{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T06:30:17Z","timestamp":1772519417251,"version":"3.50.1"},"reference-count":69,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272145"],"award-info":[{"award-number":["62272145"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U21B2016"],"award-info":[{"award-number":["U21B2016"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Hong Kong ITF Project","award":["GHP\/052\/19SZ"],"award-info":[{"award-number":["GHP\/052\/19SZ"]}]},{"name":"Hong Kong RGC Projects","award":["PolyU15222320"],"award-info":[{"award-number":["PolyU15222320"]}]},{"name":"Hong Kong RGC Projects","award":["PolyU15224121"],"award-info":[{"award-number":["PolyU15224121"]}]},{"name":"Digital Finance CRC (DFCRC) Industrial Ph.D. Scholarship"},{"name":"CloudTech-RMIT Green Bitcoin Joint Research Program"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1109\/tse.2024.3464539","type":"journal-article","created":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T17:24:48Z","timestamp":1726853088000},"page":"2983-3006","source":"Crossref","is-referenced-by-count":6,"title":["SCAnoGenerator: Automatic Anomaly Injection for Ethereum Smart Contracts"],"prefix":"10.1109","volume":"50","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3594-408X","authenticated-orcid":false,"given":"Pengcheng","family":"Zhang","sequence":"first","affiliation":[{"name":"Key Laboratory of Water Big Data Technology of Ministry of Water Resources, and The College of Computer Science and Software Engineering, Hohai University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-8947-0768","authenticated-orcid":false,"given":"Ben","family":"Wang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Water Big Data Technology of Ministry of Water Resources, and The College of Computer Science and Software Engineering, Hohai University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9082-3208","authenticated-orcid":false,"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"Department of Computing, Hong Kong Polytechnic University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7033-5688","authenticated-orcid":false,"given":"Hai","family":"Dong","sequence":"additional","affiliation":[{"name":"School of Computing Technologies, RMIT University, Melbourne, VIC, Australia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2942301"},{"key":"ref3","first-page":"22","article-title":"Ethereum white paper","volume-title":"GitHub Repository","author":"Buterin","year":"2013"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2016.7778635"},{"key":"ref5","article-title":"Ethereum smart contract security best practices","author":"Diligence","year":"2022"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3345664"},{"key":"ref7","first-page":"1","article-title":"Ethertrust: Sound static analysis of Ethereum bytecode","author":"Grishchenko","year":"2018"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238177"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2020.2979019"},{"key":"ref10","first-page":"81","article-title":"Towards saving money in using smart contracts","volume-title":"Proc. IEEE\/ACM 40th Int. Conf. Softw. Eng.: New Ideas Emerg. Technol. Results (ICSE-NIER)","author":"Chen","year":"2018"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2017.7884650"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274743"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23082"},{"key":"ref14","first-page":"65","article-title":"ReGuard: Finding reentrancy bugs in smart contracts","volume-title":"Proc. IEEE\/ACM 40th Int. Conf. Softw. Eng.: Companion (ICSE-Companion)","author":"Liu","year":"2018"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/WETSEB.2019.00008"},{"key":"ref16","first-page":"9","article-title":"SmartCheck: Static analysis of Ethereum smart contracts","volume-title":"Proc. IEEE\/ACM 1st Int. Workshop Emerg. Trends Softw. Eng. Blockchain (WETSEB)","author":"Tikhomirov","year":"2018"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274737"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243780"},{"key":"ref20","first-page":"778","article-title":"sFuzz: An efficient adaptive fuzzer for solidity smart contracts","volume-title":"Proc. IEEE\/ACM 42nd Int. Conf. Softw. Eng. (ICSE)","author":"Nguyen","year":"2020"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363230"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00024"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2020\/454"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464837"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2022.3163614"},{"key":"ref26","first-page":"81","article-title":"Towards saving money in using smart contracts","volume-title":"Proc. 40th Int. Conf. Softw. Eng.: New Ideas