{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:57:44Z","timestamp":1774540664955,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,18]],"date-time":"2020-07-18T00:00:00Z","timestamp":1595030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,18]]},"DOI":"10.1145\/3395363.3397385","type":"proceedings-article","created":{"date-parts":[[2020,7,13]],"date-time":"2020-07-13T21:44:18Z","timestamp":1594676658000},"page":"415-427","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":180,"title":["How effective are smart contract analysis tools? evaluating smart contract static analysis tools using bug injection"],"prefix":"10.1145","author":[{"given":"Asem","family":"Ghaleb","sequence":"first","affiliation":[{"name":"University of British Columbia, Canada"}]},{"given":"Karthik","family":"Pattabiraman","sequence":"additional","affiliation":[{"name":"University of British Columbia, Canada"}]}],"member":"320","published-online":{"date-parts":[[2020,7,18]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2016. Analysis of the DAO exploit. https:\/\/hackingdistributed.com\/ 2016 \/06\/18\/ analysis-of-the-dao-exploit  2016. Analysis of the DAO exploit. https:\/\/hackingdistributed.com\/ 2016 \/06\/18\/ analysis-of-the-dao-exploit"},{"key":"e_1_3_2_1_2_1","unstructured":"2017. History of Ethereum Security Vulnerabilities Hacks and Their Fixes. https:\/\/applicature.com\/blog\/blockchain-technology\/ history-ofethereum-security-vulnerabilities-hacks-and-their-fixes  2017. History of Ethereum Security Vulnerabilities Hacks and Their Fixes. https:\/\/applicature.com\/blog\/blockchain-technology\/ history-ofethereum-security-vulnerabilities-hacks-and-their-fixes"},{"key":"e_1_3_2_1_3_1","unstructured":"2017. The parity wallet breach. https:\/\/bitcoinexchangeguide.com\/parity-walletbreach  2017. The parity wallet breach. https:\/\/bitcoinexchangeguide.com\/parity-walletbreach"},{"key":"e_1_3_2_1_4_1","unstructured":"2017. Remix-Solidity IDE. http:\/\/remix.ethereum.org  2017. Remix-Solidity IDE. http:\/\/remix.ethereum.org"},{"key":"e_1_3_2_1_5_1","unstructured":"2018. eth-mutants. https:\/\/github.com\/federicobond\/eth-mutants  2018. eth-mutants. https:\/\/github.com\/federicobond\/eth-mutants"},{"key":"e_1_3_2_1_6_1","unstructured":"2018. New batchOverflow Bug in Multiple ERC20 Smart Contracts (CVE2018-10299). https:\/\/medium.com\/@peckshield\/alert-new-batchoverflow-bugin-multiple-erc20-smart-contracts-cve-2018-10299-511067db6536  2018. New batchOverflow Bug in Multiple ERC20 Smart Contracts (CVE2018-10299). https:\/\/medium.com\/@peckshield\/alert-new-batchoverflow-bugin-multiple-erc20-smart-contracts-cve-2018-10299-511067db6536"},{"key":"e_1_3_2_1_7_1","unstructured":"2020. CVE-2018-10299 Detail. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-10299  2020. CVE-2018-10299 Detail. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-10299"},{"key":"e_1_3_2_1_8_1","unstructured":"2020. INFURA. https:\/\/infura.io  2020. INFURA. https:\/\/infura.io"},{"key":"e_1_3_2_1_9_1","unstructured":"2020. MetaMask. https:\/\/metamask.io  2020. MetaMask. https:\/\/metamask.io"},{"key":"e_1_3_2_1_10_1","unstructured":"2020. solidity-security-blog. https:\/\/github.com\/sigp\/solidity-security-blog  2020. solidity-security-blog. https:\/\/github.com\/sigp\/solidity-security-blog"},{"key":"e_1_3_2_1_11_1","volume-title":"SolAnalyser: A Framework for Analysing and Testing Smart Contracts. In 2019 26th Asia-Pacific Software Engineering Conference (APSEC). IEEE, 482-489","author":"Akca Sefa","year":"2019","unstructured":"Sefa Akca , Ajitha Rajan , and Chao Peng . 2019 . SolAnalyser: A Framework for Analysing and Testing Smart Contracts. In 2019 26th Asia-Pacific Software Engineering Conference (APSEC). IEEE, 482-489 . Sefa Akca, Ajitha Rajan, and Chao Peng. 2019. SolAnalyser: A Framework for Analysing and Testing Smart Contracts. In 2019 26th Asia-Pacific Software Engineering Conference (APSEC). IEEE, 482-489."