{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T08:41:26Z","timestamp":1770280886625,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","funder":[{"name":"Finanziato dall\u2019Unione Europea - Next Generation EU, Missione 4 Componente 1 CUP D53D23008400006","award":["D53D23008400006"],"award-info":[{"award-number":["D53D23008400006"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,17]]},"DOI":"10.1145\/3756681.3756943","type":"proceedings-article","created":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T08:30:04Z","timestamp":1766565004000},"page":"91-101","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Automated Vulnerability Injection in Solidity Smart Contracts: A Mutation-Based Approach for Benchmark Development"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-1128-0863","authenticated-orcid":false,"given":"Gerardo","family":"Iuliano","sequence":"first","affiliation":[{"name":"Software Engineering Lab (SeSa Lab), University of Salerno, Fisciano, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-3406-4490","authenticated-orcid":false,"given":"Luigi","family":"Allocca","sequence":"additional","affiliation":[{"name":"Software Engineering Lab (SeSa Lab), University of Salerno, Fisciano, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-5812-1209","authenticated-orcid":false,"given":"Matteo","family":"Cicalese","sequence":"additional","affiliation":[{"name":"Software Engineering Lab (SeSa Lab), University of Salerno, Fisciano, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3861-1902","authenticated-orcid":false,"given":"Dario","family":"Di Nucci","sequence":"additional","affiliation":[{"name":"Software Engineering Lab (SeSa Lab), University of Salerno, Fisciano, Italy"}]}],"member":"320","published-online":{"date-parts":[[2025,12,24]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54455-6_8"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/AST52587.2021.00014"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","unstructured":"Morena Barboni Andrea Morichetta and Andrea Polini. 2022. SuMo: A mutation testing approach and tool for the Ethereum blockchain. Journal of Systems and Software 193 (2022) 111445. 10.1016\/j.jss.2022.111445","DOI":"10.1016\/j.jss.2022.111445"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"crossref","unstructured":"Morena Barboni Andrea Morichetta Andrea Polini and Francesco Casoni. 2024. ReSuMo: a regression strategy and tool for mutation testing of solidity smart contracts. Software Quality Journal 32 1 (2024) 225\u2013253.","DOI":"10.1007\/s11219-023-09637-1"},{"key":"e_1_3_3_2_6_2","volume-title":"Test driven development: By example","author":"Beck Kent","year":"2022","unstructured":"Kent Beck. 2022. Test driven development: By example. Addison-Wesley Professional."},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"crossref","unstructured":"Sofia Bobadilla Monica Jin and Martin Monperrus. 2025. Do Automated Fixes Truly Mitigate Smart Contract Exploits? arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2501.04600 (2025).","DOI":"10.1109\/TSE.2025.3618123"},{"key":"e_1_3_3_2_8_2","unstructured":"Vitalik Buterin et\u00a0al. 2014. Ethereum white paper: a next generation smart contract & decentralized application platform. First version 53 (2014)."},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain.2019.00050"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486401"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"crossref","unstructured":"Hanting Chu Pengcheng Zhang Hai Dong Yan Xiao and Shunhui Ji. 2024. SGDL: Smart contract vulnerability generation via deep learning. Journal of Software: Evolution and Process 36 12 (2024) e2712.","DOI":"10.1002\/smr.2712"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","unstructured":"Etienne Daspe Mathis Durand Julien Hatin and Salma Bradai. 2024. Benchmarking Large Language Models for Ethereum Smart Contract Development. 1\u20134. 10.1109\/BRAINS63024.2024.10732686","DOI":"10.1109\/BRAINS63024.2024.10732686"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASE56229.2023.00060"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/DAPPCON.2019.00018"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00182"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380364"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/WETSEB.2019.00008"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397385"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"publisher","unstructured":"\u00c1kos Hajdu Naghmeh Ivaki Imre Kocsis Attila Klenik L\u00e1szl\u00f3 G\u00f6nczy Nuno Laranjeiro Henrique Madeira and Andr\u00e1s Pataricza. 2020. Using Fault Injection to Assess Blockchain Systems in Presence of Faulty Smart Contracts. IEEE Access 8 (2020) 190760\u2013190783. 10.1109\/ACCESS.2020.3032239","DOI":"10.1109\/ACCESS.2020.3032239"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"crossref","unstructured":"Gerardo Iuliano and Dario\u00a0Di Nucci. 2024. Smart Contract Vulnerabilities Tools and Benchmarks: An Updated Systematic Literature Review. arxiv:https:\/\/arXiv.org\/abs\/2412.01719\u00a0[cs.SE] https:\/\/arxiv.org\/abs\/2412.01719","DOI":"10.2139\/ssrn.5369483"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","unstructured":"Y. Ivanova and A. Khritankov. 2020. RegularMutator: A Mutation Testing Tool for Solidity Smart Contracts. Procedia Computer Science 178 (2020) 75\u201383. 10.1016\/j.procs.2020.11.0099th International Young Scientists Conference in Computational Science YSC2020 05-12 September 2020.","DOI":"10.1016\/j.procs.2020.11.009"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","unstructured":"Yue Jia and Mark Harman. 