{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T14:29:35Z","timestamp":1773844175097,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T00:00:00Z","timestamp":1688947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,10]]},"DOI":"10.1145\/3594556.3594615","type":"proceedings-article","created":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T21:34:46Z","timestamp":1694554486000},"page":"105-113","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["An Analysis of Important Factors Affecting the Success of Blockchain Smart Contract Security Vulnerability Scanning Tools"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-3949-1296","authenticated-orcid":false,"given":"Cynthia Yi Min","family":"Chee","sequence":"first","affiliation":[{"name":"School of Information Technology, Deakin University, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8784-0154","authenticated-orcid":false,"given":"Shantanu","family":"Pal","sequence":"additional","affiliation":[{"name":"School of Information Technology, Deakin University, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4691-8330","authenticated-orcid":false,"given":"Lei","family":"Pan","sequence":"additional","affiliation":[{"name":"School of Information Technology, Deakin University, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6143-6850","authenticated-orcid":false,"given":"Robin","family":"Doss","sequence":"additional","affiliation":[{"name":"School of Information Technology, Deakin University, Australia"}]}],"member":"320","published-online":{"date-parts":[[2023,9,12]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"John Biggs. 2018. This smart contract scanner will ensure your token is tip-top. https:\/\/techcrunch.com\/2018.  John Biggs. 2018. This smart contract scanner will ensure your token is tip-top. https:\/\/techcrunch.com\/2018."},{"key":"e_1_3_2_1_2_1","volume-title":"Vandal: A scalable security analysis framework for smart contracts. arXiv preprint arXiv:1809.03981","author":"Brent Lexi","year":"2018","unstructured":"Lexi Brent , Anton Jurisevic , Michael Kong , Eric Liu , Francois Gauthier , Vincent Gramoli , Ralph Holz , and Bernhard Scholz . 2018 . Vandal: A scalable security analysis framework for smart contracts. arXiv preprint arXiv:1809.03981 (2018). Lexi Brent, Anton Jurisevic, Michael Kong, Eric Liu, Francois Gauthier, Vincent Gramoli, Ralph Holz, and Bernhard Scholz. 2018. Vandal: A scalable security analysis framework for smart contracts. arXiv preprint arXiv:1809.03981 (2018)."},{"key":"e_1_3_2_1_3_1","unstructured":"Shobha Chengalur-Smith and Anna Sidorova. 2003. Survival of open-source projects: A population ecology perspective. (2003).  Shobha Chengalur-Smith and Anna Sidorova. 2003. Survival of open-source projects: A population ecology perspective. (2003)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106246"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3239235.3240501"},{"key":"e_1_3_2_1_6_1","unstructured":"ConsenSys. [n. d.]. Mythril. https:\/\/github.com\/ConsenSys\/mythril.  ConsenSys. [n. d.]. Mythril. https:\/\/github.com\/ConsenSys\/mythril."},{"key":"e_1_3_2_1_7_1","volume-title":"Parity Hack: How It Happened, And Its Aftermath. https:\/\/medium.com\/solidified\/parity-hack-how-it-happened-and-its-aftermath-9bffb2105c0.","author":"Durr Christopher","year":"2017","unstructured":"Christopher Durr . 