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3167084"},{"key":"e_1_3_2_1_13_1","volume-title":"Principles of Security and Trust","author":"Atzei Nicola","unstructured":"Nicola Atzei , Massimo Bartoletti , and Tiziana Cimoli . 2017. A survey of attacks on ethereum smart contracts (sok) . In Principles of Security and Trust . Springer , 164-186. Nicola Atzei, Massimo Bartoletti, and Tiziana Cimoli. 2017. A survey of attacks on ethereum smart contracts (sok). In Principles of Security and Trust. Springer, 164-186."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2993600.2993611"},{"key":"e_1_3_2_1_15_1","volume-title":"27th {USENIX} Security Symposium ({USENIX} Security 18). 1263-1280.","author":"Bonett Richard","unstructured":"Richard Bonett , Kaushal Kafle , Kevin Moran , Adwait Nadkarni , and Denys Poshyvanyk . 2018. Discovering flaws in security-focused static analysis tools for Android using systematic mutation . In 27th {USENIX} Security Symposium ({USENIX} Security 18). 1263-1280. Richard Bonett, Kaushal Kafle, Kevin Moran, Adwait Nadkarni, and Denys Poshyvanyk. 2018. Discovering flaws in security-focused static analysis tools for Android using systematic mutation. In 27th {USENIX} Security Symposium ({USENIX} Security 18). 1263-1280."},{"key":"e_1_3_2_1_16_1","volume-title":"Vandal: A Scalable Security Analysis Framework for Smart Contracts. arXiv preprint arXiv","author":"Brent Lexi","year":"2018","unstructured":"Lexi Brent , Anton Jurisevic , Michael Kong , Eric Liu , Francois Gauthier , Vincent Gramoli , Ralph Holz , and Bernhard Scholz . 2018 . Vandal: A Scalable Security Analysis Framework for Smart Contracts. arXiv preprint arXiv : 1809. 03981 ( 2018 ). Lexi Brent, Anton Jurisevic, Michael Kong, Eric Liu, Francois Gauthier, Vincent Gramoli, Ralph Holz, and Bernhard Scholz. 2018. Vandal: A Scalable Security Analysis Framework for Smart Contracts. arXiv preprint arXiv: 1809. 03981 ( 2018 )."},{"key":"e_1_3_2_1_17_1","volume-title":"Ethereum: A next-generation smart contract and decentralized application platform. URL https:\/\/github. com\/ethereum\/wiki\/wiki\/% 5BEnglish% 5D-White-Paper 7 ( 2014 ).","author":"Buterin Vitalik","year":"2014","unstructured":"Vitalik Buterin . 2014 . Ethereum: A next-generation smart contract and decentralized application platform. URL https:\/\/github. com\/ethereum\/wiki\/wiki\/% 5BEnglish% 5D-White-Paper 7 ( 2014 ). Vitalik Buterin. 2014. Ethereum: A next-generation smart contract and decentralized application platform. URL https:\/\/github. com\/ethereum\/wiki\/wiki\/% 5BEnglish% 5D-White-Paper 7 ( 2014 )."},{"key":"e_1_3_2_1_18_1","volume-title":"Fuse: An Architecture for Smart Contract Fuzz Testing Service. In 2018 25th Asia-Pacific Software Engineering Conference (APSEC). IEEE, 707-708","author":"Chan WK","year":"2018","unstructured":"WK Chan and Bo Jiang . 2018 . Fuse: An Architecture for Smart Contract Fuzz Testing Service. In 2018 25th Asia-Pacific Software Engineering Conference (APSEC). IEEE, 707-708 . WK Chan and Bo Jiang. 2018. Fuse: An Architecture for Smart Contract Fuzz Testing Service. In 2018 25th Asia-Pacific Software Engineering Conference (APSEC). IEEE, 707-708."},{"key":"e_1_3_2_1_19_1","unstructured":"Christopher D Clack Vikram A Bakshi and Lee Braine. 2016. Smart contract templates: foundations design landscape and research directions. arXiv preprint arXiv:1608.00771 ( 2016 ).  Christopher D Clack Vikram A Bakshi and Lee Braine. 2016. Smart contract templates: foundations design landscape and research directions. arXiv preprint arXiv:1608.00771 ( 2016 )."},{"key":"e_1_3_2_1_20_1","unstructured":"Crytic. [n.d.]. Echdina. https:\/\/github.com\/crytic\/echidna  Crytic. [n.d.]