{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T10:28:36Z","timestamp":1753439316010,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,9,14]],"date-time":"2020-09-14T00:00:00Z","timestamp":1600041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,9,14]]},"DOI":"10.1145\/3410886.3410907","type":"proceedings-article","created":{"date-parts":[[2020,9,12]],"date-time":"2020-09-12T19:46:30Z","timestamp":1599939990000},"page":"35-43","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Testing Ethereum Smart Contracts: A Comparison of Symbolic Analysis and Fuzz Testing Tools"],"prefix":"10.1145","author":[{"given":"Alexander","family":"Leid","sequence":"first","affiliation":[{"name":"Stellenbosch University, South Africa"}]},{"given":"Brink","family":"van der Merwe","sequence":"additional","affiliation":[{"name":"Stellenbosch University, South Africa"}]},{"given":"Willem","family":"Visser","sequence":"additional","affiliation":[{"name":"Stellenbosch University, South Africa"}]}],"member":"320","published-online":{"date-parts":[[2020,9,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54455-6_8"},{"key":"e_1_3_2_1_2_1","unstructured":"Vitalik Buterin 2014. A next-generation smart contract and decentralized application platform. Ethereum project white paper(2014).  Vitalik Buterin 2014. A next-generation smart contract and decentralized application platform. Ethereum project white paper(2014)."},{"key":"e_1_3_2_1_3_1","unstructured":"Huashan Chen Marcus Pendleton Laurent Njilla and Shouhuai Xu. 2019. A Survey on Ethereum Systems Security: Vulnerabilities Attacks and Defenses. arXiv preprint arXiv:1908.04507(2019).  Huashan Chen Marcus Pendleton Laurent Njilla and Shouhuai Xu. 2019. A Survey on Ethereum Systems Security: Vulnerabilities Attacks and Defenses. arXiv preprint arXiv:1908.04507(2019)."},{"key":"e_1_3_2_1_4_1","unstructured":"ConsenSys. 2019. ConsenSys\/mythril: Security analysis tool for EVM bytecode. Supports smart contracts built for Ethereum Quorum Vechain Roostock Tron and other EVM-compatible blockchains.https:\/\/github.com\/ConsenSys\/mythril. (Accessed on 10\/31\/2019).  ConsenSys. 2019. ConsenSys\/mythril: Security analysis tool for EVM bytecode. Supports smart contracts built for Ethereum Quorum Vechain Roostock Tron and other EVM-compatible blockchains.https:\/\/github.com\/ConsenSys\/mythril. (Accessed on 10\/31\/2019)."},{"key":"e_1_3_2_1_5_1","unstructured":"ConsenSys. 2019. Overview \u00b7 Smart Contract Weakness Classification and Test Cases. https:\/\/swcregistry.io. (Accessed on 10\/25\/2019).  ConsenSys. 2019. Overview \u00b7 Smart Contract Weakness Classification and Test Cases. https:\/\/swcregistry.io. (Accessed on 10\/25\/2019)."},{"key":"e_1_3_2_1_6_1","unstructured":"Echidna 2019. crytic\/echidna: Ethereum fuzz testing framework. https:\/\/github.com\/crytic\/echidna. (Accessed on 10\/28\/2019).  Echidna 2019. crytic\/echidna: Ethereum fuzz testing framework. https:\/\/github.com\/crytic\/echidna. (Accessed on 10\/28\/2019)."},{"key":"e_1_3_2_1_7_1","unstructured":"Enigmatic. 2018. Smart Contract Exploits Part 1 \u2014 Featuring Capture the Ether (Lotteries). https:\/\/medium.com\/coinmonks\/smart-contract-exploits-part-1-featuring-capture-the-ether-lotteries-8a061ad491b. (Accessed on 09\/26\/2019).  Enigmatic. 2018. Smart Contract Exploits Part 1 \u2014 Featuring Capture the Ether (Lotteries). https:\/\/medium.com\/coinmonks\/smart-contract-exploits-part-1-featuring-capture-the-ether-lotteries-8a061ad491b. (Accessed on 09\/26\/2019)."},{"key":"e_1_3_2_1_8_1","unstructured":"Etherscan. 2019. Ethereum (ETH) Blockchain Explorer. https:\/\/etherscan.io. (Accessed on 09\/23\/2019).  Etherscan. 2019. Ethereum (ETH) Blockchain Explorer. https:\/\/etherscan.io. (Accessed on 09\/23\/2019)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/WETSEB.2019.00008"},{"key":"e_1_3_2_1_10_1","unstructured":"Yu Feng Emina Torlak and Rastislav Bodik. 2019. Precise Attack Synthesis for Smart Contracts. arXiv preprint arXiv:1902.06067(2019).  Yu Feng Emina Torlak and Rastislav Bodik. 2019. Precise Attack Synthesis for Smart Contracts. arXiv preprint arXiv:1902.06067(2019)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3341175"},{"key":"e_1_3_2_1_12_1","unstructured":"Osman G\u00fc\u00e7l\u00fct\u00fcrk. 2018. The DAO Hack Explained: Unfortunate Take-off of Smart Contracts. https:\/\/medium.com\/@ogucluturk\/the-dao-hack-explained-unfortunate-take-off-of-smart-contracts-2bd8c8db3562. (Accessed on 12\/15\/2019).  