{"id":"https://openalex.org/W4407639457","doi":"https://doi.org/10.1109/acit62805.2024.10877189","title":"Smart Contract Security Vulnerability Through The NIST Cybersecurity Framework 2.0 Perspective","display_name":"Smart Contract Security Vulnerability Through The NIST Cybersecurity Framework 2.0 Perspective","publication_year":2024,"publication_date":"2024-12-10","ids":{"openalex":"https://openalex.org/W4407639457","doi":"https://doi.org/10.1109/acit62805.2024.10877189"},"language":"en","primary_location":{"id":"doi:10.1109/acit62805.2024.10877189","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit62805.2024.10877189","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 25th International Arab Conference on Information Technology (ACIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5093078832","display_name":"Charles Gomarga","orcid":null},"institutions":[{"id":"https://openalex.org/I166073570","display_name":"Binus University","ror":"https://ror.org/03zmf4s77","country_code":"ID","type":"education","lineage":["https://openalex.org/I166073570"]}],"countries":["ID"],"is_corresponding":true,"raw_author_name":"Charles Gomarga","raw_affiliation_strings":["Bina Nusantara University,School of Information Systems,Information Systems Department,Jakarta,Indonesia,11480"],"affiliations":[{"raw_affiliation_string":"Bina Nusantara University,School of Information Systems,Information Systems Department,Jakarta,Indonesia,11480","institution_ids":["https://openalex.org/I166073570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5116296063","display_name":"Gregorius Jason Winata","orcid":null},"institutions":[{"id":"https://openalex.org/I166073570","display_name":"Binus University","ror":"https://ror.org/03zmf4s77","country_code":"ID","type":"education","lineage":["https://openalex.org/I166073570"]}],"countries":["ID"],"is_corresponding":false,"raw_author_name":"Gregorius Jason Winata","raw_affiliation_strings":["Bina Nusantara University,School of Information Systems,Information Systems Department,Jakarta,Indonesia,11480"],"affiliations":[{"raw_affiliation_string":"Bina Nusantara University,School of Information Systems,Information Systems Department,Jakarta,Indonesia,11480","institution_ids":["https://openalex.org/I166073570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5116296064","display_name":"Joshiah Elroi Thungriallu","orcid":null},"institutions":[{"id":"https://openalex.org/I166073570","display_name":"Binus University","ror":"https://ror.org/03zmf4s77","country_code":"ID","type":"education","lineage":["https://openalex.org/I166073570"]}],"countries":["ID"],"is_corresponding":false,"raw_author_name":"Joshiah Elroi Thungriallu","raw_affiliation_strings":["Bina Nusantara University,School of Information Systems,Information Systems Department,Jakarta,Indonesia,11480"],"affiliations":[{"raw_affiliation_string":"Bina Nusantara University,School of Information Systems,Information Systems Department,Jakarta,Indonesia,11480","institution_ids":["https://openalex.org/I166073570"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5115395488","display_name":"Richard Wiputra","orcid":null},"institutions":[{"id":"https://openalex.org/I166073570","display_name":"Binus University","ror":"https://ror.org/03zmf4s77","country_code":"ID","type":"education","lineage":["https://openalex.org/I166073570"]}],"countries":["ID"],"is_corresponding":false,"raw_author_name":"Richard Wiputra","raw_affiliation_strings":["Bina Nusantara University,School of Information Systems,Information Systems Department,Jakarta,Indonesia,11480"],"affiliations":[{"raw_affiliation_string":"Bina Nusantara University,School of Information Systems,Information Systems Department,Jakarta,Indonesia,11480","institution_ids":["https://openalex.org/I166073570"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5093078832"],"corresponding_institution_ids":["https://openalex.org/I166073570"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.44036066,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9075999855995178,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9075999855995178,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.9233804941177368},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7876821756362915},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.7352815270423889},{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.6216241121