. Echdina. https:\/\/github.com\/crytic\/echidna"},{"key":"e_1_3_2_1_21_1","volume-title":"Introducing Ethereum and Solidity: Foundations of Cryptocurrency and Blockchain Programming for Beginners","author":"Dannen Chris","unstructured":"Chris Dannen . 2017. Introducing Ethereum and Solidity: Foundations of Cryptocurrency and Blockchain Programming for Beginners . Springer . Chris Dannen. 2017. Introducing Ethereum and Solidity: Foundations of Cryptocurrency and Blockchain Programming for Beginners. Springer."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.15"},{"key":"e_1_3_2_1_24_1","volume-title":"Empirical Review of Automated Analysis Tools on 47 ,587 Ethereum Smart Contracts. arXiv preprint arXiv","author":"Durieux Thomas","year":"1910","unstructured":"Thomas Durieux , Jo\u00e3o F Ferreira , Rui Abreu , and Pedro Cruz . 2019. Empirical Review of Automated Analysis Tools on 47 ,587 Ethereum Smart Contracts. arXiv preprint arXiv : 1910 . 10601 ( 2019 ). Thomas Durieux, Jo\u00e3o F Ferreira, Rui Abreu, and Pedro Cruz. 2019. Empirical Review of Automated Analysis Tools on 47 ,587 Ethereum Smart Contracts. arXiv preprint arXiv: 1910. 10601 ( 2019 )."},{"key":"e_1_3_2_1_25_1","unstructured":"Etherscan. [n.d.]. Etherscan. https:\/\/etherscan.io  Etherscan. [n.d.]. Etherscan. https:\/\/etherscan.io"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/WETSEB.2019.00008"},{"key":"e_1_3_2_1_27_1","volume-title":"Precise Attack Synthesis for Smart Contracts. CoRR abs\/","author":"Feng Yu","year":"1902","unstructured":"Yu Feng , Emina Torlak , and Rastislav Bod\u00edk . 2019. Precise Attack Synthesis for Smart Contracts. CoRR abs\/ 1902 .06067 ( 2019 ). arXiv: 1902.06067 http:\/\/arxiv.org\/ abs\/ 1902.06067 Yu Feng, Emina Torlak, and Rastislav Bod\u00edk. 2019. Precise Attack Synthesis for Smart Contracts. CoRR abs\/ 1902.06067 ( 2019 ). arXiv: 1902.06067 http:\/\/arxiv.org\/ abs\/ 1902.06067"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-89722-6_10"},{"key":"e_1_3_2_1_29_1","volume-title":"Kevm: A complete semantics of the ethereum virtual machine. Technical Report.","author":"Hildenbrandt Everett","year":"2017","unstructured":"Everett Hildenbrandt , Manasvi Saxena , Xiaoran Zhu , Nishant Rodrigues , Philip Daian , Dwight Guth , and Grigore Rosu . 2017 . Kevm: A complete semantics of the ethereum virtual machine. Technical Report. Everett Hildenbrandt, Manasvi Saxena, Xiaoran Zhu, Nishant Rodrigues, Philip Daian, Dwight Guth, and Grigore Rosu. 2017. Kevm: A complete semantics of the ethereum virtual machine. Technical Report."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70278-0_33"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238177"},{"key":"e_1_3_2_1_32_1","volume-title":"27th {USENIX} Security Symposium ({USENIX} Security 18 ). {USENIX Association}, 1317-1333.","author":"Krupp Johannes","unstructured":"Johannes Krupp and Christian Rossow . 2018. teether: Gnawing at ethereum to automatically exploit smart contracts . In 27th {USENIX} Security Symposium ({USENIX} Security 18 ). {USENIX Association}, 1317-1333. Johannes Krupp and Christian Rossow. 2018. teether: Gnawing at ethereum to automatically exploit smart contracts. In 27th {USENIX} Security Symposium ({USENIX} Security 18 ). {USENIX Association}, 1317-1333."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"e_1_3_2_1_34_1","unstructured":"Florian Mathieu and Ryno Mathee. 2017. Blocktix: decentralized event hosting and ticket distribution network. https:\/\/www.cryptoground.com\/storage\/files\/ 1527588859-blocktix-wp-draft.pdf  Florian Mathieu and Ryno Mathee. 2017. Blocktix: decentralized event hosting and ticket distribution network. https:\/\/www.cryptoground.com\/storage\/files\/ 1527588859-blocktix-wp-draft.pdf"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00133"},{"key":"e_1_3_2_1_36_1","unstructured":"Bernhard Mueller. 2018. Smashing ethereum smart contracts for fun and real profit. HITB SECCONF Amsterdam ( 2018 ).  