{"id":"https://openalex.org/W7127947839","doi":"https://doi.org/10.1007/s10207-026-01208-2","title":"In the webs of ethereum: analyzing smart contracts vulnerabilities","display_name":"In the webs of ethereum: analyzing smart contracts vulnerabilities","publication_year":2026,"publication_date":"2026-02-05","ids":{"openalex":"https://openalex.org/W7127947839","doi":"https://doi.org/10.1007/s10207-026-01208-2"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-026-01208-2","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-026-01208-2","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-026-01208-2.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10207-026-01208-2.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014882973","display_name":"Vaios Bolgouras","orcid":"https://orcid.org/0000-0002-4934-7625"},"institutions":[{"id":"https://openalex.org/I154757721","display_name":"University of Piraeus","ror":"https://ror.org/02qs84g94","country_code":"GR","type":"education","lineage":["https://openalex.org/I154757721"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Vaios Bolgouras","raw_affiliation_strings":["Department of Digital Systems, University of Piraeus, Piraeus, Greece"],"affiliations":[{"raw_affiliation_string":"Department of Digital Systems, University of Piraeus, Piraeus, Greece","institution_ids":["https://openalex.org/I154757721"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125101673","display_name":"Vasilis Magkoutis","orcid":null},"institutions":[{"id":"https://openalex.org/I154757721","display_name":"University of Piraeus","ror":"https://ror.org/02qs84g94","country_code":"GR","type":"education","lineage":["https://openalex.org/I154757721"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Vasilis Magkoutis","raw_affiliation_strings":["Department of Digital Systems, University of Piraeus, Piraeus, Greece"],"affiliations":[{"raw_affiliation_string":"Department of Digital Systems, University of Piraeus, Piraeus, Greece","institution_ids":["https://openalex.org/I154757721"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065154871","display_name":"Apostolis Zarras","orcid":"https://orcid.org/0000-0002-8480-6989"},"institutions":[{"id":"https://openalex.org/I154757721","display_name":"University of Piraeus","ror":"https://ror.org/02qs84g94","country_code":"GR","type":"education","lineage":["https://openalex.org/I154757721"]},{"id":"https://openalex.org/I8901234","display_name":"Foundation for Research and Technology Hellas","ror":"https://ror.org/052rphn09","country_code":"GR","type":"facility","lineage":["https://openalex.org/I8901234"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Apostolis Zarras","raw_affiliation_strings":["Department of Digital Systems, University of Piraeus, Piraeus, Greece","Foundation for Research and Technology \u2013 Hellas, Heraklion, Greece"],"affiliations":[{"raw_affiliation_string":"Department of Digital Systems, University of Piraeus, Piraeus, Greece","institution_ids":["https://openalex.org/I154757721"]},{"raw_affiliation_string":"Foundation for Research and Technology \u2013 Hellas, Heraklion, Greece","institution_ids":["https://openalex.org/I8901234"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077018501","display_name":"Aristeidis Farao","orcid":"https://orcid.org/0000-0001-6954-0791"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Aristeidis Farao","raw_affiliation_strings":["InQbit Innovations SRL., Bucharest, Romania"],"affiliations":[{"raw_affiliation_string":"InQbit Innovations SRL., Bucharest, Romania","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032247032","display_name":"Christos Xenakis","orcid":"https://orcid.org/0000-0001-6718-122X"},"institutions":[{"id":"https://openalex.org/I154757721","display_name":"University of Piraeus","ror":"https://ror.org/02qs84g94","country_code":"GR","type":"education","lineage":["https://openalex.org/I154757721"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Christos Xenakis","raw_affiliation_strings":["Department of Digital Systems, University of Piraeus, Piraeus, Greece","InQbit Innovations SRL., Bucharest, Romania"],"affiliations":[{"raw_affiliation_string":"Department of Digital Systems, University of Piraeus, Piraeus, Greece","institution_ids":["https://openalex.org/I154757721"]},{"raw_affiliation_string":"InQbit Innovations SRL., Bucharest, Romania","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5014882973"],"corresponding_institution_ids":["https://openalex.org/I154757721"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":{"value":2590,"currency":"EUR","value_usd":3190},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.20703215,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"25","issue":"2","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.6211000084877014,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.6211000084877014,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.1437000036239624,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.03009999915957451,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/smart-contract","display_name":"Smart contract","score":0.6377999782562256},{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.6276000142097473},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.4675000011920929},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.44780001044273376},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.41990000009536743},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.41499999165534973},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.36070001125335693},{"id":"https://openalex.org/keywords/security-bug","display_name":"Security