{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T15:21:48Z","timestamp":1778167308573,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,27]],"date-time":"2020-06-27T00:00:00Z","timestamp":1593216000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","award":["PTDC\/CCI-COM\/29300\/2017"],"award-info":[{"award-number":["PTDC\/CCI-COM\/29300\/2017"]}]},{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","award":["822404"],"award-info":[{"award-number":["822404"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,27]]},"DOI":"10.1145\/3377811.3380364","type":"proceedings-article","created":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T18:25:34Z","timestamp":1601576734000},"page":"530-541","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":314,"title":["Empirical review of automated analysis tools on 47,587 Ethereum smart contracts"],"prefix":"10.1145","author":[{"given":"Thomas","family":"Durieux","sequence":"first","affiliation":[{"name":"University of Lisbon, Portugal"}]},{"given":"Jo\u00e3o F.","family":"Ferreira","sequence":"additional","affiliation":[{"name":"University of Lisbon, Portugal"}]},{"given":"Rui","family":"Abreu","sequence":"additional","affiliation":[{"name":"University of Lisbon, Portugal"}]},{"given":"Pedro","family":"Cruz","sequence":"additional","affiliation":[{"name":"University of Lisbon, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2020,10]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Automated Technology for Verification and Analysis, Shuvendu K","author":"Albert Elvira","unstructured":"Elvira Albert, Pablo Gordillo, Benjamin Livshits, Albert Rubio, and Ilya Sergey. 2018. EthIR: A Framework for High-Level Analysis of Ethereum Bytecode. In Automated Technology for Verification and Analysis, Shuvendu K. Lahiri and Chao Wang (Eds.). Springer International Publishing, Cham, 513--520."},{"key":"e_1_3_2_1_2_1","volume-title":"Pace","author":"Azzopardi Shaun","year":"2018","unstructured":"Shaun Azzopardi, Joshua Ellul, and Gordon J. Pace. 2018. Monitoring Smart Contracts: ContractLarva and Open Challenges Beyond. In Runtime Verification, Christian Colombo and Martin Leucker (Eds.). Springer International Publishing, Cham, 113--137."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2993600.2993611"},{"key":"e_1_3_2_1_4_1","volume-title":"Vandal: A scalable security analysis framework for smart contracts. arXiv:1809.03981","author":"Brent Lexi","year":"2018","unstructured":"Lexi Brent, Anton Jurisevic, Michael Kong, Eric Liu, Francois Gauthier, Vincent Gramoli, Ralph Holz, and Bernhard Scholz. 2018. Vandal: A scalable security analysis framework for smart contracts. arXiv:1809.03981"},{"key":"e_1_3_2_1_5_1","unstructured":"Vitalik Buterin et al. 2013. Ethereum white paper. GitHub repository 1 GitHub (2013) 22--23."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Jialiang Chang Bo Gao Hao Xiao Jun Sun and Zijiang Yang. 2018. sCompile: Critical path identification and analysis for smart contracts. arXiv:1808.00624","DOI":"10.1007\/978-3-030-32409-4_18"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Huashan Chen Marcus Pendleton Laurent Njilla and Shouhuai Xu. 2019. A Survey on Ethereum Systems Security: Vulnerabilities Attacks and Defenses. arXiv:1908.04507","DOI":"10.1145\/3391195"},{"key":"e_1_3_2_1_8_1","volume-title":"Daniel Xiapu Luo, and Ting Chen","author":"Chen Jiachi","year":"2019","unstructured":"Jiachi Chen, Xin Xia, David Lo, John Grundy, Daniel Xiapu Luo, and Ting Chen. 2019. Domain Specific Code Smells in Smart Contracts. arXiv:arXiv:1905.01467"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2017.7884650"},{"key":"e_1_3_2_1_10_1","unstructured":"Blockchain Company. 2018. Solhydra. https:\/\/github.com\/BlockChainCompany\/solhydra."},{"key":"e_1_3_2_1_11_1","unstructured":"Phil Daian. 2016. Analysis of the DAO exploit. http:\/\/hackingdistributed.com\/2016\/06\/18\/analysis-of-the-dao-exploit\/."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAPPCON.2019.00018"},{"key":"e_1_3_2_1_13_1","unstructured":"Thomas Durieux Jo\u00e3o F. Ferreira Rui Abreu and Pedro Cruz. 2019. SmartBugs execution results. https:\/\/github.com\/smartbugs\/smartbugs-results."},{"key":"e_1_3_2_1_14_1","unstructured":"Thomas Durieux Jo\u00e3o F. Ferreira Rui Abreu and Pedro Cruz. 2019. SmartBugs repository. https:\/\/github.com\/smartbugs\/smartbugs."},{"key":"e_1_3_2_1_15_1","unstructured":"Thomas Durieux Jo\u00e3o F. Ferreira Rui Abreu and Pedro Cruz. 2019. SmartBugs Wild dataset. https:\/\/github.com\/smartbugs\/smartbugs-wild."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/WETSEB.2019.00008"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3276486"},{"key":"e_1_3_2_1_18_1","volume-title":"Principles of Security and Trust, Lujo Bauer and Ralf K\u00fcsters (Eds.)","author":"Grishchenko Ilya","unstructured":"Ilya Grishchenko, Matteo Maffei, and Clara Schneidewind. 2018. A Semantic Framework for the Security Analysis of Ethereum Smart Contracts. In Principles of Security and Trust, Lujo Bauer and Ralf K\u00fcsters (Eds.). Springer International Publishing, Cham, 243--269."},{"key":"e_1_3_2_1_19_1","volume-title":"Principles of Security and Trust, Lujo Bauer and Ralf K\u00fcsters (Eds.)","author":"Grishchenko Ilya","unstructured":"Ilya Grishchenko, Matteo Maffei, and Clara Schneidewind. 2018. A Semantic Framework for the Security Analysis of Ethereum Smart Contracts. In Principles of Security and Trust, Lujo Bauer and Ralf K\u00fcsters (Eds.). Springer International Publishing, Cham, 243--269."