Bernhard Mueller. 2018. Smashing ethereum smart contracts for fun and real profit. HITB SECCONF Amsterdam ( 2018 )."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/3291291.3291303"},{"key":"e_1_3_2_1_38_1","volume-title":"SIF: A Framework for Solidity Contract Instrumentation and Analysis. In 2019 26th Asia-Pacific Software Engineering Conference (APSEC). IEEE, 466-473","author":"Peng Chao","year":"2019","unstructured":"Chao Peng , Sefa Akca , and Ajitha Rajan . 2019 . SIF: A Framework for Solidity Contract Instrumentation and Analysis. In 2019 26th Asia-Pacific Software Engineering Conference (APSEC). IEEE, 466-473 . Chao Peng, Sefa Akca, and Ajitha Rajan. 2019. SIF: A Framework for Solidity Contract Instrumentation and Analysis. In 2019 26th Asia-Pacific Software Engineering Conference (APSEC). IEEE, 466-473."},{"key":"e_1_3_2_1_39_1","volume-title":"Smart Contract Vulnerabilities: Does Anyone Care? arXiv preprint arXiv","author":"Perez Daniel","year":"1902","unstructured":"Daniel Perez and Benjamin Livshits . 2019. Smart Contract Vulnerabilities: Does Anyone Care? arXiv preprint arXiv : 1902 . 06710 ( 2019 ). Daniel Perez and Benjamin Livshits. 2019. Smart Contract Vulnerabilities: Does Anyone Care? arXiv preprint arXiv: 1902. 06710 ( 2019 )."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991103"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351685"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","unstructured":"Sergei Tikhomirov Ekaterina Voskresenskaya Ivan Ivanitskiy Ramil Takhaviev Evgeny Marchenko and Yaroslav Alexandrov. 2018. SmartCheck: Static Analysis of Ethereum Smart Contracts. ( 2018 ).  Sergei Tikhomirov Ekaterina Voskresenskaya Ivan Ivanitskiy Ramil Takhaviev Evgeny Marchenko and Yaroslav Alexandrov. 2018. SmartCheck: Static Analysis of Ethereum Smart Contracts. ( 2018 ).","DOI":"10.1145\/3194113.3194115"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243780"},{"key":"e_1_3_2_1_44_1","volume-title":"Towards Generating Cost-Efective Test-Suite for Ethereum Smart Contract. In 2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER). IEEE, 549-553","author":"Wang Xingya","year":"2019","unstructured":"Xingya Wang , Haoran Wu , Weisong Sun , and Yuan Zhao . 2019 . Towards Generating Cost-Efective Test-Suite for Ethereum Smart Contract. In 2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER). IEEE, 549-553 . Xingya Wang, Haoran Wu, Weisong Sun, and Yuan Zhao. 2019. Towards Generating Cost-Efective Test-Suite for Ethereum Smart Contract. In 2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER). IEEE, 549-553."},{"key":"e_1_3_2_1_45_1","volume-title":"Mutation testing for ethereum smart contract. arXiv preprint arXiv","author":"Wu Haoran","year":"1908","unstructured":"Haoran Wu , Xingya Wang , Jiehui Xu , Weiqin Zou , Lingming Zhang , and Zhenyu Chen . 2019. Mutation testing for ethereum smart contract. arXiv preprint arXiv : 1908 . 03707 ( 2019 ). Haoran Wu, Xingya Wang, Jiehui Xu, Weiqin Zou, Lingming Zhang, and Zhenyu Chen. 2019. Mutation testing for ethereum smart contract. arXiv preprint arXiv: 1908. 03707 ( 2019 )."}],"event":{"name":"ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Virtual Event USA","acronym":"ISSTA '20","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3395363.3397385","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3395363.3397385","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:45Z","timestamp":1750199925000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3395363.3397385"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,18]]},"references-count":45,"alternative-id":["10.1145\/3395363.3397385","10.1145\/3395363"],"URL":"https:\/\/doi.org\/10.1145\/3395363.3397385","relation":{},"subject":[],"published":{"date-parts":[[2020,7,18]]},"assertion":[{"value":"2020-07-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}