bug","score":0.33320000767707825}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.815500020980835},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6962000131607056},{"id":"https://openalex.org/C2779950589","wikidata":"https://www.wikidata.org/wiki/Q7544035","display_name":"Smart contract","level":3,"score":0.6377999782562256},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.6276000142097473},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.4675000011920929},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.44780001044273376},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.41990000009536743},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.41499999165534973},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.36070001125335693},{"id":"https://openalex.org/C131275738","wikidata":"https://www.wikidata.org/wiki/Q7445023","display_name":"Security bug","level":5,"score":0.33320000767707825},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3249000012874603},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3197999894618988},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.3188999891281128},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.3179999887943268},{"id":"https://openalex.org/C153876917","wikidata":"https://www.wikidata.org/wiki/Q899704","display_name":"Traceability","level":2,"score":0.31360000371932983},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.30239999294281006},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.2773999869823456},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.274399995803833},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.2558000087738037},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.25119999051094055}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s10207-026-01208-2","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-026-01208-2","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-026-01208-2.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1007/s10207-026-01208-2","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-026-01208-2","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-026-01208-2.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.5652355551719666,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[{"id":"https://openalex.org/G2354339008","display_name":null,"funder_award_id":"101070214","funder_id":"https://openalex.org/F4320334322","funder_display_name":"HORIZON EUROPE Framework Programme"},{"id":"https://openalex.org/G3190273601","display_name":null,"funder_award_id":"101070214","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G577175092","display_name":"A Smart and Adaptive Framework for Enhancing Trust in 6G Networks","funder_award_id":"101139031","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G616641769","display_name":null,"funder_award_id":"101092702","funder_id":"https://openalex.org/F4320334322","funder_display_name":"HORIZON EUROPE Framework Programme"},{"id":"https://openalex.org/G6175175082","display_name":null,"funder_award_id":"101092702","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G8318064016","display_name":null,"funder_award_id":"Horizon","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"},{"id":"https://openalex.org/F4320334322","display_name":"HORIZON EUROPE Framework Programme","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7127947839.pdf","grobid_xml":"https://content.openalex.org/works/W7127947839.grobid-xml"},"referenced_works_count":15,"referenced_works":["https://openalex.org/W2392113277","https://openalex.org/W2539190473","https://openalex.org/W2805827286","https://openalex.org/W2897914171","https://openalex.org/W2908007588","https://openalex.org/W2963610883","https://openalex.org/W2995871203","https://openalex.org/W3035733952","https://openalex.org/W3170487895","https://openalex.org/W3176695921","https://openalex.org/W4206573979","https://openalex.org/W4281681780","https://openalex.org/W4307821785","https://openalex.org/W4318830530","https://openalex.org/W4324007147"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"Ensuring":[1],"the":[2,11,37,47,55,67,77,105,117,124,132,145],"security":[3,120,142],"of":[4,15,29,66,119,126,134],"smart":[5,44,71,83,102,147],"contracts":[6,45],"is":[7,33],"essential":[8],"for":[9,89,107],"maintaining":[10],"reliability":[12],"and":[13,81,122],"trustworthiness":[14],"decentralized":[16],"applications,":[17],"which":[18,85],"are":[19],"deployed":[20,101],"across":[21,99],"various":[22,92],"domains,":[23],"including":[24],"industrial":[25],"applications.":[26],"In":[27,58],"pursuit":[28],"this":[30,59],"goal,":[31],"it":[32],"imperative":[34],"to":[35,52,140],"analyze":[36],"common":[38],"errors":[39],"developers":[40],"make":[41],"when":[42],"crafting":[43],"on":[46],"infrastructure":[48],"that":[49],"gave":[50],"birth":[51],"them,":[53],"i.e.,":[54],"Ethereum":[56,70,79,146],"blockchain.":[57],"paper,":[60],"we":[61,86],"present":[62],"a":[63],"comprehensive":[64],"analysis":[65,112],"vulnerabilities":[68,90,98],"in":[69],"contracts.":[72],"Our":[73],"methodology":[74],"involves":[75],"downloading":[76],"entire":[78],"blockchain":[80],"identifying":[82],"contracts,":[84,103],"then":[87],"scan":[88],"using":[91],"tools.":[93],"We":[94],"have":[95],"discovered":[96],"numerous":[97],"many":[100],"highlighting":[104],"need":[106],"improved":[108],"development":[109,128],"practices.":[110],"This":[111],"provides":[113],"critical":[114],"insights":[115],"into":[116],"prevalence":[118],"issues":[121],"underscores":[123],"urgency":[125],"raising":[127],"standards.":[129],"By":[130],"promoting":[131],"adoption":[133],"secure-by-design":[135],"principles,":[136],"our":[137],"research":[138],"seeks":[139],"enhance":[141],"standards":[143],"within":[144],"contract":[148],"ecosystem.":[149]},"counts_by_year":[],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2026-02-07T00:00:00"}
