{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:30:18Z","timestamp":1775068218682,"version":"3.50.1"},"reference-count":226,"publisher":"Association for Computing Machinery (ACM)","issue":"4","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2026,3,31]]},"abstract":"<jats:p>Smart contracts, as self-executing agreements on blockchain platforms, promise to eliminate intermediaries and enhance transaction efficiency. However, their susceptibility to security vulnerabilities not only poses risks of substantial financial losses but also erodes trustworthiness in blockchain ecosystems, driving extensive research into enhancing both their security and trustworthiness. We provide a comprehensive review of the current state of smart contract assurance, covering the primary security threats and mitigation strategies throughout the contract lifecycle\u2013from development to deployment, execution, and maintenance. It evaluates both established and advanced vulnerability detection techniques while exploring underexamined areas, including automated repair, secure execution environments, and defenses against malicious attacks. We further propose a framework to ensure the holistic security and trustworthiness of smart contracts, and discuss future directions for research and development, emphasizing the need to address both technical and regulatory challenges to promote widespread adoption.<\/jats:p>","DOI":"10.1145\/3769013","type":"journal-article","created":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T11:35:07Z","timestamp":1758281707000},"page":"1-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Blockchain Smart Contract Security: Threats and Mitigation Strategies in a Lifecycle Perspective"],"prefix":"10.1145","volume":"58","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9949-2452","authenticated-orcid":false,"given":"Detian","family":"Liu","sequence":"first","affiliation":[{"name":"College of Computer Science, Beijing University of Technology","place":["Beijing, China"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4917-7996","authenticated-orcid":false,"given":"Jianbiao","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computer Science, Beijing University of Technology","place":["Beijing, China"]}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-8195-0762","authenticated-orcid":false,"given":"Yifan","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Computer Science, Beijing University of Technology","place":["Beijing, China"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3663-6591","authenticated-orcid":false,"given":"Hong","family":"Shen","sequence":"additional","affiliation":[{"name":"Central Queensland University","place":["Rockhampton, Australia"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8402-7670","authenticated-orcid":false,"given":"Zhaoqian","family":"Zhang","sequence":"additional","affiliation":[{"name":"China Three Gorges Corporation","place":["Beijing, China"]}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-0757-6025","authenticated-orcid":false,"given":"Tao","family":"Ye","sequence":"additional","affiliation":[{"name":"Qinghai Minzu University","place":["Xining, China"]}]}],"member":"320","published-online":{"date-parts":[[2025,10,25]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"crossref","unstructured":"Isra M. Ali and Mohamed M. Abdallah. 2024. On off-chaining smart contract runtime protection: A queuing model approach. IEEE Transactions on Parallel and Distributed Systems 35 8 (2024) 1345\u20131359.","DOI":"10.1109\/TPDS.2024.3389153"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2023.103658"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.3389\/fcomp.2021.598780"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2020.101227"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2022.08.029"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-13185-1_16"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.bcra.2021.100028"},{"key":"e_1_3_1_9_2","volume-title":"Proceedings of the 38th European Conference on Object-Oriented Programming (ECOOP 2024)","author":"Arvay Barnabas","year":"2024","unstructured":"Barnabas Arvay, Thi Thu Ha Doan, and Peter Thiemann. 2024. A dynamic logic for symbolic execution for the smart contract programming language Michelson. In Proceedings of the 38th European Conference on Object-Oriented Programming (ECOOP 2024). Schloss Dagstuhl\u2013Leibniz-Zentrum f\u00fcr Informatik."