{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,7,16]],"date-time":"2023-07-16T04:17:38Z","timestamp":1689481058922},"posted":{"date-parts":[[2023]]},"group-title":"SSRN","reference-count":137,"publisher":"Elsevier BV","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.2139\/ssrn.4511778","type":"posted-content","created":{"date-parts":[[2023,7,15]],"date-time":"2023-07-15T14:16:57Z","timestamp":1689430617000},"source":"Crossref","is-referenced-by-count":0,"title":["Vulnerability Detection for Smart Contracts: A Systematic Literature Review"],"prefix":"10.2139","author":[{"given":"Fernando","family":"Vidal","sequence":"first","affiliation":[]},{"given":"Naghmeh","family":"Ivaki","sequence":"additional","affiliation":[]},{"given":"Nuno","family":"Laranjeiro","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"482","DOI":"10.1109\/APSEC48747.2019.00071","article-title":"SolAnalyser: A Framework for Analysing and Testing Smart Contracts","author":"Sefa Akca","year":"2019","journal-title":"2019 26th Asia-Pacific Software Engineering Conference (APSEC)"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"125","DOI":"10.5121\/csit.2017.71011","article-title":"Blockchain Based Smart Contracts : A Systematic Mapping Study","author":"Maher Alharby","year":"2017","journal-title":"Computer Science & Information Technology (CS & IT)"},{"key":"ref3","article-title":"Verification of smart contracts: A survey","volume":"67","author":"Mouhamad Almakhour","year":"2020","journal-title":"Pervasive and Mobile Computing"},{"key":"ref4","author":"Antlr","year":"2019"},{"key":"ref5","article-title":"Detection of Vulnerabilities in Smart Contracts Specifications in Ethereum Platforms","author":"Mario M Mauro C Arga\ufffdaraz","year":"2020","journal-title":"9th Symposium on Languages, Applications and Technologies (SLATE 2020)"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1145\/3457337.3457841","article-title":"Eth2Vec: Learning Contract-Wide Code Representations for Vulnerability Detection on Ethereum Smart Contracts","author":"Nami Ashizawa","year":"2021","journal-title":"Proceedings of the 3rd ACM International Symposium on Blockchain and Secure Critical Infrastructure"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1145\/3341105.3374226","author":"Mohammadreza Ashouri","year":"2020","journal-title":"Proceedings of the 35th Annual ACM Symposium on Applied Computing"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"99552","DOI":"10.1109\/ACCESS.2020.2995183","article-title":"GasFuzzer: Fuzzing Ethereum Smart Contract Binaries to Expose Gas-Oriented Exception Security Vulnerabilities","volume":"8","author":"Ashraf","year":"2020","journal-title":"IEEE Access"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1109\/Blockchain.2019.00059","article-title":"Smart Contract Defense through Bytecode Rewriting","author":"Gbadebo Ayoade","year":"2019","journal-title":"2019 IEEE International Conference on Blockchain (Blockchain)"},{"issue":"3","key":"ref10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3182657","article-title":"A Survey of Symbolic Execution Techniques","volume":"51","author":"Roberto Baldoni","year":"2019","journal-title":"ACM Computing Surveys"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1145\/2993600.2993611","article-title":"Formal Verification of Smart Contracts","author":"Karthikeyan Bhargavan","year":"2016","journal-title":"Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1109\/SP46214.2022.9833721","article-title":"SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds","author":"Priyanka Bose","year":"2022","journal-title":"2022 IEEE Symposium on Security and Privacy (SP)"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"454","DOI":"10.1145\/3385412.3385990","article-title":"Ethainter: A Smart Contract Security Analyzer for Composite Vulnerabilities","volume":"2020","author":"Lexi Brent","year":"2020","journal-title":"Proceedings of the 41st ACM SIGPLAN Conference on Programming Language Design and Implementation"},{"key":"ref14","first-page":"286","article-title":"sCompile: Critical Path Identification and Analysis