{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:10:19Z","timestamp":1763341819848,"version":"3.45.0"},"reference-count":32,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.061455","type":"journal-article","created":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T03:04:46Z","timestamp":1740020686000},"page":"2207-2220","source":"Crossref","is-referenced-by-count":0,"title":["GMS: A Novel Method for Detecting Reentrancy Vulnerabilities in Smart Contracts"],"prefix":"10.32604","volume":"83","author":[{"given":"Dawei","family":"Xu","sequence":"first","affiliation":[]},{"given":"Fan","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Jiaxin","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yunfang","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Baokun","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5210\/fm.v2i9.548","article-title":"Formalizing and securing relationships on public networks","volume":"2","author":"Szabo","year":"1997","journal-title":"First Monday"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"12012","DOI":"10.1109\/JIOT.2022.3142786","article-title":"Toward secure data sharing for the IoT devices with limited resources: a smart contract-based quality-driven incentive mechanism","volume":"10","author":"Zhang","year":"2023","journal-title":"IEEE Internet Things J"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"106573","DOI":"10.1016\/j.compag.2021.106573","article-title":"Optimal smart contract for autonomous greenhouse environment based on IoT blockchain network in agriculture","volume":"192","author":"Jamil","year":"2022","journal-title":"Comput Electron Agric"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/j.jnca.2018.10.020","article-title":"A survey on privacy protection in blockchain system","volume":"126","author":"Feng","year":"2019","journal-title":"J Netw Comput Appl"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"3439","DOI":"10.1109\/TDSC.2023.3330171","article-title":"NANO: cryptographic enforcement of readability and editability governance in blockchain databases","volume":"21","author":"Zhang","year":"2024","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref6","unstructured":"Defillama. Total Value Hacked. [cited 2024 Dec 26]. Available from: https:\/\/defillama.com\/hacks."},{"key":"ref7","doi-asserted-by":"crossref","first-page":"19","DOI":"10.4018\/JCIT.2019010102","article-title":"Understanding a revolutionary and flawed grand experiment in blockchain","volume":"21","author":"Mehar","year":"2019","journal-title":"J Cases Inf Technol"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4842-6534-5","author":"Dhillon","year":"2021","journal-title":"Blockchain enabled applications: understand the blockchain ecosystem and how to make it work for you"},{"key":"ref9","series-title":"2023 IEEE\/ACM 45th International Conference on Software Engineering (ICSE)","first-page":"295","article-title":"Turn the rudder: a beacon of reentrancy detection for smart contracts on ethereum","author":"Zheng","year":"2023"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"4245","DOI":"10.1109\/TDSC.2022.3208706","article-title":"Achieving efficient and privacy-preserving neural network training and prediction in cloud environments","volume":"20","author":"Zhang","year":"2023","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"3476","DOI":"10.1109\/TIFS.2023.3283104","article-title":"Achieving privacy-preserving and verifiable support vector machine training in the cloud","volume":"18","author":"Hu","year":"2023","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"175","DOI":"10.54097\/hset.v41i.6804","article-title":"Ethereum: introduction, expectation, and implementation","volume":"41","author":"Huang","year":"2023","journal-title":"Highlights Sci Eng Technol"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"2051","DOI":"10.1109\/TC.2024.3398509","article-title":"FutureDID: a fully decentralized identity system with multi-party verification","volume":"73","author":"Deng","year":"2024","journal-title":"IEEE Trans Comput"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"963","DOI":"10.1109\/JSAC.2023.3345392","article-title":"Privacy-preserving identity-based data rights governance for blockchain-empowered human-centric metaverse communications","volume":"42","author":"Zhang","year":"2024","journal-title":"IEEE J Sel Areas Commun"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"e2133","DOI":"10.1002\/nem.2133","article-title":"Editorial