},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2995183"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.37"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54455-6_8"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-54455-3_29"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/3182657"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/2993600.2993611"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100198"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385990"},{"key":"e_1_3_1_18_2","unstructured":"Lexi Brent Anton Jurisevic Michael Kong Eric Liu Francois Gauthier Vincent Gramoli Ralph Holz and Bernhard Scholz. 2018. Vandal: A scalable security analysis framework for smart contracts. arXiv:1809.03981. Retrieved from https:\/\/arxiv.org\/abs\/1809.03981"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2023.111919"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/QRS57517.2022.00071"},{"key":"e_1_3_1_21_2","doi-asserted-by":"crossref","unstructured":"Xuelian Cao Jianhui Zhang Xuechen Wu and Bo Liu. 2022. A survey on security in consensus and smart contracts. Peer-to-Peer Networking and Applications 15 2 (2022) 1008\u20131028.","DOI":"10.1007\/s12083-021-01268-2"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2018.00099"},{"key":"e_1_3_1_23_2","doi-asserted-by":"crossref","unstructured":"Chong Chen Jianzhong Su Jiachi Chen Yanlin Wang Tingting Bi Jianxing Yu Yanli Wang Xingwei Lin Ting Chen and Zibin Zheng. 2023. When ChatGPT meets smart contract vulnerability detection: How far are we? ACM Transactions on Software Engineering and Methodology 34 4 (2025) 1\u201330.","DOI":"10.1145\/3702973"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-DSS-SmartCity-DependSys53884.2021.00057"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-023-00392-y"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00229"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639173"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain50366.2020.00048"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678888"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2023.107221"},{"key":"e_1_3_1_31_2","doi-asserted-by":"crossref","unstructured":"Christopher De Baets Basem Suleiman Armin Chitizadeh and Imran Razzak. 2024. Vulnerability detection in smart contracts: A comprehensive survey. arXiv:2407.07922. Retrieved from https:\/\/arxiv.org\/abs\/2407.07922","DOI":"10.21203\/rs.3.rs-6691317\/v1"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102749"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain53845.2021.00069"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/3463274.3463351"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2020.2977594"},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-024-00965-2"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3378736"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/3638045"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE51399.2021.00175"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10619-022-07409-7"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE53745.2022.00289"},{"key":"e_1_3_1_42_2","unstructured":"Pengcheng Fang. 2023. CONTRACTFIX: A framework for automatically fixing vulnerabilities in smart Contracts. arXiv:2307.08912. Retrieved from https:\/\/arxiv.org\/abs\/2307.08912"},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2023.3334208"},{"key":"e_1_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/WETSEB.2019.00008"},{"key":"e_1_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416646"},{"key":"e_1_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384756"},{"key":"e_1_3_1_47_2","doi-asserted-by":"publisher","DOI":"10.1145\/3545948.3545975"},{"key":"e_1_3_1_48_2","doi-asserted-by":"publisher","DOI":"10.1002\/smr.2556"},{"key":"e_1_3_1_49_2","doi-asserted-by":"publisher","DOI":"10.1145\/3641846"},{"key":"e_1_3_1_50_2","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3404366"},{"key":"e_1_3_1_51_2","first-page":"1","article-title":"Ethertrust: Sound Static Analysis of Ethereum Bytecode","author":"Grishchenko Ilya","year":"2018","unstructured":"Ilya Grishchenko, Matteo Maffei, and Clara Schneidewind. 