{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T02:03:35Z","timestamp":1776305015991,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T00:00:00Z","timestamp":1743379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"PNRR NextGeneration","award":["SERICS (PE00000014 - CUP H73C22000- 89001)"],"award-info":[{"award-number":["SERICS (PE00000014 - CUP H73C22000- 89001)"]}]},{"name":"PNRR NextGeneration EU","award":["iNEST (ECS00000043 ? CUP H43C22000540006)"],"award-info":[{"award-number":["iNEST (ECS00000043 ? CUP H43C22000540006)"]}]},{"name":"University of Parma - Bando di Ateneo per la Ricerca 2022"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3,31]]},"DOI":"10.1145\/3672608.3707721","type":"proceedings-article","created":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T18:26:54Z","timestamp":1747247214000},"page":"329-337","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Detection of Read-Write Issues in Hyperledger Fabric Smart Contracts"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8074-8980","authenticated-orcid":false,"given":"Luca","family":"Olivieri","sequence":"first","affiliation":[{"name":"Ca' Foscari University of Venice, Venice, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9930-8854","authenticated-orcid":false,"given":"Luca","family":"Negrini","sequence":"additional","affiliation":[{"name":"Ca' Foscari University of Venice, Venice, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5150-0393","authenticated-orcid":false,"given":"Vincenzo","family":"Arceri","sequence":"additional","affiliation":[{"name":"University of Parma, Parma, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4678-933X","authenticated-orcid":false,"given":"Pietro","family":"Ferrara","sequence":"additional","affiliation":[{"name":"Ca' Foscari University of Venice, Venice, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0946-5440","authenticated-orcid":false,"given":"Agostino","family":"Cortesi","sequence":"additional","affiliation":[{"name":"Ca' Foscari University of Venice, Venice, Italy"}]}],"member":"320","published-online":{"date-parts":[[2025,5,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3009837.3009883"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341105.3373964"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.3390\/app10103525"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2018.00009"},{"key":"e_1_3_2_1_6_1","volume-title":"Static Analysis of String Values","author":"Costantini Giulia","unstructured":"Giulia Costantini, Pietro Ferrara, and Agostino Cortesi. 2011. Static Analysis of String Values. In Formal Methods and Software Engineering, Shengchao Qin and Zongyan Qiu (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 505\u2013521."},{"key":"e_1_3_2_1_7_1","volume-title":"Principles of Abstract Interpretation","author":"Cousot Patrick","unstructured":"Patrick Cousot. 2021. Principles of Abstract Interpretation. MIT Press."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79124-9_9"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2126"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460946.3464316"},{"key":"e_1_3_2_1_11_1","volume-title":"Transaction Processing: Concepts and Techniques. Morgan Kaufmann.","author":"Gray Jim","year":"1993","unstructured":"Jim Gray and Andreas Reuter. 1993. Transaction Processing: Concepts and Techniques. Morgan Kaufmann."},{"key":"e_1_3_2_1_12_1","unstructured":"Hyperledger. 2024. A Blockchain Ledger. https:\/\/hyperledger-fabric.readthedocs.io\/en\/release-2.5\/ledger\/ledger.html#a-blockchain-ledger (Accessed 12\/2023)."},{"key":"e_1_3_2_1_13_1","unstructured":"Hyperledger. 2024. Chaincode Terminology. https:\/\/hyperledger-fabric.readthedocs.io\/en\/release-2.5\/peers\/peers.html?highlight=validation#chaincode-terminology (Accessed 01\/2024)."},{"key":"e_1_3_2_1_14_1","unstructured":"Hyperledger. 2024. Private Data - A use case to explain collections. BLOGCACM https:\/\/hyperledger-fabric.readthedocs.io\/en\/lrelease-2.2\/private-data\/private-data.html#a-use-case-to-explain-collection Accessed: 09\/2024."},{"key":"e_1_3_2_1_15_1","unstructured":"Hyperledger. 2024. Read-Write set semantics. https:\/\/hyperledger-fabric.readthedocs.io\/en\/release-2.2\/readwrite.html#read-write-set-semantics. Accessed 09\/2024."},{"key":"e_1_3_2_1_16_1","first-page":"7820","article-title":"A Study on Chaincode Security Weakness Detector in Hyperledger Fabric Blockchain Framework for IT Development","volume":"10","author":"Kim Sangsoo","year":"2020","unstructured":"Sangsoo Kim, Yunsik Son, and Yangsun Lee. 2020. A Study on Chaincode Security Weakness Detector in Hyperledger Fabric Blockchain Framework for IT Development. Journal of Green Engineering 10 (2020), 7820\u20137844.","journal-title":"Journal of Green Engineering"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"key":"e_1_3_2_1_18_1","unstructured":"kzhry. 2021. Chaincode Analyzer. https:\/\/github.com\/hyperledger-labs\/chaincode-analyzer. Accessed 07\/2023."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3530019.3531342"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC53001.2021.9631249"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19718-5_21"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134018"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.2647"},{"key":"e_1_3_2_1_24_1","volume-title":"Twinning Automata and Regular Expressions for String Static Analysis","author":"Negrini Luca","unstructured":"Luca Negrini, Vincenzo Arceri, Pietro Ferrara, and Agostino Cortesi. 2021. Twinning Automata and Regular Expressions for String Static Analysis. In Verification, Model Checking, and Abstract Interpretation, Fritz Henglein, Sharon Shoham, and Yakir Vizel (Eds.). Springer International Publishing, Cham, 267\u2013290."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-71379-8_3"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-9601-6_2"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/130616.130623"},{"key":"e_1_3_2_1_28_1","volume-title":"International Colloquium on Theoretical Aspects of Computing","author":"Nikoli\u0107 Jurica","unstructured":"DJurica Nikoli\u0107 and Fausto Spoto. 2012. Definite expression aliasing analysis for Java bytecode. In International Colloquium on Theoretical Aspects of Computing. Springer, 74\u201389."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/781498.781528"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3495535"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3410019"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.4230\/LIPIcs.ECOOP.2023.23"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-024-00758-x"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3520313.3534658"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-28124-2_36"},{"key":"e_1_3_2_1_36_1","unstructured":"Mark Richards. 2015. Software architecture patterns."},{"key":"e_1_3_2_1_37_1","volume-title":"Introduction to static analysis: an abstract interpretation perspective","author":"Rival Xavier","unstructured":"Xavier Rival and Kwangkeun Yi. 2020. Introduction to static analysis: an abstract interpretation perspective. Mit Press."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/I2CT57861.2023.10126362"},{"key":"e_1_3_2_1_39_1","unstructured":"sivachokkapu. 2021. ReviveCC. https:\/\/github.com\/sivachokkapu\/revive-cc. Accessed 07\/2023."},{"key":"e_1_3_2_1_40_1","unstructured":"Andrew S Tanenbaum. 2007. Distributed systems principles and paradigms."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWBOSE.2019.8666486"}],"event":{"name":"SAC '25: 40th ACM\/SIGAPP Symposium on Applied Computing","location":"Catania International Airport Catania Italy","acronym":"SAC '25","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"]},"container-title":["Proceedings of the 40th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672608.3707721","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3672608.3707721","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:06:14Z","timestamp":1750291574000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672608.3707721"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,31]]},"references-count":41,"alternative-id":["10.1145\/3672608.3707721","10.1145\/3672608"],"URL":"https:\/\/doi.org\/10.1145\/3672608.3707721","relation":{},"subject":[],"published":{"date-parts":[[2025,3,31]]},"assertion":[{"value":"2025-05-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}