{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:31:07Z","timestamp":1771698667919,"version":"3.50.1"},"reference-count":64,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2023,9,1]]},"DOI":"10.1109\/tse.2023.3298609","type":"journal-article","created":{"date-parts":[[2023,7,27]],"date-time":"2023-07-27T17:38:59Z","timestamp":1690479539000},"page":"4456-4476","source":"Crossref","is-referenced-by-count":10,"title":["<i>BiAn:<\/i> Smart Contract Source Code Obfuscation"],"prefix":"10.1109","volume":"49","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3594-408X","authenticated-orcid":false,"given":"Pengcheng","family":"Zhang","sequence":"first","affiliation":[{"name":"College of Computer and Information, Hohai University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0029-5622","authenticated-orcid":false,"given":"Qifan","family":"Yu","sequence":"additional","affiliation":[{"name":"College of Computer and Information, Hohai University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2563-083X","authenticated-orcid":false,"given":"Yan","family":"Xiao","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Sun Yat-sen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7033-5688","authenticated-orcid":false,"given":"Hai","family":"Dong","sequence":"additional","affiliation":[{"name":"School of Computing Technologies, RMIT University, Melbourne, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9082-3208","authenticated-orcid":false,"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"Department of Computing, Hong Kong Polytechnic University, HongKong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-0195-3186","authenticated-orcid":false,"given":"Xiao","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Computer and Information, Hohai University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3517-6041","authenticated-orcid":false,"given":"Meng","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computer and Information, Hohai University, Nanjing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT.2018.8494045"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2942301"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME46990.2020.00023"},{"key":"ref4","first-page":"9","article-title":"SmartCheck: Static analysis of Ethereum smart contracts","volume-title":"Proc. IEEE\/ACM 1st Int. Workshop Emerg. Trends Softw. Eng. Blockchain (WETSEB)","author":"Tikhomirov","year":"2018"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/WETSEB.2019.00008"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SANER48275.2020.9054825"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC51365.2020.00069"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3390566.3391681"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03769-7_8"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/DAPPCON.2019.00018"},{"key":"ref11","article-title":"Bitcoin: A peer-to-peer electronic cash system","volume-title":"Bitcoin, Las Vegas, NV, USA, Tech. Rep.","author":"Nakamoto","year":"2019"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-58387-6_28"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274743"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3391195"},{"key":"ref15","article-title":"Formal specification and verification of smart contracts for azure blockchain","author":"Wang","year":"2018"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2018.8500488"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-018-0591-z"},{"key":"ref18","article-title":"A static program slicing approach for output stream objects in JEE applications","author":"Shatnawi","year":"2018"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC.2017.69"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45871-7_20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/268946.268962"},{"key":"ref22","first-page":"102","article-title":"A method for watermarking Java programs via opaque predicates","volume-title":"Proc. 5th Int. Conf. Electron. Commerce Res. (ICECR-5)","author":"Arboit"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45439-X_10"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2002.1167764"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00031"},{"key":"ref26","article-title":"A taxonomy of obfuscating transformations","volume-title":"Dept. Comput. Sci., Univ. Auckland, Auckland, New Zealand, Tech. Rep.","author":"Collberg"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1063\/1.2820117"},{"key":"ref28","first-page":"102","article-title":"A method for watermarking Java programs via opaque predicates","volume-title":"Proc. Int. Conf. Electron. Commerce Res.","author":"Arboit"},{"key":"ref29","article-title":"General method of program code obfuscation","volume-title":"Inst. of Eng. Cybern., Wroclaw Univ. of Technol.","author":"Wroblewski"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.294"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1063\/1.4922973"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46416-6_49"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2007.10.009"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/268946.268962"},{"key":"ref35","volume-title":"Security through obscurity: Layout obfuscation of digital integrated circuits using don\u2019t care conditions","author":"Awan","year":"2015"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1515\/9781400858156.273"},{"key":"ref37","article-title":"Vandal: A scalable security analysis framework for smart contracts","author":"Brent","year":"2018"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00120"},{"key":"ref39","article-title":"Vandal: A scalable security analysis framework for smart contracts","author":"Brent","year":"2018"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1037\/a0028086"},{"key":"ref41","first-page":"337","article-title":"A SAS macro to compute effect size (Cohens) and its confidence interval from raw survey data","volume-title":"Proc. South East SAS Users Group (SESUG)","author":"Kadel"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2017.7884650"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/IWBOSE50093.2020.9050163"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3563308"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2019.8763848"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243780"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00133"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274737"},{"key":"ref50","first-page":"1591","article-title":"The art of the scam: Demystifying honeypots in Ethereum smart contracts","volume-title":"Proc. 28th USENIX Secur. Symp.","author":"Torres","year":"2019"},{"key":"ref51","article-title":"DASP: Stata modules for distributive analysis","volume-title":"Statistical Software Components","author":"Abdelkrim","year":"2007"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/iccse.2012.6295254"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ESCI48226.2020.9167661"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ISA.2008.49"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2012.14"},{"key":"ref56","first-page":"317","article-title":"Tamper resistant software: An implementation","volume-title":"Proc. Int. Workshop Inf. Hiding","author":"Johnson"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24178-9_19"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238177"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32409-4_18"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23082"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3276486"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00120"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3404365"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45237-7_7"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/10255132\/10195953.pdf?arnumber=10195953","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,23]],"date-time":"2024-05-23T05:46:13Z","timestamp":1716443173000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10195953\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,1]]},"references-count":64,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/tse.2023.3298609","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,1]]}}}