2018. Ethertrust: Sound Static Analysis of Ethereum Bytecode.Technical Report. Technische Universit\u00e4t Wien, 1\u201341.","journal-title":"Technische Universit\u00e4t Wien"},{"key":"e_1_3_1_52_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-89722-6_10"},{"key":"e_1_3_1_53_2","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3469076"},{"key":"e_1_3_1_54_2","doi-asserted-by":"publisher","DOI":"10.1145\/3637229"},{"key":"e_1_3_1_55_2","doi-asserted-by":"crossref","unstructured":"Hanna Halaburda Natalia Levina and Min Semi. 2024. Digitization of transaction terms within TCE: Strong smart contract as a new mode of transaction governance. MIS Quarterly 48 2 (2024) 825\u2013846.","DOI":"10.25300\/MISQ\/2023\/17818"},{"key":"e_1_3_1_56_2","doi-asserted-by":"crossref","unstructured":"Qiang Han Lu Wang Haoyu Zhang Leyi Shi and Danxin Wang. 2024. Ethchecker: A context-guided fuzzing for smart contracts. The Journal of Supercomputing 80 10 (2024) 13949\u201313975.","DOI":"10.1007\/s11227-024-05954-9"},{"key":"e_1_3_1_57_2","unstructured":"Pieter Hartel and Mark van Staalduinen. 2019. Truffle tests for free\u2013Replaying Ethereum smart contracts for transparency. arXiv:1907.09208. Retrieved from https:\/\/arxiv.org\/abs\/1907.09208"},{"key":"e_1_3_1_58_2","doi-asserted-by":"publisher","DOI":"10.1145\/3645104"},{"key":"e_1_3_1_59_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102857"},{"key":"e_1_3_1_60_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3068178"},{"key":"e_1_3_1_61_2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2021.3092639"},{"key":"e_1_3_1_62_2","doi-asserted-by":"publisher","DOI":"10.3390\/s22051829"},{"key":"e_1_3_1_63_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2901011"},{"key":"e_1_3_1_64_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2024.112107"},{"key":"e_1_3_1_65_2","doi-asserted-by":"publisher","DOI":"10.1145\/3457913.3457920"},{"key":"e_1_3_1_66_2","doi-asserted-by":"crossref","unstructured":"Yuan Huang Rong Wang Xiangping Chen Changlin Yang and Zibin Zheng. 2024. Ethereum transaction replay platform based on state-wise account input data. IEEE Transactions on Services Computing 17 5 (2024) 2404\u20132416.","DOI":"10.1109\/TSC.2024.3390433"},{"key":"e_1_3_1_67_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3162065"},{"issue":"3","key":"e_1_3_1_68_2","first-page":"1616","article-title":"A low-cost cross-border payment system based on auditable cryptocurrency with consortium blockchain: Joint digital currency","volume":"16","author":"Islam Md Mainul","year":"2022","unstructured":"Md Mainul Islam, Md Kamrul Islam, Md Shahjalal, Mostafa Zaman Chowdhury, and Yeong Min Jang. 2022. A low-cost cross-border payment system based on auditable cryptocurrency with consortium blockchain: Joint digital currency. IEEE Transactions on Services Computing 16, 3 (2022), 1616\u20131629.","journal-title":"IEEE Transactions on Services Computing"},{"key":"e_1_3_1_69_2","doi-asserted-by":"publisher","DOI":"10.1145\/3593293"},{"key":"e_1_3_1_70_2","first-page":"1","volume-title":"Proceedings of the 2023 2nd International Conference on Informatics (ICI)","author":"Jain Abhinav","year":"2023","unstructured":"Abhinav Jain, Ehan Masud, Michelle Han, Rohan Dhillon, Sumukh Rao, Arya Joshi, Salar Cheema, and Saurav Kumar. 2023. Two timin\u2019: Repairing smart contracts with a two-layered approach. In Proceedings of the 2023 2nd International Conference on Informatics (ICI). IEEE, 1\u20136."},{"key":"e_1_3_1_71_2","doi-asserted-by":"publisher","DOI":"10.1109\/QRS54544.2021.00035"},{"key":"e_1_3_1_72_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2023.107213"},{"key":"e_1_3_1_73_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2023.3263882"},{"key":"e_1_3_1_74_2","doi-asserted-by":"publisher","DOI":"10.1109\/QRS54544.2021.00102"},{"key":"e_1_3_1_75_2","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238177"},{"key":"e_1_3_1_76_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.03.132"},{"key":"e_1_3_1_77_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3123170"},{"key":"e_1_3_1_78_2","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-financial-110921-022806"},{"key":"e_1_3_1_79_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23082"},{"key":"e_1_3_1_80_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3116808"},{"key":"e_1_3_1_81_2","unstructured":"Staffs Keele. 2007. Guidelines for Performing Systematic Literature Reviews in Software Engineering. Technical Report Version 2.3 EBSE Technical Report. EBSE."