for Smart Contracts","author":"Jialiang Chang","year":"2019","journal-title":"Formal Methods and Software Engineering"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1109\/Blockchain.2019.00050","article-title":"Deviant: A Mutation Testing Tool for Solidity Smart Contracts","author":"Patrick Chapman","year":"2019","journal-title":"2019 IEEE International Conference on Blockchain (Blockchain)"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1016\/j.cose.2018.02.002","article-title":"A systematic review of fuzzing techniques","volume":"75","author":"Chen Chen","year":"2018","journal-title":"Computers & Security"},{"issue":"3","key":"ref17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3391195","article-title":"A Survey on Ethereum Systems Security: Vulnerabilities, Attacks, and Defenses","volume":"53","author":"Huashan Chen","year":"2021","journal-title":"ACM Computing Surveys"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2020.24449","article-title":"SODA: A Generic Online Detection Framework for Smart Contracts","author":"Ting Chen","year":"2020","journal-title":"Proceedings 2020 Network and Distributed System Security Symposium"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"703","DOI":"10.1145\/3533767.3534218","article-title":"WASAI: uncovering vulnerabilities in Wasm smart contracts","author":"Weimin Chen","year":"2022","journal-title":"Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis"},{"issue":"6","key":"ref20","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/MSP.2004.111","article-title":"Static analysis for security","volume":"2","author":"B Chess","year":"2004","journal-title":"IEEE Security and Privacy Magazine"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1109\/Blockchain50366.2020.00048","article-title":"RA: Hunting for Re-Entrancy Attacks in Ethereum Smart Contracts via Static Analysis","author":"Yuchiro Chinen","year":"2020","journal-title":"2020 IEEE International Conference on Blockchain (Blockchain)"},{"key":"ref22","volume":"1","year":"2019","journal-title":"Jitendra Chittoda. Mastering Blockchain Programming with Solidity"},{"key":"ref23","author":"Clarivate","journal-title":"Journal Citation Reports"},{"key":"ref24","author":"Consensys","year":"2021"},{"key":"ref25","author":"Patrick Cousot","year":"2021","journal-title":"Principles of Abstract Interpretation"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/3494106.3528672","article-title":"Vulnerable Smart Contract Detection by Means of Model Checking","author":"Giuseppe Crincoli","year":"2022","journal-title":"Proceedings of the Fourth ACM International Symposium on Blockchain and Secure Critical Infrastructure"},{"key":"ref27","first-page":"639","author":"Siwei Cui","year":"2022","journal-title":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security"},{"key":"ref28","first-page":"69","article-title":"A Survey of Tools for Analyzing Ethereum Smart Contracts","author":"Monika Di","year":"2019","journal-title":"2019 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON)"},{"key":"ref29","first-page":"17","article-title":"An Empirical Evaluation of the Effectiveness of Smart Contract Verification Tools","author":"Bruno Dia","year":"2021","journal-title":"2021 IEEE 26th Pacific Rim International Symposium on Dependable Computing (PRDC)"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1145\/3463274.3463351","article-title":"HFContractFuzzer: Fuzzing Hyperledger Fabric Smart Contracts for Vulnerability Detection","author":"Mengjie Ding","year":"2021","journal-title":"Evaluation and Assessment in Software Engineering"},{"key":"ref31","first-page":"530","article-title":"Empirical Review of Automated Analysis Tools on 47,587 Ethereum Smart Contracts","author":"Thomas Durieux","year":"2020","journal-title":"Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering, ICSE '20"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1016\/B978-155860702-6\/50009-0","article-title":"Design of Embedded Systems: Formal Models, Validation, and Synthesis","author":"Stephen Edwards","year":"2002","journal-title":"Readings in Hardware\/Software Co-Design, Systems