for special issue on challenges and opportunities of Blockchain and Cryptocurrency","volume":"30","author":"Ju","year":"2020","journal-title":"Int J Netw Manag"},{"key":"ref16","article-title":"Beigepaper: an ethereum technical specification","author":"Dameron","year":"2018 Feb","journal-title":"Ethereum project beige paper"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"47159","DOI":"10.1109\/ACCESS.2023.3267277","article-title":"EVMTracer: dynamic analysis of the parallelization and redundancy potential in the ethereum virtual machine","volume":"11","author":"Hu","year":"2023","journal-title":"IEEE Access"},{"key":"ref18","series-title":"4th International Conference on Blockchain Economics, Security and Protocols (Tokenomics 2022)","article-title":"1DLT: rapid deployment of secure and efficient EVM-based blockchains","author":"Bottoni","year":"2022 Dec 12\u201313"},{"key":"ref19","unstructured":"Szabo N. Smart contracts: building blocks for digital markets; 1996 [cited 2024 Dec 26]. Available from: https:\/\/www.fon.hum.uva.nl\/rob\/Courses\/InformationInSpeech\/CDROM\/Literature\/LOTwinterschool2006\/szabo.best.vwh.net\/smart_contracts_2.html."},{"key":"ref20","doi-asserted-by":"crossref","first-page":"78194","DOI":"10.1109\/ACCESS.2019.2921936","article-title":"A massive analysis of ethereum smart contracts empirical study and code metrics","volume":"7","author":"Pinna","year":"2019","journal-title":"IEEE Access"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"2292","DOI":"10.1109\/ACCESS.2016.2566339","article-title":"Blockchains and smart contracts for the Internet of Things","volume":"4","author":"Christidis","year":"2016","journal-title":"IEEE Access"},{"key":"ref22","series-title":"Proceedings of the 27th USENIX Security Symposium","first-page":"1353","article-title":"Arbitrum: scalable, private smart contracts","author":"Kalodner","year":"2018 Aug 15\u201317"},{"key":"ref23","series-title":"Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence","first-page":"3283","article-title":"Smart contract vulnerability detection using graph neural network","author":"Zhuang","year":"2020 Jul 11\u201317"},{"key":"ref24","unstructured":"Veli\u010dkovi\u0107 P, Cucurull G, Casanova A, Romero A, Li\u00f2 P, Bengio Y. Graph attention networks. arXiv.1710.10903. 2017."},{"key":"ref25","series-title":"2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"7132","article-title":"Squeeze-and-excitation networks","author":"Hu","year":"2018 Jun 18\u201323"},{"key":"ref26","first-page":"1296","article-title":"Combining graph neural networks with expert knowledge for smart contract vulnerability detection","volume":"35","author":"Liu","year":"2023","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"ref27","series-title":"International Joint Conference on Artificial Intelligence","first-page":"2751","article-title":"Smart contract vulnerability detection: from pure neural network to interpretable graph feature and expert pattern fusion","author":"Liu","year":"2022"},{"key":"ref28","series-title":"Proceedings of the 1st International Workshop on Emerging Trends in Software Engineering for Blockchain","first-page":"9","article-title":"SmartCheck: static analysis of ethereum smart contracts","author":"Tikhomirov","year":"2018"},{"key":"ref29","series-title":"ICSE\u201918: 40th International Conference on Software Engineering","first-page":"254","article-title":"Making smart contracts smarter","author":"Luu","year":"2018"},{"key":"ref30","unstructured":"Mueller B. A framework for bug hunting on the ethereum blockchain. arXiv.2009.02066. 2017."},{"key":"ref31","series-title":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","first-page":"67","article-title":"Securify: practical security analysis of smart contracts","author":"Tsankov","year":"2018"},{"key":"ref32","series-title":"2019 IEEE\/ACM 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB)","first-page":"8","article-title":"Slither: a static analysis framework for smart contracts","author":"Feist","year":"2019 May 27"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-2\/TSP_CMC_61455\/TSP_CMC_61455.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:06:46Z","timestamp":1763341606000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n2\/60555"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":32,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.061455","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]}}}