},{"key":"e_1_3_1_82_2","doi-asserted-by":"crossref","unstructured":"Shafaq Naheed Khan Faiza Loukil Chirine Ghedira-Guegan Elhadj Benkhelifa and Anoud Bani-Hani. 2021. Blockchain smart contracts: Applications challenges and future trends. Peer-to-peer Networking and Applications 14 5 (2021) 2901\u20132925.","DOI":"10.1007\/s12083-021-01127-0"},{"key":"e_1_3_1_83_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC57700.2023.00165"},{"key":"e_1_3_1_84_2","doi-asserted-by":"crossref","unstructured":"Zulfiqar A. Khan and Akbar Siami Namin. 2024. A survey of vulnerability detection techniques by smart contract tools. IEEE Access 12 (2024) 70870\u201370910.","DOI":"10.1109\/ACCESS.2024.3401623"},{"key":"e_1_3_1_85_2","doi-asserted-by":"crossref","unstructured":"Le Cong Trinh Vu Trung Kien Trinh Minh Hoang Nguyen HuuQuyen Nghi Hoang Khoa PhanThe Duy and Van-Hau Pham. 2023. A multimodal deep learning approach for efficient vulnerability detection in smart contracts. In GLOBECOM 2023-Proceedings of the 2023 IEEE Global Communications Conference. IEEE 3421\u20133426.","DOI":"10.1109\/GLOBECOM54140.2023.10437295"},{"key":"e_1_3_1_86_2","doi-asserted-by":"publisher","DOI":"10.1088\/2058-9565\/aabc6b"},{"key":"e_1_3_1_87_2","doi-asserted-by":"publisher","DOI":"10.1109\/SecDev45635.2020.00026"},{"key":"e_1_3_1_88_2","doi-asserted-by":"publisher","DOI":"10.3390\/computers12050107"},{"key":"e_1_3_1_89_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3140091"},{"key":"e_1_3_1_90_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-44041-1_111"},{"key":"e_1_3_1_91_2","doi-asserted-by":"publisher","DOI":"10.1145\/3628797.3628945"},{"key":"e_1_3_1_92_2","doi-asserted-by":"publisher","DOI":"10.1109\/SANER50967.2021.00087"},{"key":"e_1_3_1_93_2","doi-asserted-by":"crossref","unstructured":"Bixin Li Zhenyu Pan and Tianyuan Hu. 2024. EvoFuzzer: An evolutionary fuzzer for detecting reentrancy vulnerability in smart contracts. IEEE Transactions on Network Science and Engineering 11 6 (2024). 5790\u20135802.","DOI":"10.1109\/TNSE.2024.3447025"},{"key":"e_1_3_1_94_2","unstructured":"Dongcheng Li W. Eric Wong Xiaodan Wang Sean Pan and Liang-Seng Koh. 2024. Smart contract vulnerability detection based on static analysis and multi-objective search. arXiv:2410.00282. Retrieved from https:\/\/arxiv.org\/abs\/2410.00282"},{"key":"e_1_3_1_95_2","doi-asserted-by":"crossref","unstructured":"Peiqiang Li Guojun Wang Xiaofei Xing Jinyao Zhu Wanyi Gu and Guangxin Zhai. 2024. A smart contract vulnerability detection method based on deep learning with opcode sequences. Peer-to-Peer Networking and Applications 17 5 (2024) 3222\u20133238.","DOI":"10.1007\/s12083-024-01750-7"},{"key":"e_1_3_1_96_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110959"},{"key":"e_1_3_1_97_2","doi-asserted-by":"crossref","unstructured":"Rujia Li Qin Wang Qi Wang David Galindo and Mark Ryan. 2022. SoK: TEE-assisted confidential smart contract. arXiv:2203.08548. Retrieved from https:\/\/arxiv.org\/abs\/2203.08548","DOI":"10.56553\/popets-2022-0093"},{"key":"e_1_3_1_98_2","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC57359.2022.00012"},{"key":"e_1_3_1_99_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-022-10218-2"},{"key":"e_1_3_1_100_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.2983360"},{"key":"e_1_3_1_101_2","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3691365"},{"key":"e_1_3_1_102_2","doi-asserted-by":"crossref","unstructured":"Ruichao Liang Jing Chen Cong Wu Kun He Yueming Wu Ruochen Cao Ruiying Du Yang Liu and Ziming Zhao. 2024. Vulseye: Detect smart contract vulnerabilities via stateful directed graybox fuzzing. arXiv:2408.10116. Retrieved from https:\/\/arxiv.org\/abs\/2408.10116","DOI":"10.1109\/TIFS.2025.3537827"},{"key":"e_1_3_1_103_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSN60784.2023.00076"},{"key":"e_1_3_1_104_2","doi-asserted-by":"publisher","DOI":"10.1109\/IOTSMS48152.2019.8939256"},{"key":"e_1_3_1_105_2","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598111"},{"key":"e_1_3_1_106_2","doi-asserted-by":"publisher","DOI":"10.1145\/3643738"},{"key":"e_1_3_1_107_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-024-00418-z"},{"key":"e_1_3_1_108_2","doi-asserted-by":"crossref","unstructured":"Ye Liu Yue Xue Daoyuan Wu Yuqiang Sun Yi Li Miaolei Shi and Yang Liu. 2024. PropertyGPT: LLM-driven formal verification of smart contracts through retrieval-augmented property generation. arXiv:2405.02580. Retrieved from https:\/\/arxiv.org\/abs\/2405.02580","DOI":"10.14722\/ndss.2025.241357"},{"key":"e_1_3_1_109_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2019.10265"},{"issue":"2","key":"e_1_3_1_110_2","first-page":"1296","article-title":"Combining graph neural networks with expert knowledge for smart contract vulnerability detection","volume":"35","author":"Liu Zhenguang","year":"2021","unstructured":"Zhenguang Liu, Peng Qian, Xiaoyang Wang, Yuan Zhuang, Lin Qiu, and Xun Wang. 2021. Combining graph neural networks with expert knowledge for smart contract vulnerability detection. IEEE Transactions on Knowledge and Data Engineering 35, 2 (2021), 1296\u20131310.