Osman G\u00fc\u00e7l\u00fct\u00fcrk. 2018. The DAO Hack Explained: Unfortunate Take-off of Smart Contracts. https:\/\/medium.com\/@ogucluturk\/the-dao-hack-explained-unfortunate-take-off-of-smart-contracts-2bd8c8db3562. (Accessed on 12\/15\/2019)."},{"key":"e_1_3_2_1_13_1","unstructured":"Dominik Harz and William Knottenbelt. 2018. Towards safer smart contracts: A survey of languages and verification methods. arXiv preprint arXiv:1809.09805(2018).  Dominik Harz and William Knottenbelt. 2018. Towards safer smart contracts: A survey of languages and verification methods. arXiv preprint arXiv:1809.09805(2018)."},{"key":"e_1_3_2_1_14_1","unstructured":"hevm 2019. hevm: Ethereum virtual machine evaluator. http:\/\/hackage.haskell.org\/package\/hevm. (Accessed on 11\/14\/2019).  hevm 2019. hevm: Ethereum virtual machine evaluator. http:\/\/hackage.haskell.org\/package\/hevm. (Accessed on 11\/14\/2019)."},{"key":"e_1_3_2_1_15_1","unstructured":"Alexander Leid. 2020. Testing Smart Contracts. Master\u2019s thesis. Stellenbosch University.  Alexander Leid. 2020. Testing Smart Contracts. Master\u2019s thesis. Stellenbosch University."},{"volume-title":"Manticore: A User-Friendly Symbolic Execution Framework for Binaries and Smart Contracts. arXiv preprint arXiv:1907.03890(2019).","year":"2019","author":"Mossberg Mark","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274743"},{"key":"e_1_3_2_1_18_1","unstructured":"Trail of Bits. 2019. crytic\/not-so-smart-contracts: Examples of Solidity security issues. https:\/\/github.com\/crytic\/not-so-smart-contracts. (Accessed on 12\/11\/2019).  Trail of Bits. 2019. crytic\/not-so-smart-contracts: Examples of Solidity security issues. https:\/\/github.com\/crytic\/not-so-smart-contracts. (Accessed on 12\/11\/2019)."},{"key":"e_1_3_2_1_19_1","unstructured":"Trail of Bits. 2019. trailofbits\/manticore: Symbolic execution tool. https:\/\/github.com\/trailofbits\/manticore. (Accessed on 11\/14\/2019).  Trail of Bits. 2019. trailofbits\/manticore: Symbolic execution tool. https:\/\/github.com\/trailofbits\/manticore. (Accessed on 11\/14\/2019)."},{"key":"e_1_3_2_1_20_1","unstructured":"OpenZeppelin. 2019. Ethernaut. https:\/\/ethernaut.openzeppelin.com. (Accessed on 09\/23\/2019).  OpenZeppelin. 2019. Ethernaut. https:\/\/ethernaut.openzeppelin.com. (Accessed on 09\/23\/2019)."},{"key":"e_1_3_2_1_21_1","unstructured":"OpenZeppelin. 2019. OpenZeppelin\/ethernaut: Web3\/Solidity based wargame. https:\/\/github.com\/OpenZeppelin\/ethernaut. (Accessed on 09\/23\/2019).  OpenZeppelin. 2019. OpenZeppelin\/ethernaut: Web3\/Solidity based wargame. https:\/\/github.com\/OpenZeppelin\/ethernaut. (Accessed on 09\/23\/2019)."},{"key":"e_1_3_2_1_22_1","unstructured":"OpenZeppelin. 2020. Proxy Patterns \u2013 OpenZeppelin blog. https:\/\/blog.openzeppelin.com\/proxy-patterns\/. (Accessed on 05\/10\/2020).  OpenZeppelin. 2020. Proxy Patterns \u2013 OpenZeppelin blog. https:\/\/blog.openzeppelin.com\/proxy-patterns\/. (Accessed on 05\/10\/2020)."},{"key":"e_1_3_2_1_23_1","unstructured":"SMARX. 2019. Capture the Ether - the game of Ethereum smart contract security. https:\/\/capturetheether.com. (Accessed on 09\/23\/2019).  SMARX. 2019. Capture the Ether - the game of Ethereum smart contract security. https:\/\/capturetheether.com. (Accessed on 09\/23\/2019)."},{"key":"e_1_3_2_1_24_1","unstructured":"Vyper Team. 2019. Vyper \u2014 Vyper documentation. https:\/\/vyper.readthedocs.io\/en\/v0.1.0-beta.13\/. (Accessed on 10\/24\/2019).  Vyper Team. 2019. Vyper \u2014 Vyper documentation. https:\/\/vyper.readthedocs.io\/en\/v0.1.0-beta.13\/. (Accessed on 10\/24\/2019)."}],"event":{"name":"SAICSIT '20: Conference of the South African Institute of Computer Scientists and Information Technologists 2020","acronym":"SAICSIT '20","location":"Cape Town South Africa"},"container-title":["Conference of the South African Institute of Computer Scientists and Information Technologists 2020"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3410886.3410907","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3410886.3410907","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:56Z","timestamp":1750195916000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3410886.3410907"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,14]]},"references-count":24,"alternative-id":["10.1145\/3410886.3410907","10.1145\/3410886"],"URL":"https:\/\/doi.org\/10.1145\/3410886.3410907","relation":{},"subject":[],"published":{"date-parts":[[2020,9,14]]},"assertion":[{"value":"2020-09-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}