{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T19:54:22Z","timestamp":1761162862409,"version":"build-2065373602"},"reference-count":53,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2023YFB2704700"],"award-info":[{"award-number":["2023YFB2704700"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62032025","62302534","623B2102"],"award-info":[{"award-number":["62032025","62302534","623B2102"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100021171","name":"Basic and Applied Basic Research Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2025A1515011632"],"award-info":[{"award-number":["2025A1515011632"]}],"id":[{"id":"10.13039\/501100021171","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1109\/tse.2025.3605145","type":"journal-article","created":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T17:40:17Z","timestamp":1760722817000},"page":"2942-2956","source":"Crossref","is-referenced-by-count":0,"title":["Who Is Pulling the Strings: Unveiling Smart Contract State Manipulation Attacks Through State-Aware Dataflow Analysis"],"prefix":"10.1109","volume":"51","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-4919-3138","authenticated-orcid":false,"given":"Shuo","family":"Yang","sequence":"first","affiliation":[{"name":"School of Software Engineering, Sun Yat-sen University, Zhuhai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0192-9992","authenticated-orcid":false,"given":"Jiachi","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Software Engineering, Sun Yat-sen University, Zhuhai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-7093-0364","authenticated-orcid":false,"given":"Lei","family":"Xiao","sequence":"additional","affiliation":[{"name":"School of Computer Science, Sun Yat-sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-4860-5790","authenticated-orcid":false,"given":"Jinyuan","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Software Engineering, Sun Yat-sen University, Zhuhai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7067-2396","authenticated-orcid":false,"given":"Dan","family":"Lin","sequence":"additional","affiliation":[{"name":"School of Software Engineering, Sun Yat-sen University, Zhuhai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5155-8547","authenticated-orcid":false,"given":"Jiajing","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Software Engineering, Sun Yat-sen University, Zhuhai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6272-4069","authenticated-orcid":false,"given":"Tao","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Macau University of Science and Technology, Macau, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7872-7718","authenticated-orcid":false,"given":"Zibin","family":"Zheng","sequence":"additional","affiliation":[{"name":"School of Software Engineering, Sun Yat-sen University, Zhuhai, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2751"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3558535.3559780"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598063"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598124"},{"year":"2024","key":"ref5","article-title":"Hack3D: The Web3 security quarterly report - q2 + h1 2024"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639153"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00036"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639190"},{"year":"2024","key":"ref9","article-title":"Yield \u2014 Business logic flaw"},{"year":"2024","key":"ref10","article-title":"Yield protocol logic error bugfix review"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3729353"},{"article-title":"Following Devils\u2019 Footprint: Towards real-time detection of price manipulation attacks","year":"2025","author":"Zhang","key":"ref12"},{"year":"2024","key":"ref13","article-title":"BscScan"},{"year":"2023","key":"ref14","article-title":"Etherscan \u2014 The Ethereum blockchain explorer"},{"year":"2024","key":"ref15","article-title":"Reproduce DeFi hacked incidents using foundry"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.12.019"},{"year":"2023","key":"ref17","article-title":"Documentation"},{"year":"2024","key":"ref18","article-title":"Ethereum virtual machine opcodes"},{"key":"ref19","first-page":"1793","article-title":"Confusum contractum: Confused deputy vulnerabilities in Ethereum smart contracts","volume-title":"Proc. 32nd USENIX Secur. Symp. (USENIX Secur. 23)","author":"Gritti","year":"2023"},{"year":"2024","key":"ref20","article-title":"Yield protocol"},{"year":"2024","key":"ref21","article-title":"Balancer vault"},{"year":"2023","key":"ref22","article-title":"web3py"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3527321"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/icse55347.2025.00015"},{"year":"2024","key":"ref25","article-title":"Root cause of z123 exploit"},{"year":"2023","key":"ref26","article-title":"Dedaub"},{"key":"ref27","first-page":"1570","article-title":"Skyeye: Detecting imminent attacks via analyzing adversarial smart contracts","volume-title":"Proc. 39th IEEE\/ACM Int. Conf. Automated Softw. Eng.","author":"Wang","year":"2024"},{"year":"2024","key":"ref28","article-title":"Transaction debug platform"},{"year":"2024","key":"ref29","article-title":"Tornado cash"},{"year":"2024","key":"ref30","article-title":"Foundry Book"},{"year":"2024","key":"ref31","article-title":"Malware next-generation analysis"},{"year":"2024","key":"ref32","article-title":"RPC service"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s40012-016-0095-y"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.5121\/ijaia.2013.4411"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2963724"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2491300"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/FormaliSE.2017.4"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2017.8024568"},{"key":"ref39","first-page":"1307","article-title":"Evil under the sun: Understanding and discovering attacks on Ethereum decentralized applications","volume-title":"Proc. 30th USENIX Secur. Symp. (USENIX Secur.)","author":"Su","year":"2021"},{"key":"ref40","first-page":"1757","article-title":"Your exploit is mine: Instantly synthesizing counterattack smart contract","volume-title":"Proc. 32nd USENIX Secur. Symp. (USENIX Secur.)","author":"Zhang","year":"2023"},{"key":"ref41","first-page":"3961","article-title":"The blockchain imitation game","volume-title":"Proc. 32nd USENIX Secur. Symp. (USENIX Secur.)","author":"Qin","year":"2023"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3349852"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"year":"2023","key":"ref44","article-title":"Mythril"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2391229.2391233"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534222"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238177"},{"key":"ref48","doi-asserted-by":"crossref","first-page":"778","DOI":"10.1145\/3377811.3380334","article-title":"sFuzz: An efficient adaptive fuzzer for solidity smart contracts","volume-title":"Proc. ACM\/IEEE 42nd Int. Conf. Softw. Eng.","author":"Nguyen","year":"2020"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3560264"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3674725"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678888"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3560428"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3560429"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/32\/11207080\/11207087.pdf?arnumber=11207087","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T17:08:58Z","timestamp":1761066538000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11207087\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10]]},"references-count":53,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/tse.2025.3605145","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"type":"print","value":"0098-5589"},{"type":"electronic","value":"1939-3520"},{"type":"electronic","value":"2326-3881"}],"subject":[],"published":{"date-parts":[[2025,10]]}}}