on Silicon"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1145\/3463274.3463348","article-title":"Dynamic Vulnerability Detection on Smart Contracts Using Machine Learning","author":"Mojtaba Eshghie","year":"2021","journal-title":"Evaluation and Assessment in Software Engineering"},{"key":"ref34","author":"Ethereum","year":"2020","journal-title":"Ethereum Virtual Machine (EVM)"},{"key":"ref35","author":"Etherscan About Etherscan","year":"2021"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/WETSEB.2019.00008","article-title":"Slither: A Static Analysis Framework for Smart Contracts","author":"Josselin Feist","year":"2019","journal-title":"2019 IEEE\/ACM 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB), WETSEB '19"},{"key":"ref37","author":"Xiaotao Feng","year":"2019","journal-title":"Bug Searching in Smart Contract"},{"key":"ref38","author":"Yu Feng","year":"2019","journal-title":"Precise Attack Synthesis for Smart Contracts"},{"key":"ref39","first-page":"1349","author":"F Jo\ufffdo","year":"2020","journal-title":"Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"147327","DOI":"10.1109\/ACCESS.2019.2947146","article-title":"A Critical-Path-Coverage-Based Vulnerability Detection Method for Smart Contracts","volume":"7","author":"Menglin Fu","year":"2019","journal-title":"IEEE Access"},{"key":"ref41","first-page":"23","article-title":"EASYFLOW: Keep Ethereum Away from Overflow","author":"Jianbo Gao","year":"2019","journal-title":"2019 IEEE\/ACM 41st International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)"},{"key":"ref42","first-page":"394","article-title":"SmartEmbed: A Tool for Clone and Bug Detection in Smart Contracts through Structural Code Embedding","author":"Zhipeng Gao","year":"2019","journal-title":"2019 IEEE International Conference on Software Maintenance and Evolution (ICSME)"},{"key":"ref43","first-page":"394","article-title":"SmartEmbed: A Tool for Clone and Bug Detection in Smart Contracts through Structural Code Embedding","author":"Zhipeng Gao","year":"2019","journal-title":"2019 IEEE International Conference on Software Maintenance and Evolution (ICSME)"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1145\/3395363.3397385","article-title":"How Effective Are Smart Contract Analysis Tools? Evaluating Smart Contract Static Analysis Tools Using Bug Injection","volume":"2020","author":"Asem Ghaleb","year":"2020","journal-title":"Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis"},{"key":"ref45","author":"Google Google Scholar","year":"2021"},{"issue":"10","key":"ref46","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1145\/3416262","article-title":"Analyzing the out-of-Gas World of Smart Contracts","volume":"63","author":"Neville Grech","year":"2020","journal-title":"Commun. ACM"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1145\/3395363.3404366","article-title":"Echidna: Effective, Usable, and Fast Fuzzing for Smart Contracts","volume":"2020","author":"Gustavo Grieco","year":"2020","journal-title":"Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis"},{"key":"ref48","first-page":"243","article-title":"A Semantic Framework for the Security Analysis of Ethereum Smart Contracts","volume":"10804","author":"Ilya Grishchenko","year":"2018","journal-title":"Principles of Security and Trust"},{"key":"ref49","year":"2021","journal-title":"SWEET TOOLS FOR SMART CONTRACTS"},{"key":"ref50","article-title":"Deep learning-based malicious smart contract detection scheme for internet of things environment","volume":"97","author":"Rajesh Gupta","year":"2022","journal-title":"Computers & Electrical Engineering"},{"key":"ref51","doi-asserted-by":"crossref","first-page":"87643","DOI":"10.1109\/ACCESS.2021.3068178","article-title":"Survey on Blockchain-Based Smart Contracts: Technical Aspects and Future Research","volume":"9","author":"Yining Tharaka Mawanane Hewa","year":"2021","journal-title":"IEEE Access"},{"issue":"2","key":"ref52","article-title":"A comprehensive survey on smart contract construction and execution: paradigms, tools, and systems","volume":"2","author":"Bin