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"e_1_3_1_111_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3237370"},{"key":"e_1_3_1_112_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3253601"},{"key":"e_1_3_1_113_2","unstructured":"Oliver Lutz Huili Chen Hossein Fereidooni Christoph Sendner Alexandra Dmitrienko Ahmad Reza Sadeghi and Farinaz Koushanfar. 2021. Escort: Ethereum smart contracts vulnerability detection using deep neural network and transfer learning. arXiv:2103.12607. Retrieved from https:\/\/arxiv.org\/abs\/2103.12607"},{"key":"e_1_3_1_114_2","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"e_1_3_1_115_2","unstructured":"Lodovica Marchesi Michele Marchesi Livio Pompianu and Roberto Tonelli. 2020. Security checklists for ethereum smart contract development: Patterns and best practices. arXiv:2008.04761. Retrieved from https:\/\/arxiv.org\/abs\/2008.04761"},{"key":"e_1_3_1_116_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-023-05262-8"},{"key":"e_1_3_1_117_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-58387-6_28"},{"key":"e_1_3_1_118_2","doi-asserted-by":"crossref","unstructured":"Ismael Medeiros Fausto Carvalho Alexandre Ferreira Rodrigo Bonif\u00e1cio and Fabiano Cavalcanti Fernandes. 2024. DogeFuzz: A simple yet efficient grey-box fuzzer for ethereum smart contracts. arXiv:2409.01788. Retrieved from https:\/\/arxiv.org\/abs\/2409.01788","DOI":"10.5753\/sbseg.2024.241431"},{"key":"e_1_3_1_119_2","doi-asserted-by":"publisher","DOI":"10.4018\/JCIT.2019010102"},{"key":"e_1_3_1_120_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC51069.2021.9461050"},{"key":"e_1_3_1_121_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00133"},{"key":"e_1_3_1_122_2","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS51746.2020.00011"},{"key":"e_1_3_1_123_2","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2019.8763832"},{"key":"e_1_3_1_124_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00057"},{"key":"e_1_3_1_125_2","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380334"},{"key":"e_1_3_1_126_2","doi-asserted-by":"crossref","unstructured":"Luca Olivieri Luca Negrini Vincenzo Arceri Thomas Jensen and Fausto Spoto. 2024. Design and implementation of static analyses for tezos smart contracts. Distributed Ledger Technologies: Research and Practice 4 2 (2024) 1\u201323.","DOI":"10.1145\/3643567"},{"key":"e_1_3_1_127_2","doi-asserted-by":"publisher","DOI":"10.1145\/3564699"},{"key":"e_1_3_1_128_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109378"},{"key":"e_1_3_1_129_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108421"},{"key":"e_1_3_1_130_2","doi-asserted-by":"publisher","DOI":"10.1145\/3578527.3578538"},{"key":"e_1_3_1_131_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2023.111653"},{"key":"e_1_3_1_132_2","doi-asserted-by":"publisher","DOI":"10.1002\/spe.3156"},{"key":"e_1_3_1_133_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-023-03587-z"},{"key":"e_1_3_1_134_2","unstructured":"Peng Qian Zhenguang Liu Qinming He Butian Huang Duanzheng Tian and Xun Wang. 2022. Smart contract vulnerability detection technique: A survey. arXiv:2209.05872. Retrieved from https:\/\/arxiv.org\/abs\/2209.05872"},{"key":"e_1_3_1_135_2","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583367"},{"key":"e_1_3_1_136_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE60146.2024.00158"},{"key":"e_1_3_1_137_2","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3469078"},{"key":"e_1_3_1_138_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108766"},{"key":"e_1_3_1_139_2","doi-asserted-by":"crossref","unstructured":"Dalila Ressi Alvise Span\u00f2 Lorenzo Benetollo Carla Piazza Michele Bugliesi and Sabina Rossi. 