellow paper","author":"wood","year":"2018"},{"key":"ref19","article-title":"Understanding the dao attack","author":"siegel","year":"2016"},{"key":"ref28","article-title":"Detecting integer arithmetic bugs in Ethereum smart contracts","author":"mueller","year":"2016"},{"key":"ref4","year":"2018"},{"key":"ref27","year":"2017"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-020-9284-9"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274737"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"ref5","article-title":"Slowmist hacked","author":"zone","year":"2020"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330560"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23082"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-018-9781-0"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416646"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-020-2781-0"},{"key":"ref20","article-title":"openzeppelin-contracts","year":"2020"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC48747.2019.00069"},{"key":"ref21","year":"2016"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3415298"},{"key":"ref23","article-title":"SB curated: A curated dataset of vulnerable solidity smart contracts","author":"ferreira","year":"2020"},{"key":"ref26","article-title":"Remix, Ethereum-IDE","year":"2020"},{"key":"ref25","article-title":"The Ethereum blockchain explorer","year":"0"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/9946941\/09591399.pdf?arnumber=9591399","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T19:36:21Z","timestamp":1670873781000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9591399\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,1]]},"references-count":40,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tse.2021.3123170","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,1]]}}}