Hu","year":"2021","journal-title":"Patterns"},{"key":"ref53","first-page":"1","article-title":"Detect Defects of Solidity Smart Contract Based on the Knowledge Graph","author":"Tianyuan Hu","year":"2023","journal-title":"IEEE Transactions on Reliability"},{"key":"ref54","doi-asserted-by":"crossref","first-page":"32595","DOI":"10.1109\/ACCESS.2022.3162065","article-title":"CodeNet: Code-Targeted Convolutional Neural Network Architecture for Smart Contract Vulnerability Detection","volume":"10","author":"Seon-Jin Hwang","year":"2022","journal-title":"IEEE Access"},{"key":"ref55","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1145\/3238147.3238177","article-title":"Fuzzing Smart Contracts for Vulnerability Detection","author":"Bo Jiang","year":"2018","journal-title":"Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering, ASE 2018"},{"key":"ref56","first-page":"2018","article-title":"ZEUS: Analyzing Safety of Smart Contracts","author":"Sukrit Kalra","year":"2018","journal-title":"Proceedings 2018 Network and Distributed System Security Symposium"},{"key":"ref57","author":"Barbara Kitchenham","year":"2004","journal-title":"Procedures for Performing Systematic Reviews"},{"key":"ref58","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1145\/3293882.3330560","article-title":"Exploiting the Laws of Order in Smart Contracts","author":"Aashish Kolluri","year":"2019","journal-title":"Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis"},{"key":"ref59","first-page":"1317","article-title":"TEETHER: Gnawing at Ethereum to Automatically Exploit Smart Contracts","author":"Johannes Krupp","year":"2018","journal-title":"Proceedings of the 27th USENIX Conference on Security Symposium, SEC'18"},{"key":"ref60","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1109\/CGO.2004.1281665","article-title":"LLVM: A compilation framework for lifelong program analysis & transformation","author":"C Lattner","year":"2004","journal-title":"International Symposium on Code Generation and Optimization"},{"issue":"2","key":"ref61","doi-asserted-by":"crossref","first-page":"984","DOI":"10.1109\/TR.2022.3161634","article-title":"ReDefender: Detecting Reentrancy Vulnerabilities in Smart Contracts Automatically","volume":"71","author":"Bixin Li","year":"2022","journal-title":"IEEE Transactions on Reliability"},{"key":"ref62","first-page":"366","article-title":"A Vulnerability Detection Framework for Hyperledger Fabric Smart Contracts Based on Dynamic and Static Analysis","author":"Peiru Li","year":"2022","journal-title":"The International Conference on Evaluation and Assessment in Software Engineering 2022"},{"key":"ref63","first-page":"746","article-title":"EOSIOAnalyzer: An Effective Static Analysis Vulnerability Detection Framework for EOSIO Smart Contracts","author":"Wenyuan Li","year":"2022","journal-title":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)"},{"issue":"7","key":"ref64","article-title":"SmartFast: an accurate and robust formal analysis tool for Ethereum smart contracts","volume":"27","author":"Zhaoxuan Li","year":"2022","journal-title":"Empirical Software Engineering"},{"key":"ref65","first-page":"458","article-title":"SoliAudit: Smart Contract Vulnerability Assessment Based on Machine Learning and Fuzz Testing","author":"Jian-Wei Liao","year":"2019","journal-title":"2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS)"},{"key":"ref66","doi-asserted-by":"crossref","first-page":"752","DOI":"10.1145\/3533767.3534222","article-title":"SmartDagger: a bytecode-based static analysis approach for detecting cross-contract vulnerability","author":"Zeqin Liao","year":"2022","journal-title":"Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis"},{"key":"ref67","first-page":"65","article-title":"ReGuard: Finding Reentrancy Bugs in Smart Contracts","author":"Chao Liu","year":"2018","journal-title":"Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings"},{"key":"ref68","doi-asserted-by":"crossref","first-page":"77894","DOI":"10.1109\/ACCESS.2019.2921624","article-title":"A Survey on Security Verification of Blockchain Smart Contracts","volume":"7","author":"J Liu","year":"2019","journal-title":"IEEE