2024. Vulnerability detection in ethereum smart contracts via machine learning: A qualitative analysis. arXiv:2407.18639. Retrieved from https:\/\/arxiv.org\/abs\/2407.18639","DOI":"10.1016\/j.bcra.2025.100390"},{"key":"e_1_3_1_140_2","doi-asserted-by":"publisher","DOI":"10.1145\/3446983.3446994"},{"key":"e_1_3_1_141_2","doi-asserted-by":"crossref","unstructured":"Michael Rodler Wenting Li Ghassan O. Karame and Lucas Davi. 2018. Sereum: Protecting existing smart contracts against re-entrancy attacks. arXiv:1812.05934. Retrieved from https:\/\/arxiv.org\/abs\/1812.05934","DOI":"10.14722\/ndss.2019.23413"},{"key":"e_1_3_1_142_2","first-page":"1289","volume-title":"Proceedings of the30th Usenix Security Symposium (USENIX Security 21)","author":"Rodler Michael","year":"2021","unstructured":"Michael Rodler, Wenting Li, Ghassan O. Karame, and Lucas Davi. 2021. \\(\\lbrace\\) EVMPatch \\(\\rbrace\\) : Timely and automated patching of ethereum smart contracts. In Proceedings of the30th Usenix Security Symposium (USENIX Security 21). 1289\u20131306."},{"key":"e_1_3_1_143_2","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP57164.2023.00034"},{"key":"e_1_3_1_144_2","unstructured":"Francesco Salzano Simone Scalabrino Rocco Oliveto and Remo Pareschi. 2024. Fixing smart contract vulnerabilities: A comparative analysis of literature and developer\u2019s practices. arXiv:2403.07458. Retrieved from https:\/\/arxiv.org\/abs\/2403.07458"},{"key":"e_1_3_1_145_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2970495"},{"key":"e_1_3_1_146_2","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417250"},{"key":"e_1_3_1_147_2","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain55522.2022.00016"},{"key":"e_1_3_1_148_2","unstructured":"Tanusree Sharma Zhixuan Zhou Andrew Miller and Yang Wang. 2022. Exploring security practices of smart contract developers. arXiv:2204.11193. Retrieved from https:\/\/arxiv.org\/abs\/2204.11193"},{"key":"e_1_3_1_149_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3288429"},{"key":"e_1_3_1_150_2","unstructured":"Chaofan Shou Yuanyu Ke Yupeng Yang Qi Su Or Dadosh Assaf Eli David Benchimol Doudou Lu Daniel Tong Dex Chen et\u00a0al. 2024. BACKRUNNER: Mitigating smart contract attacks in the real world. arXiv:2409.06213. Retrieved from https:\/\/arxiv.org\/abs\/2409.06213"},{"key":"e_1_3_1_151_2","unstructured":"Chaofan Shou Jing Liu Doudou Lu and Koushik Sen. 2024. Llm4fuzz: Guided fuzzing of smart contracts with large language models. arXiv:2401.11108. Retrieved from https:\/\/arxiv.org\/abs\/2401.11108"},{"key":"e_1_3_1_152_2","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598059"},{"key":"e_1_3_1_153_2","doi-asserted-by":"publisher","DOI":"10.1145\/3485540"},{"key":"e_1_3_1_154_2","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623178"},{"key":"e_1_3_1_155_2","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3616341"},{"key":"e_1_3_1_156_2","doi-asserted-by":"crossref","unstructured":"Majd Soud Waltteri Nuutinen and Grischa Liebel. 2024. Soley: Identification and automated detection of logic vulnerabilities in ethereum smart contracts using large language models. arXiv:2406.16244. Retrieved from https:\/\/arxiv.org\/abs\/2406.16244","DOI":"10.1016\/j.jss.2025.112406"},{"key":"e_1_3_1_157_2","doi-asserted-by":"publisher","DOI":"10.1109\/SEAA60479.2023.00068"},{"key":"e_1_3_1_158_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833732"},{"key":"e_1_3_1_159_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE59848.2023.00035"},{"key":"e_1_3_1_160_2","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM54140.2023.10437641"},{"key":"e_1_3_1_161_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9020255"},{"key":"e_1_3_1_162_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000473"},{"key":"e_1_3_1_163_2","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639117"},{"issue":"2","key":"e_1_3_1_164_2","first-page":"28","article-title":"Smart contracts: Building blocks for digital markets","volume":"18","author":"Szabo Nick","year":"1996","unstructured":"Nick Szabo. 1996. Smart contracts: Building blocks for digital markets. EXTROPY: The Journal of Transhumanist Thought,(16) 18, 2 (1996), 28.","journal-title":"EXTROPY: The Journal of Transhumanist Thought,(16)"},{"key":"e_1_3_1_165_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-023-47219-0"},{"key":"e_1_3_1_166_2","doi-asserted-by":"publisher","DOI":"10.1145\/3194113.3194115"},{"key":"e_1_3_1_167_2","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP51992.2021.00018"},{"key":"e_1_3_1_168_2","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243780"},{"key":"e_1_3_1_169_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN61486.2024.10637655"},{"key":"e_1_3_1_170_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110891"},{"key":"e_1_3_1_171_2","doi-asserted-by":"crossref","unstructured":"Fernando Richter Vidal Naghmeh Ivaki and Nuno Laranjeiro. 