2017 . Parity Hack: How It Happened, And Its Aftermath. https:\/\/medium.com\/solidified\/parity-hack-how-it-happened-and-its-aftermath-9bffb2105c0. Christopher Durr. 2017. Parity Hack: How It Happened, And Its Aftermath. https:\/\/medium.com\/solidified\/parity-hack-how-it-happened-and-its-aftermath-9bffb2105c0."},{"key":"e_1_3_2_1_8_1","unstructured":"Brent et al.2023. Home. https:\/\/github.com\/usyd-blockchain\/vandal\/wiki.  Brent et al.2023. Home. https:\/\/github.com\/usyd-blockchain\/vandal\/wiki."},{"key":"e_1_3_2_1_9_1","unstructured":"Brent et al.2023. Vandal. https:\/\/github.com\/usyd-blockchain\/vandal.  Brent et al.2023. Vandal. https:\/\/github.com\/usyd-blockchain\/vandal."},{"key":"e_1_3_2_1_10_1","unstructured":"Brent et al.2023. Vandal. https:\/\/vandal-framework.github.io.  Brent et al.2023. Vandal. https:\/\/vandal-framework.github.io."},{"key":"e_1_3_2_1_11_1","unstructured":"Luu et al.2023. Oyente. https:\/\/github.com\/enzymefinance\/oyente.  Luu et al.2023. Oyente. https:\/\/github.com\/enzymefinance\/oyente."},{"key":"e_1_3_2_1_12_1","unstructured":"Tsankov et al.2023. [DEPRECATED] Securify. https:\/\/github.com\/eth-sri\/securify.  Tsankov et al.2023. [DEPRECATED] Securify. https:\/\/github.com\/eth-sri\/securify."},{"key":"e_1_3_2_1_13_1","unstructured":"Tsankov et al.2023. eth-sri\/securify2. https:\/\/github.com\/eth-sri\/securify2.  Tsankov et al.2023. eth-sri\/securify2. https:\/\/github.com\/eth-sri\/securify2."},{"key":"e_1_3_2_1_14_1","unstructured":"Samuel Falkon. 2017. The Story of the DAO \u2014 Its History and Consequences. https:\/\/medium.com\/swlh\/the-story-of-the-dao-its-history-and-consequences-71e6a8a551ee.  Samuel Falkon. 2017. The Story of the DAO \u2014 Its History and Consequences. https:\/\/medium.com\/swlh\/the-story-of-the-dao-its-history-and-consequences-71e6a8a551ee."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/WETSEB.2019.00008"},{"key":"e_1_3_2_1_16_1","unstructured":"Neville Grech. [n. d.]. MadMax. https:\/\/github.com\/nevillegrech\/MadMax.  Neville Grech. [n. d.]. MadMax. https:\/\/github.com\/nevillegrech\/MadMax."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3404366"},{"key":"e_1_3_2_1_18_1","unstructured":"hackernoon.com. [n. d.]. Introducing Mythril: A framework for bug hunting on the Ethereum blockchain. https:\/\/hackernoon.com.  hackernoon.com. [n. d.]. Introducing Mythril: A framework for bug hunting on the Ethereum blockchain. https:\/\/hackernoon.com."},{"key":"e_1_3_2_1_19_1","unstructured":"Ivan Ivanitskiy. 2019. SmartDec Scanner #1: Security Meets Usability. https:\/\/blog.smartdec.net.  Ivan Ivanitskiy. 2019. SmartDec Scanner #1: Security Meets Usability. https:\/\/blog.smartdec.net."},{"key":"e_1_3_2_1_20_1","unstructured":"Nisha Jain. 2022. Everything You Need to Know About Quantstamp. https:\/\/techstory.in\/everything-you-need-to-know-about-quantstamp\/.  Nisha Jain. 2022. Everything You Need to Know About Quantstamp. https:\/\/techstory.in\/everything-you-need-to-know-about-quantstamp\/."},{"key":"e_1_3_2_1_21_1","unstructured":"Bo Jiang. [n. d.]. ContractFuzzer. https:\/\/github.com\/gongbell\/ContractFuzzer.  Bo Jiang. [n. d.]. ContractFuzzer. https:\/\/github.com\/gongbell\/ContractFuzzer."},{"key":"e_1_3_2_1_22_1","unstructured":"Yelizaveta Kharlamova. 2020. SmartDec Scanner 3.5.0 Release Notes. https:\/\/blog.smartdec.net\/smartdec-scanner-3-5-0-release-notes-631ae6d43d59.  Yelizaveta Kharlamova. 