Access"},{"issue":"2","key":"ref69","first-page":"1","article-title":"Combining Graph Neural Networks with Expert Knowledge for Smart Contract Vulnerability Detection","volume":"35","author":"Zhenguang Liu","year":"2021","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"ref70","first-page":"1","author":"Ning Lu","year":"2019","journal-title":"NeuCheck: A more practical Ethereum smart contract security analysis tool. Software: Practice and Experience"},{"key":"ref71","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1145\/2976749.2978309","article-title":"Making Smart Contracts Smarter","author":"Loi Luu","year":"2016","journal-title":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS '16"},{"key":"ref72","author":"Edmund M Clarke","year":"1999","journal-title":"Model Checking"},{"issue":"11","key":"ref73","doi-asserted-by":"crossref","first-page":"4380","DOI":"10.1109\/TSE.2021.3117966","article-title":"Exposing Vulnerabilities in Inter-Contract Scenarios","volume":"48","author":"Fuchen Ma","year":"2022","journal-title":"IEEE Transactions on Software Engineering"},{"key":"ref74","doi-asserted-by":"crossref","first-page":"446","DOI":"10.1007\/978-3-030-32101-7_27","article-title":"VeriSolid: Correct-by-Design Smart Contracts for Ethereum","author":"Anastasia Mavridou","year":"2019","journal-title":"Financial Cryptography and Data Security"},{"key":"ref75","first-page":"523","article-title":"Designing Secure Ethereum Smart Contracts: A Finite State Machine Based Approach","author":"Mavridou Anastasia","journal-title":"Financial Cryptography and Data Security"},{"key":"ref76","first-page":"3","volume":"978","author":"Heidelberg Springer Berlin","year":"2018","journal-title":"ISBN"},{"key":"ref77","first-page":"1","article-title":"VSCL: Automating Vulnerability Detection in Smart Contracts with Deep Learning","author":"Feng Mi","year":"2021","journal-title":"2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)"},{"key":"ref78","first-page":"1","article-title":"Machine Learning Model for Smart Contracts Security Analysis","author":"Pouyan Momeni","year":"2019","journal-title":"17th International Conference on Privacy, Security and Trust (PST)"},{"key":"ref79","first-page":"1","article-title":"Machine Learning Model for Smart Contracts Security Analysis","author":"Pouyan Momeni","year":"2019","journal-title":"17th International Conference on Privacy, Security and Trust (PST)"},{"key":"ref80","author":"J Glenford","year":"2012","journal-title":"The Art of Software Testing"},{"key":"ref81","author":"Mythx","year":"2020"},{"key":"ref82","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1007\/978-3-031-18679-0_9","article-title":"Gas Gauge: A Security Analysis Tool for Smart Contract Out-of-Gas Vulnerabilities","author":"Nassirzadeh Huaiying","year":"2023","journal-title":"Mathematical Research for Blockchain Economy"},{"key":"ref83","author":"Ncc Group","year":"2019"},{"key":"ref84","first-page":"778","article-title":"SFuzz: An Efficient Adaptive Fuzzer for Solidity Smart Contracts","author":"Long H Tai D Nguyen","year":"2020","journal-title":"Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering, ICSE '20"},{"key":"ref85","first-page":"262","author":"Hiromasa Nishida","year":"2021","journal-title":"Helmholtz: A Verifier for Tezos Smart Contracts Based on Refinement Types"},{"key":"ref86","author":"Santiago Palladino","year":"2019","journal-title":"The Parity Wallet Hack Explained. OpenZeppelin"},{"key":"ref87","first-page":"1","article-title":"Smart Contract Fuzzing Automation for Golang","volume":"9798400700644","author":"Siddhasagar Pani","year":"2023","journal-title":"16th Innovations in Software Engineering Conference"},{"key":"ref88","author":"Lei Purathani Praitheeshan","year":"2020","journal-title":"Security Analysis Methods on Ethereum Smart Contract Vulnerabilities: A Survey"},{"key":"ref89","first-page":"566","article-title":"Empirical evaluation of smart contract testing: what is the best choice?","author":"Meng Ren","year":"2021","journal-title":"Proceedings of the 30th ACM SIGSOFT International Symposium on Software Testing