2024. Vulnerability detection techniques for smart contracts: A systematic literature review. Journal of Systems and Software 217 (2024) 112160.","DOI":"10.1016\/j.jss.2024.112160"},{"key":"e_1_3_1_172_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2018.07.004"},{"key":"e_1_3_1_173_2","doi-asserted-by":"publisher","DOI":"10.1145\/3691620.3695349"},{"key":"e_1_3_1_174_2","doi-asserted-by":"publisher","DOI":"10.1002\/smr.2557"},{"key":"e_1_3_1_175_2","doi-asserted-by":"publisher","DOI":"10.1109\/QRS60937.2023.00024"},{"key":"e_1_3_1_176_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-024-00471-8"},{"key":"e_1_3_1_177_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3520830"},{"key":"e_1_3_1_178_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.2968505"},{"key":"e_1_3_1_179_2","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4341"},{"key":"e_1_3_1_180_2","first-page":"418","volume-title":"Proceedings of the 3rd International Conference on Blockchain and Trustworthy Systems, BlockSys 2021, Revised Selected Papers 3","author":"Wang Zexu","year":"2021","unstructured":"Zexu Wang, Bin Wen, Ziqiang Luo, and Shaojie Liu. 2021. Mar: A dynamic symbol execution detection method for smart contract reentry vulnerability. In Proceedings of the 3rd International Conference on Blockchain and Trustworthy Systems, BlockSys 2021, Revised Selected Papers 3. Springer, 418\u2013429."},{"key":"e_1_3_1_181_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3162499"},{"key":"e_1_3_1_182_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM52122.2024.10621414"},{"key":"e_1_3_1_183_2","doi-asserted-by":"crossref","unstructured":"Guangfu Wu HaiPing Wang Xin Lai Mengmeng Wang Daojing He and Sammy Chan. 2024. A comprehensive survey of smart contract security: State of the art and research directions. Journal of Network and Computer Applications 226 (2024) 103882.","DOI":"10.1016\/j.jnca.2024.103882"},{"key":"e_1_3_1_184_2","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639152"},{"key":"e_1_3_1_185_2","doi-asserted-by":"publisher","DOI":"10.1109\/BIBM58861.2023.10385627"},{"key":"e_1_3_1_186_2","doi-asserted-by":"publisher","DOI":"10.1145\/3691620.3695482"},{"key":"e_1_3_1_187_2","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3417064"},{"key":"e_1_3_1_188_2","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom63139.2024.00178"},{"key":"e_1_3_1_189_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-024-10447-7"},{"key":"e_1_3_1_190_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2024.3356595"},{"key":"e_1_3_1_191_2","first-page":"280","volume-title":"Proceedings of the International Symposium on Mobile Internet Security","author":"Yan Ruichi","year":"2022","unstructured":"Ruichi Yan, Guohua Tian, Shichong Tan, and Zhengtao Jiang. 2022. A practical detection and defense scheme against smart contract attacks based on transaction features. In Proceedings of the International Symposium on Mobile Internet Security. Springer, 280\u2013291."},{"key":"e_1_3_1_192_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2023.103076"},{"key":"e_1_3_1_193_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3007657"},{"key":"e_1_3_1_194_2","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9322167"},{"key":"e_1_3_1_195_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-44038-1_57"},{"key":"e_1_3_1_196_2","doi-asserted-by":"crossref","unstructured":"Yuxiang Yang Yuling Chen Zhiquan Liu Chaoyue Tan and Yun Luo. 2024. Verifiable and redactable blockchain for internet of vehicles data sharing. IEEE Internet of Things Journal 12 4 (2024) 