2020. SmartDec Scanner 3.5.0 Release Notes. https:\/\/blog.smartdec.net\/smartdec-scanner-3-5-0-release-notes-631ae6d43d59."},{"key":"e_1_3_2_1_23_1","volume-title":"Ethereum smart contract analysis tools: A systematic review","author":"Kushwaha Satpal\u00a0Singh","year":"2022","unstructured":"Satpal\u00a0Singh Kushwaha , Sandeep Joshi , Dilbag Singh , Manjit Kaur , and Heung-No Lee . 2022. Ethereum smart contract analysis tools: A systematic review . IEEE Access ( 2022 ). Satpal\u00a0Singh Kushwaha, Sandeep Joshi, Dilbag Singh, Manjit Kaur, and Heung-No Lee. 2022. Ethereum smart contract analysis tools: A systematic review. IEEE Access (2022)."},{"key":"e_1_3_2_1_24_1","unstructured":"Loi Luu. 2016. Oyente. https:\/\/oyente.tech\/.  Loi Luu. 2016. Oyente. https:\/\/oyente.tech\/."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"e_1_3_2_1_26_1","volume-title":"Press Release: Melonport Announces Official Beta Release of Oyente Smart Contracts Analysis. https:\/\/medium.com\/enzymefinance.","year":"2017","unstructured":"Melonport. 2017 . Press Release: Melonport Announces Official Beta Release of Oyente Smart Contracts Analysis. https:\/\/medium.com\/enzymefinance. Melonport. 2017. Press Release: Melonport Announces Official Beta Release of Oyente Smart Contracts Analysis. https:\/\/medium.com\/enzymefinance."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00133"},{"key":"e_1_3_2_1_28_1","volume-title":"Introducing Mythril: A framework for bug hunting on the Ethereum blockchain. https:\/\/medium.com\/hackernoon.","author":"Mueller Bernhard","year":"2019","unstructured":"Bernhard Mueller . 2019 . Introducing Mythril: A framework for bug hunting on the Ethereum blockchain. https:\/\/medium.com\/hackernoon. Bernhard Mueller. 2019. Introducing Mythril: A framework for bug hunting on the Ethereum blockchain. https:\/\/medium.com\/hackernoon."},{"key":"e_1_3_2_1_29_1","unstructured":"Bernhard Mueller. 2019. MythX Tech: Behind the Scenes of Smart Contract Security Analysis. https:\/\/blog.mythx.io.  Bernhard Mueller. 2019. MythX Tech: Behind the Scenes of Smart Contract Security Analysis. https:\/\/blog.mythx.io."},{"key":"e_1_3_2_1_30_1","unstructured":"Bernhard Mueller. 2021. MythX is upping the smart contract security game. https:\/\/media.consensys.net.  Bernhard Mueller. 2021. MythX is upping the smart contract security game. https:\/\/media.consensys.net."},{"key":"e_1_3_2_1_31_1","unstructured":"newsbtc. 2017. Melonport\u2019s Release Oyente Contracts Verification Tool in Market. https:\/\/www.newsbtc.com.  newsbtc. 2017. Melonport\u2019s Release Oyente Contracts Verification Tool in Market. https:\/\/www.newsbtc.com."},{"key":"e_1_3_2_1_32_1","unstructured":"Ivica Nikolic. [n. d.]. GitHub - ivicanikolicsg\/MAIAN: MAIAN: automatic tool for finding trace vulnerabilities in Ethereum smart contracts. https:\/\/github.com\/ivicanikolicsg\/MAIAN.  Ivica Nikolic. [n. d.]. GitHub - ivicanikolicsg\/MAIAN: MAIAN: automatic tool for finding trace vulnerabilities in Ethereum smart contracts. https:\/\/github.com\/ivicanikolicsg\/MAIAN."},{"key":"e_1_3_2_1_33_1","unstructured":"Trail of Bits. [n. d.]. Echidna: A Fast Smart Contract Fuzzer. https:\/\/github.com\/crytic\/echidna.  Trail of Bits. [n. d.]. Echidna: A Fast Smart Contract Fuzzer. https:\/\/github.com\/crytic\/echidna."},{"key":"e_1_3_2_1_34_1","unstructured":"Trail of Bits. 2020.. https:\/\/github.com\/trailofbits\/manticore.  