2011. An Analysis and Survey of the Development of Mutation Testing. IEEE Trans. Softw. Eng. 37 5 (Sept. 2011) 649\u2013678. 10.1109\/TSE.2010.62","DOI":"10.1109\/TSE.2010.62"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238177"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"publisher","unstructured":"Satpal\u00a0Singh Kushwaha Sandeep Joshi Dilbag Singh Manjit Kaur and Heung-No Lee. 2022. Systematic Review of Security Vulnerabilities in Ethereum Blockchain Smart Contract. IEEE Access 10 (2022) 6605\u20136621. 10.1109\/ACCESS.2021.3140091","DOI":"10.1109\/ACCESS.2021.3140091"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"crossref","unstructured":"Satpal\u00a0Singh Kushwaha Sandeep Joshi Dilbag Singh Manjit Kaur and Heung-No Lee. 2022. Systematic review of security vulnerabilities in ethereum blockchain smart contract. IEEE Access 10 (2022) 6605\u20136621.","DOI":"10.1109\/ACCESS.2021.3140091"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3183440.3183495"},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"crossref","unstructured":"Muhammad\u00a0Izhar Mehar Charles\u00a0Louis Shier Alana Giambattista Elgar Gong Gabrielle Fletcher Ryan Sanayhie Henry\u00a0M Kim and Marek Laskowski. 2019. Understanding a revolutionary and flawed grand experiment in blockchain: the DAO attack. Journal of Cases on Information Technology (JCIT) 21 1 (2019) 19\u201332.","DOI":"10.4018\/JCIT.2019010102"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3282373.3282419"},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"publisher","unstructured":"Mike Papadakis Marinos Kintis Jie Zhang Yue Jia Yves\u00a0Le Traon and Mark Harman. 2019. Chapter Six - Mutation Testing Advances: An Analysis and Survey. Advances in Computers Vol.\u00a0112. Elsevier 275\u2013378. 10.1016\/bs.adcom.2018.03.015","DOI":"10.1016\/bs.adcom.2018.03.015"},{"key":"e_1_3_3_2_31_2","unstructured":"Reza\u00a0M Parizi Ali Dehghantanha Kim-Kwang\u00a0Raymond Choo and Amritraj Singh. 2018. Empirical vulnerability analysis of automated smart contracts security testing on blockchains. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1809.02702 (2018)."},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"crossref","unstructured":"Heidelinde Rameder Monika Di\u00a0Angelo and Gernot Salzer. 2022. Review of automated vulnerability analysis of smart contracts on Ethereum. Frontiers in Blockchain 5 (2022) 814977.","DOI":"10.3389\/fbloc.2022.814977"},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464837"},{"key":"e_1_3_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/WETSEB52558.2021.00010"},{"key":"e_1_3_3_2_35_2","doi-asserted-by":"crossref","unstructured":"Sarwar Sayeed Hector Marco-Gisbert and Tom Caira. 2020. Smart contract: Attacks and protections. Ieee Access 8 (2020) 24416\u201324427.","DOI":"10.1109\/ACCESS.2020.2970495"},{"key":"e_1_3_3_2_36_2","doi-asserted-by":"crossref","unstructured":"Fabian Sch\u00e4r. 2021. Decentralized finance: On blockchain-and smart contract-based financial markets. FRB of St. Louis Review (2021).","DOI":"10.2139\/ssrn.3571335"},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"crossref","unstructured":"Fernando\u00a0Richter Vidal Naghmeh Ivaki and Nuno Laranjeiro. 2024. OpenSCV: an open hierarchical taxonomy for smart contract vulnerabilities. Empirical Software Engineering 29 4 (2024) 101.","DOI":"10.1007\/s10664-024-10446-8"},{"key":"e_1_3_3_2_38_2","doi-asserted-by":"crossref","unstructured":"Xiaoyin Wang Jiaze Sun Chunyang Hu Panpan Yu Bin Zhang and Donghai Hou. 2022. EtherFuzz: mutation fuzzing smart contracts for TOD vulnerability detection. Wireless Communications and Mobile Computing 2022 1 (2022) 1565007.","DOI":"10.1155\/2022\/1565007"},{"key":"e_1_3_3_2_39_2","doi-asserted-by":"publisher","unstructured":"Oualid Zaazaa and Hanan El\u00a0Bakkali. 2023. A systematic literature review of undiscovered vulnerabilities and tools in smart contract technology. Journal of Intelligent Systems 32 (09 2023). 10.1515\/jisys-2023-0038","DOI":"10.1515\/jisys-2023-0038"},{"key":"e_1_3_3_2_40_2","doi-asserted-by":"publisher","unstructured":"Zibin Zheng Jianzhong Su Jiachi Chen David Lo Zhijie Zhong and Mingxi Ye. 2024. DAppSCAN: Building Large-Scale Datasets for Smart Contract Weaknesses in DApp Projects. IEEE Trans. Softw. Eng. 50 6 (June 2024) 1360\u20131373. 10.1109\/TSE.2024.3383422","DOI":"10.1109\/TSE.2024.3383422"},{"key":"e_1_3_3_2_41_2","doi-asserted-by":"publisher","unstructured":"Weiqin Zou David Lo Pavneet\u00a0Singh Kochhar Xuan-Bach\u00a0Dinh Le Xin Xia Yang Feng Zhenyu Chen and Baowen Xu. 2021. Smart Contract Development: Challenges and Opportunities. IEEE Transactions on Software Engineering 47 10 (2021) 2084\u20132106. 10.1109\/TSE.2019.2942301","DOI":"10.1109\/TSE.2019.2942301"}],"event":{"name":"EASE '25: Evaluation and Assessment in Software Engineering","location":"Istanbul Turkiye","acronym":"EASE '25"},"container-title":["Proceedings of the 29th International Conference on Evaluation and Assessment in Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3756681.3756943","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T08:38:23Z","timestamp":1766565503000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3756681.3756943"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,17]]},"references-count":40,"alternative-id":["10.1145\/3756681.3756943","10.1145\/3756681"],"URL":"https:\/\/doi.org\/10.1145\/3756681.3756943","relation":{},"subject":[],"published":{"date-parts":[[2025,6,17]]},"assertion":[{"value":"2025-12-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}