and Analysis"},{"key":"ref90","volume":"9837","author":"Xavier Rival","year":"2016","journal-title":"Static Analysis"},{"key":"ref91","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2019.23413","article-title":"Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks","author":"Michael Rodler","year":"2019","journal-title":"Proceedings 2019 Network and Distributed System Security Symposium"},{"key":"ref92","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-22646-9","author":"Johann M Schumann","year":"2001","journal-title":"Automated Theorem Proving in Software Engineering"},{"key":"ref93","author":"Erik Seligman","year":"2015","journal-title":"Formal Verification"},{"key":"ref94","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1109\/Blockchain55522.2022.00016","article-title":"SmartMixModel: Machine Learning-based Vulnerability Detection of Solidity Smart Contracts","author":"Supriya Shakya","year":"2022","journal-title":"2022 IEEE International Conference on Blockchain (Blockchain)"},{"key":"ref95","author":"David Siegel","year":"2016","journal-title":"Understanding The DAO Attack"},{"key":"ref96","article-title":"Blockchain Smart Contracts Formalization: Approaches and Challenges to Address Vulnerabilities","volume":"88","author":"Amritraj Singh","year":"2019","journal-title":"Computers & Security"},{"key":"ref97","author":"Kumar Sanjay","year":"2012","journal-title":"Software testing"},{"key":"ref98","author":"R Sinnema","year":"2013","journal-title":"XACML"},{"key":"ref99","first-page":"1678","article-title":"VERISMART: A Highly Precise Safety Verifier for Ethereum Smart Contracts","author":"Sunbeom So","year":"2020","journal-title":"2020 IEEE Symposium on Security and Privacy (SP)"},{"key":"ref100","first-page":"1","article-title":"Finding Tizen security bugs through wholesystem static analysis","author":"Daniel Song","year":"2015","journal-title":"Computer Science"},{"key":"ref101","doi-asserted-by":"crossref","first-page":"555","DOI":"10.1109\/SP40001.2021.00085","article-title":"SmartPulse: Automated Checking of Temporal Properties in Smart Contracts","author":"Jon Stephens","year":"2021","journal-title":"2021 IEEE Symposium on Security and Privacy (SP)"},{"key":"ref102","article-title":"ASSBert: Active and semi-supervised bert for smart contract vulnerability detection","volume":"73","author":"Xiaobing Sun","year":"2023","journal-title":"Journal of Information Security and Applications"},{"key":"ref103","article-title":"A survey on ethereum smart contract vulnerability detection using machine learning","volume":"12","author":"Onur Surucu","year":"2022","journal-title":"Disruptive Technologies in Information Sciences VI"},{"key":"ref104","author":"Melanie Swan","year":"2015"},{"issue":"5","key":"ref105","doi-asserted-by":"crossref","first-page":"4961","DOI":"10.1007\/s10489-021-02635-5","article-title":"Confidence interval for micro-averaged F1 and macro-averaged F1 scores","volume":"52","author":"Kanae Takahashi","year":"2022","journal-title":"Applied Intelligence"},{"key":"ref106","year":"2021","journal-title":"The Computing Research and Education Association of Australasia. CORE Conference Ranking"},{"key":"ref107","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1145\/3194113.3194115","article-title":"SmartCheck: Static Analysis of Ethereum Smart Contracts","author":"Sergei Tikhomirov","year":"2018","journal-title":"Proceedings of the 1st International Workshop on Emerging Trends in Software Engineering for Blockchain"},{"key":"ref108","first-page":"664","article-title":"Osiris: Hunting for Integer Bugs in Ethereum Smart Contracts","author":"Christof Ferreira","year":"2018","journal-title":"Proceedings of the 34th Annual Computer Security Applications Conference, ACSAC '18"},{"key":"ref109","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1109\/EuroSP51992.2021.00018","article-title":"ConFuzzius: A Data Dependency-Aware Hybrid Fuzzer for Smart Contracts","author":"Christof Ferreira Torres","year":"2021","journal-title":"2021 IEEE European Symposium on Security and Privacy (EuroS&P)"},{"key":"ref110","first-page":"67","article-title":"Securify: Practical Security Analysis of Smart Contracts","author":"Petar Tsankov","year":"2018","journal-title":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS '18"},{"key":"ref111","author":"Fernando Richter Vidal","year":"2022","journal-title":"Vulnerability Detection for Smart Contracts: A Systematic Literature Review -Supplementary Material"},{"key":"ref112","first-page":"1","article-title":"VULTRON: Catching Vulnerable Smart Contracts Once and for All","author":"Haijun Wang","year":"2019","journal-title":"2019 IEEE\/ACM 41st International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER)"},{"issue":"2","key":"ref113","doi-asserted-by":"crossref","first-page":"1133","DOI":"10.1109\/TNSE.2020.2968505","article-title":"ContractWard: Automated Vulnerability Detection Models for Ethereum Smart Contracts","volume":"8","author":"Wei Wang","year":"2021","journal-title":"IEEE Transactions on Network Science and Engineering"},{"issue":"2","key":"ref114","first-page":"2095","article-title":"Ethereum smart contract security research: survey and future research opportunities","volume":"15","author":"Zeli Wang","year":"2020","journal-title":"Frontiers of Computer Science"},{"key":"ref115","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1007\/978-981-16-7993-3_32","article-title":"M-A-R: A Dynamic Symbol Execution Detection Method for Smart Contract Reentry Vulnerability","author":"Wang Bin","year":"2021","journal-title":"Blockchain and Trustworthy Systems"},{"key":"ref116","first-page":"425","article-title":"Verifying Solidity Smart Contracts via Communication Abstraction in SmartACE","author":"Maria Wesley Scott","year":"2022","journal-title":"Verification, Model Checking, and Abstract Interpretation"},{"key":"ref117","first-page":"1","article-title":"Guidelines for snowballing in systematic literature studies and a replication in software engineering","author":"Claes Wohlin","year":"2014","journal-title":"Proceedings of the 18th International Conference on Evaluation and Assessment in Software Engineering -EASE '14"},{"key":"ref118","first-page":"378","article-title":"Peculiar: Smart Contract Vulnerability Detection Based on Crucial Data Flow Graph and Pre-training Techniques","author":"Hongjun Wu","year":"2021","journal-title":"2021 IEEE 32nd International Symposium on Software Reliability Engineering (ISSRE)"},{"key":"ref119","author":"Cipai Xing","year":"2020","journal-title":"A new scheme of vulnerability analysis in smart contract with machine learning. Wireless Networks"},{"key":"ref120","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1016\/j.scico.2017.06.010","article-title":"State-taint analysis for detecting resource bugs","volume":"162","author":"Zhiwu Xu","year":"2018","journal-title":"Science of Computer Programming"},{"key":"ref121","first-page":"1","author":"Yinxing Xue","year":"2022","journal-title":"Machine Learning Guided Cross-Contract Fuzzing. IEEE Transactions on Dependable and Secure Computing"},{"key":"ref122","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.IR.8202","author":"Dylan Yaga","year":"2018","journal-title":"Blockchain technology overview"},{"key":"ref123","article-title":"Vulpedia: Detecting vulnerable ethereum smart contracts via abstracted vulnerability signatures","volume":"192","author":"Jiaming Ye","year":"2022","journal-title":"Journal of Systems and Software"},{"key":"ref124","first-page":"1","article-title":"DeeSCVHunter: A Deep Learning-Based Framework for Smart Contract Vulnerability Detection","author":"Xingxin Yu","year":"2021","journal-title":"2021 International Joint Conference on Neural Networks (IJCNN)"},{"key":"ref125","doi-asserted-by":"crossref","first-page":"1742","DOI":"10.1109\/COMPSAC54236.2022.00277","article-title":"EtherGIS: A Vulnerability Detection Framework for Ethereum Smart Contracts Based on Graph Learning Features","author":"Qingren Zeng","year":"2022","journal-title":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)"},{"key":"ref126","article-title":"Smart contract vulnerability detection combined with multi-objective detection","volume":"217","author":"Lejun