4249\u20134261.","DOI":"10.1109\/JIOT.2024.3483809"},{"key":"e_1_3_1_197_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3325761"},{"key":"e_1_3_1_198_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2969437"},{"key":"e_1_3_1_199_2","doi-asserted-by":"publisher","DOI":"10.1145\/3377812.3390908"},{"key":"e_1_3_1_200_2","doi-asserted-by":"publisher","DOI":"10.1145\/3674725"},{"key":"e_1_3_1_201_2","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598057"},{"key":"e_1_3_1_202_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3233448"},{"key":"e_1_3_1_203_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3325907"},{"key":"e_1_3_1_204_2","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN52387.2021.9534324"},{"key":"e_1_3_1_205_2","doi-asserted-by":"publisher","DOI":"10.1145\/3402450"},{"key":"e_1_3_1_206_2","doi-asserted-by":"publisher","DOI":"10.1515\/jisys-2023-0038"},{"key":"e_1_3_1_207_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC54236.2022.00277"},{"key":"e_1_3_1_208_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2021.02.026"},{"key":"e_1_3_1_209_2","doi-asserted-by":"crossref","unstructured":"Haichuan Zhang Hong Su Xi Wu and Yuliang Yang. 2023. Cross-chain interoperability and collaboration for keyword-based embedded smart contracts in the internet of things. IEEE Internet of Things Journal 11 6 (2023) 10791\u201310807.","DOI":"10.1109\/JIOT.2023.3328190"},{"key":"e_1_3_1_210_2","unstructured":"Lyuye Zhang Kaixuan Li Kairan Sun Daoyuan Wu Ye Liu Haoye Tian and Yang Liu. 2024. ACFIX: Guiding LLMs with mined common RBAC practices for context-aware repair of access control vulnerabilities in smart contracts. arXiv:2403.06838. Retrieved from https:\/\/arxiv.org\/abs\/2403.06838"},{"key":"e_1_3_1_211_2","doi-asserted-by":"publisher","DOI":"10.3390\/s22093581"},{"key":"e_1_3_1_212_2","first-page":"2775","volume-title":"Proceedings of the 29th USENIX Security Symposium (USENIX Security 20)","author":"Zhang Mengya","year":"2020","unstructured":"Mengya Zhang, Xiaokuan Zhang, Yinqian Zhang, and Zhiqiang Lin. 2020. \\(\\lbrace\\) TXSPECTOR \\(\\rbrace\\) : Uncovering attacks in ethereum from transactions. In Proceedings of the 29th USENIX Security Symposium (USENIX Security 20). 2775\u20132792."},{"key":"e_1_3_1_213_2","doi-asserted-by":"publisher","DOI":"10.1109\/SANER48275.2020.9054822"},{"key":"e_1_3_1_214_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2019.00052"},{"key":"e_1_3_1_215_2","doi-asserted-by":"publisher","DOI":"10.3390\/fi14110326"},{"key":"e_1_3_1_216_2","doi-asserted-by":"publisher","DOI":"10.1109\/SANER48275.2020.9054825"},{"key":"e_1_3_1_217_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.10.024"},{"key":"e_1_3_1_218_2","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534395"},{"key":"e_1_3_1_219_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.12.019"},{"key":"e_1_3_1_220_2","doi-asserted-by":"publisher","DOI":"10.1504\/IJWGS.2018.095647"},{"key":"e_1_3_1_221_2","unstructured":"Jianfei Zhou Tianxing Jiang Shuwei Song and Ting Chen. 2022. Antfuzzer: A grey-box fuzzing framework for EOSIO smart contracts. arXiv:2211.02652. Retrieved from https:\/\/arxiv.org\/abs\/2211.02652"},{"key":"e_1_3_1_222_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2023.103555"},{"key":"e_1_3_1_223_2","doi-asserted-by":"crossref","unstructured":"Huijuan Zhu Lei Yang Liangmin Wang and Victor S. Sheng. 2024. A survey on security analysis methods of smart contracts. IEEE Transactions on Services Computing 17 6 (2024) 4522\u20134539.","DOI":"10.1109\/TSC.2024.3463394"},{"key":"e_1_3_1_224_2","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom60117.2023.00057"},{"key":"e_1_3_1_225_2","first-page":"3283","volume-title":"Proceedings of the 29th International Conference on International Joint Conferences on Artificial Intelligence","author":"Zhuang Yuan","year":"2021","unstructured":"Yuan Zhuang, Zhenguang Liu, Peng Qian, Qi Liu, Xiang Wang, and Qinming He. 2021. Smart contract vulnerability detection using graph neural networks. In Proceedings of the 29th International Conference on International Joint Conferences on Artificial Intelligence. 3283\u20133290."},{"key":"e_1_3_1_226_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2942301"},{"key":"e_1_3_1_227_2","doi-asserted-by":"publisher","DOI":"10.3389\/fbloc.2020.00026"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3769013","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:16:31Z","timestamp":1761401791000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3769013"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,25]]},"references-count":226,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2026,3,31]]}},"alternative-id":["10.1145\/3769013"],"URL":"https:\/\/doi.org\/10.1145\/3769013","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,25]]},"assertion":[{"value":"2025-01-25","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-09-15","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}