Trail of Bits. 2020.. https:\/\/github.com\/trailofbits\/manticore."},{"key":"e_1_3_2_1_35_1","unstructured":"Trail of Bits. 2021. crytic\/slither. https:\/\/github.com\/crytic\/slither.  Trail of Bits. 2021. crytic\/slither. https:\/\/github.com\/crytic\/slither."},{"key":"e_1_3_2_1_36_1","unstructured":"Santiago Palladino. 2017. The Parity Wallet Hack Explained. https:\/\/blog.openzeppelin.com\/on-the-parity-wallet-multisig-hack-405a8c12e8f7\/.  Santiago Palladino. 2017. The Parity Wallet Hack Explained. https:\/\/blog.openzeppelin.com\/on-the-parity-wallet-multisig-hack-405a8c12e8f7\/."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.39"},{"key":"e_1_3_2_1_38_1","unstructured":"David Siegel. 2016. Understanding The DAO Attack. https:\/\/www.coindesk.com\/learn\/understanding-the-dao-attack\/.  David Siegel. 2016. Understanding The DAO Attack. https:\/\/www.coindesk.com\/learn\/understanding-the-dao-attack\/."},{"key":"e_1_3_2_1_39_1","unstructured":"SmartDec. [n. d.]. SmartCheck. https:\/\/github.com\/smartdec\/smartcheck.  SmartDec. [n. d.]. SmartCheck. https:\/\/github.com\/smartdec\/smartcheck."},{"key":"e_1_3_2_1_40_1","volume-title":"Formalizing and Securing Relationships on Public Networks. First Monday 2 (09","author":"Szabo Nick","year":"1997","unstructured":"Nick Szabo . 1997. Formalizing and Securing Relationships on Public Networks. First Monday 2 (09 1997 ). https:\/\/doi.org\/10.5210\/fm.v2i9.548 10.5210\/fm.v2i9.548 Nick Szabo. 1997. Formalizing and Securing Relationships on Public Networks. First Monday 2 (09 1997). https:\/\/doi.org\/10.5210\/fm.v2i9.548"},{"key":"e_1_3_2_1_41_1","unstructured":"Sergei Tikhomirov. [n. d.]. About. https:\/\/s-tikhomirov.github.io\/about\/.  Sergei Tikhomirov. [n. d.]. About. https:\/\/s-tikhomirov.github.io\/about\/."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3194113.3194115"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"Petar Tsankov. 2018. Full version of Securify a state-of-the-art security scanner for Ethereum available now. https:\/\/medium.com\/chainsecurity.  Petar Tsankov. 2018. Full version of Securify a state-of-the-art security scanner for Ethereum available now. https:\/\/medium.com\/chainsecurity.","DOI":"10.1145\/3243734.3243780"},{"key":"e_1_3_2_1_44_1","unstructured":"Petar Tsankov. 2020. Release of Securify v2.0. https:\/\/medium.com\/chainsecurity\/release-of-securify-v2-0-6304a40034f.  Petar Tsankov. 2020. Release of Securify v2.0. https:\/\/medium.com\/chainsecurity\/release-of-securify-v2-0-6304a40034f."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243780"}],"event":{"name":"ASIA CCS '23: ACM Asia Conference on Computer and Communications Security","location":"Melbourne VIC Australia","acronym":"ASIA CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3594556.3594615","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3594556.3594615","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:07Z","timestamp":1750183747000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3594556.3594615"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,10]]},"references-count":45,"alternative-id":["10.1145\/3594556.3594615","10.1145\/3594556"],"URL":"https:\/\/doi.org\/10.1145\/3594556.3594615","relation":{},"subject":[],"published":{"date-parts":[[2023,7,10]]},"assertion":[{"value":"2023-09-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}