Zhang","year":"2022","journal-title":"Computer Networks"},{"key":"ref127","author":"Pengcheng Zhang","year":"2019","journal-title":"SolidityCheck : Quickly Detecting Smart Contract Problems Through Regular Expressions"},{"key":"ref128","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1109\/ICSME46990.2020.00023","article-title":"A Framework and DataSet for Bugs in Ethereum Smart Contracts","author":"Pengcheng Zhang","year":"2020","journal-title":"2020 IEEE International Conference on Software Maintenance and Evolution (ICSME)"},{"key":"ref129","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1109\/ICSME46990.2020.00023","article-title":"A Framework and DataSet for Bugs in Ethereum Smart Contracts","author":"Pengcheng Zhang","year":"2020","journal-title":"2020 IEEE International Conference on Software Maintenance and Evolution (ICSME)"},{"key":"ref130","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1109\/SANER48275.2020.9054822","article-title":"EthPloit: From Fuzzing to Efficient Exploit Generation against Smart Contracts","author":"Qingzhao Zhang","year":"2020","journal-title":"2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER)"},{"issue":"3","key":"ref131","article-title":"Security and Privacy on Blockchain","volume":"52","author":"Rui Zhang","year":"2019","journal-title":"ACM Comput. Surv"},{"key":"ref132","doi-asserted-by":"crossref","first-page":"616","DOI":"10.1109\/QRS57517.2022.00068","article-title":"Multi-Transaction Sequence Vulnerability Detection for Smart Contracts based on Inter-Path Data Dependency","author":"Shuai Zhang","year":"2022","journal-title":"2022 IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS)"},{"key":"ref133","first-page":"1","article-title":"Reentrancy Vulnerability Detection and Localization: A Deep Learning Based Two-phase Approach","author":"Zhuo Zhang","year":"2022","journal-title":"Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering"},{"key":"ref134","doi-asserted-by":"crossref","DOI":"10.1007\/978-981-15-6218-1","author":"Gavin Zheng","year":"2021","journal-title":"Ethereum Smart Contract Development in Solidity"},{"issue":"24","key":"ref135","doi-asserted-by":"crossref","first-page":"24695","DOI":"10.1109\/JIOT.2022.3196269","article-title":"Vulnerability Analysis of Smart Contract for Blockchain-Based IoT Applications: A Machine Learning Approach","volume":"9","author":"Qihao Zhou","year":"2022","journal-title":"IEEE Internet of Things Journal"},{"key":"ref136","first-page":"3283","article-title":"International Joint Conferences on Artificial Intelligence Organization","author":"Yuan Zhuang","year":"2020","journal-title":"Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence"},{"key":"ref137","article-title":"Fernando has been publishing at international conferences, addressing some of his findings of blockchain technology, such as vulnerabilities in smart contracts and revocation. In addition, Fernando was invited by the Advances in Science, Technology and Engineering Systems Journal (ASTESJ) magazine and IEEE Potentials to be one of the reviewers of the blockchain submissions. Fernando has applied his acquired knowledge, helping companies implement blockchain technology through consulting. Naghmeh Ivaki received the Ph.D. degree from the University of Coimbra, Portugal. Currently, she is an assistant professor and a full member of the Software and Systems Engineering Group (SSE) of the","author":"Weiqin Zou","year":"2019","journal-title":"International Symposium on Software Reliability Engineering and the Dependable and Secure Services Workshop\/Track (as main chair) jointly organized with the IEEE World Congress on Services. He participated in international research projects"}],"container-title":[],"original-title":[],"deposited":{"date-parts":[[2023,7,15]],"date-time":"2023-07-15T16:52:35Z","timestamp":1689439955000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.ssrn.com\/abstract=4511778"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":137,"URL":"https:\/\/doi.org\/10.2139\/ssrn.4511778","relation":{},"subject":[],"published":{"date-parts":[[2023]]},"subtype":"preprint"}}