Emerg. Results","author":"Chen","year":"2018"},{"key":"ref27","first-page":"530","article-title":"Empirical review of automated analysis tools on 47,587 Ethereum smart contracts","volume-title":"Proc. IEEE\/ACM 42nd Int. Conf. Softw. Eng. (ICSE)","author":"Durieux","year":"2020"},{"key":"ref28","article-title":"Warmup","year":"2021"},{"key":"ref29","article-title":"Smart contract weakness classification and test cases","year":"2021"},{"key":"ref30","article-title":"Examples of solidity security issues","year":"2021"},{"key":"ref31","article-title":"Web3\/solidity based wargame,","year":"2022"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3032239"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397385"},{"key":"ref34","article-title":"A static analysis tool that detects vulnerabilities and bugs in solidity programs","year":"2020"},{"key":"ref35","article-title":"Static analyzer for solidity","year":"2020"},{"key":"ref36","article-title":"Security analysis tool for EVM bytecode","year":"2020"},{"key":"ref37","article-title":"Symbolic execution tool","year":"2020"},{"key":"ref38","article-title":"Maian: Automatic tool for finding trace vulnerabilities in Ethereum smart contracts","year":"2020"},{"key":"ref39","article-title":"A security scanner for Ethereum smart contracts","year":"2020"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-019-09796-5"},{"key":"ref41","article-title":"The development documents of solidity","year":"2023"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3092566"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3051525"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53357-4_6"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME46990.2020.00023"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.2989002"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2022.3161634"},{"key":"ref48","first-page":"1","article-title":"1044-2009-IEEE standard classification for software anomalies","volume-title":"IEEE Std 1044-2009 (Revision of IEEE Std 1044-1993)","author":"Group","year":"2010"},{"key":"ref49","article-title":"Scrapy, a fast high-level web crawling and scraping framework for Python","year":"2020"},{"key":"ref50","article-title":"JavaScript bindings for the solidity compiler","year":"2018"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2018.5197"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.26"},{"key":"ref53","first-page":"259","article-title":"The causes and effects of infeasible paths in computer programs","volume-title":"Proc. 8th Int. Conf. Softw. Eng.","author":"Hedley","year":"1985"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/267896.267921"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3054928"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3381036"},{"key":"ref57","article-title":"Open-source project repository","year":"2020"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00133"},{"key":"ref59","first-page":"103","article-title":"Empirical vulnerability analysis of automated smart contracts security testing on blockchains","volume-title":"Proc. 28th Annu. Int. Conf. Comput. Sci. Softw. Eng. (CASCON)","author":"Parizi","year":"2018"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397385"},{"key":"ref61","first-page":"1263","article-title":"Discovering flaws in security-focused static analysis tools for android using systematic mutation","volume-title":"Proc. 27th USENIX Conf. Secur. Symp. (SEC)","author":"Bonett","year":"2018"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991103"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.15"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2019.8870156"},{"key":"ref65","first-page":"1349","article-title":"SmartBugs: A framework to analyze solidity smart contracts","volume-title":"Proc. 35th IEEE\/ACM Int. Conf. Automated Softw. Eng. (ASE)","author":"Ferreira","year":"2020"},{"key":"ref66","article-title":"Decentralized application security project","year":"2022"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/SANER48275.2020.9054822"},{"key":"ref68","article-title":"Precise attack synthesis for smart contracts","author":"Feng","year":"2019"},{"key":"ref69","first-page":"1317","article-title":"teEther: Gnawing at Ethereum to automatically exploit smart contracts","volume-title":"Proc. 27th USENIX Secur. Symp. (USENIX Secur.)","author":"Krupp","year":"2018"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/32\/10752626\/10684841.pdf?arnumber=10684841","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,13]],"date-time":"2025-01-13T19:48:31Z","timestamp":1736797711000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10684841\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11]]},"references-count":69,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tse.2024.3464539","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11]]}}}