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.3390\/technologies7010006"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2018.00022"},{"key":"e_1_3_2_1_22_1","volume-title":"ZEUS: Analyzing Safety of Smart Contracts. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018","author":"Kalra Sukrit","year":"2018","unstructured":"Sukrit Kalra, Seep Goel, Mohan Dhawan, and Subodh Sharma. 2018. ZEUS: Analyzing Safety of Smart Contracts. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 18--21, 2018. NDSS, San Diego, California, USA, 1--15."},{"key":"e_1_3_2_1_23_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Krupp Johannes","year":"2018","unstructured":"Johannes Krupp and Christian Rossow. 2018. teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts. In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD, 1317--1333. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/krupp"},{"key":"e_1_3_2_1_24_1","unstructured":"Shuvendu K Lahiri Shuo Chen Yuepeng Wang and Isil Dillig. 2018. Formal Specification and Verification of Smart Contracts for Azure Blockchain. arXiv:1812.08829"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183440.3183495"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3240728"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"e_1_3_2_1_28_1","volume-title":"Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts. In Principles of Security and Trust, Lujo Bauer and Ralf K\u00fcsters (Eds.)","author":"Mavridou Anastasia","year":"2018","unstructured":"Anastasia Mavridou and Aron Laszka. 2018. Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts. In Principles of Security and Trust, Lujo Bauer and Ralf K\u00fcsters (Eds.). Springer International Publishing, Cham, 270--277."},{"key":"e_1_3_2_1_29_1","unstructured":"Evgeny Medvedev. 2018. Ethereum in BigQuery: a Public Dataset for smart contract analytics. https:\/\/cloud.google.com\/blog\/products\/data-analytics\/ethereum-bigquery-public-dataset-smart-contract-analytics."},{"key":"e_1_3_2_1_30_1","volume-title":"Manticore: A User-Friendly Symbolic Execution Framework for Binaries and Smart Contracts. arXiv:1907.03890","author":"Mossberg Mark","year":"2019","unstructured":"Mark Mossberg, Felipe Manzano, Eric Hennenfent, Alex Groce, Gustavo Grieco, Josselin Feist, Trent Brunson, and Artem Dinaburg. 2019. Manticore: A User-Friendly Symbolic Execution Framework for Binaries and Smart Contracts. arXiv:1907.03890"},{"key":"e_1_3_2_1_31_1","volume-title":"9th Annual HITB Security Conference (HITBSecConf). HITB","author":"Mueller Bernhard","year":"2018","unstructured":"Bernhard Mueller. 2018. Smashing ethereum smart contracts for fun and real profit. In 9th Annual HITB Security Conference (HITBSecConf). HITB, Amsterdam, Netherlands, 54."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274743"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2018.8406332"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/3291291.3291303"},{"key":"e_1_3_2_1_35_1","unstructured":"Daniel Perez and Benjamin Livshits. 2019. Smart Contract Vulnerabilities: Does Anyone Care? arXiv:1902.06710"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2921936"},{"key":"e_1_3_2_1_37_1","unstructured":"Matt Suiche. 2017. The $280M Ethereum's Parity bug. https:\/\/blog.comae.io\/the-280m-ethereums-bug-f28e5de43513."},{"key":"e_1_3_2_1_38_1","volume-title":"Porosity: A decompiler for blockchain-based smart contracts bytecode. DEF con 25","author":"Suiche Matt","year":"2017","unstructured":"Matt Suiche. 2017. Porosity: A decompiler for blockchain-based smart contracts bytecode. DEF con 25 (2017), 11."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3194113.3194115"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274737"},{"key":"e_1_3_2_1_41_1","volume-title":"The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts. In 28th USENIX Security Symposium (USENIX Security 19)","author":"Torres Christof Ferreira","year":"2019","unstructured":"Christof Ferreira Torres, Mathis Steichen, and Radu State. 2019. The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 1591--1607. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/ferreira"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243780"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2018.8328743"},{"key":"e_1_3_2_1_44_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Zhou Yi","year":"2018","unstructured":"Yi Zhou, Deepak Kumar, Surya Bakshi, Joshua Mason, Andrew Miller, and Michael Bailey. 2018. Erays: Reverse Engineering Ethereum's Opaque Smart Contracts. In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD, 1371--1385. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/zhou"}],"event":{"name":"ICSE '20: 42nd International Conference on Software Engineering","location":"Seoul South Korea","acronym":"ICSE '20","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","KIISE Korean Institute of Information Scientists and Engineers","IEEE CS"]},"container-title":["Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377811.3380364","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3377811.3380364","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:39Z","timestamp":1750200099000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377811.3380364"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,27]]},"references-count":44,"alternative-id":["10.1145\/3377811.3380364","10.1145\/3377811"],"URL":"https:\/\/doi.org\/10.1145\/3377811.3380364","relation":{},"subject":[],"published":{"date-parts":[[2020,6,27]]},"assertion":[{"value":"2020-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}