292114},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.5881096720695496},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5696906447410583}],"concepts":[{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.9233804941177368},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7876821756362915},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.7352815270423889},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.6216241121292114},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.5881096720695496},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5696906447410583},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/acit62805.2024.10877189","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit62805.2024.10877189","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 25th International Arab Conference on Information Technology (ACIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":50,"referenced_works":["https://openalex.org/W2293230997","https://openalex.org/W2795144752","https://openalex.org/W2888393465","https://openalex.org/W2897525439","https://openalex.org/W2922265937","https://openalex.org/W2954845633","https://openalex.org/W2968356974","https://openalex.org/W2975871742","https://openalex.org/W2979467439","https://openalex.org/W2981038883","https://openalex.org/W2982433869","https://openalex.org/W3005065812","https://openalex.org/W3014792488","https://openalex.org/W3015325345","https://openalex.org/W3021325397","https://openalex.org/W3026315212","https://openalex.org/W3034136313","https://openalex.org/W3112533106","https://openalex.org/W3132968002","https://openalex.org/W3165214486","https://openalex.org/W3167294861","https://openalex.org/W3177186237","https://openalex.org/W3189699165","https://openalex.org/W3195472360","https://openalex.org/W3210206069","https://openalex.org/W4224131832","https://openalex.org/W4293545213","https://openalex.org/W4294310925","https://openalex.org/W4372343028","https://openalex.org/W4381684496","https://openalex.org/W4384155757","https://openalex.org/W4385194706","https://openalex.org/W4385258765","https://openalex.org/W4385562826","https://openalex.org/W4387687567","https://openalex.org/W4388924693","https://openalex.org/W4390578272","https://openalex.org/W4391315865","https://openalex.org/W4391979647","https://openalex.org/W4394769342","https://openalex.org/W4396819965","https://openalex.org/W4398165744","https://openalex.org/W4399391369","https://openalex.org/W4399915732","https://openalex.org/W4400023201","https://openalex.org/W4400484589","https://openalex.org/W4400582940","https://openalex.org/W4400583113","https://openalex.org/W4401769547","https://openalex.org/W6869789601"],"related_works":["https://openalex.org/W1883246888","https://openalex.org/W2370114625","https://openalex.org/W1756374135","https://openalex.org/W2062873522","https://openalex.org/W2947584067","https://openalex.org/W2280562859","https://openalex.org/W230721595","https://openalex.org/W3157230915","https://openalex.org/W1496728123","https://openalex.org/W2789975780"],"abstract_inverted_index":{"The":[0],"invention":[1],"of":[2,56,98,112],"the":[3,8,24,57,62,73,91,96,110,113,123],"smart":[4,104],"contract":[5],"has":[6],"advanced":[7],"transaction":[9],"system":[10],"due":[11],"to":[12,37,108,121],"its":[13],"transparency":[14],"and":[15,31,83],"immutability.":[16],"However,":[17],"it":[18],"also":[19],"raised":[20],"many":[21],"concerns":[22],"when":[23],"source":[25],"code":[26],"was":[27],"vulnerable.":[28],"Many":[29],"detection":[30],"repair":[32],"tools":[33],"have":[34],"been":[35],"developed":[36],"tackle":[38],"these":[39],"issues,":[40],"yet":[41],"they":[42],"must":[43],"still":[44],"be":[45,81],"appropriately":[46],"standardized.":[47],"This":[48,93],"paper":[49,94,117],"created":[50],"a":[51,103],"security":[52],"procedure,":[53],"adapting":[54],"one":[55],"most":[58],"trustworthy":[59],"cybersecurity":[60],"standards,":[61],"NIST":[63,86,99],"Cybersecurity":[64],"Framework":[65],"2.0.":[66],"There":[67],"are":[68],"38":[69],"reviewed":[70],"studies":[71],"through":[72],"Systematic":[74],"Literature":[75],"Review":[76],"(SLR)":[77],"protocol,":[78],"which":[79],"will":[80],"arranged":[82],"classified":[84],"with":[85],"CSF":[87,100],"2.0":[88,101],"functions":[89],"as":[90,102],"output.":[92],"suggested":[95],"application":[97],"contracts":[105],"development":[106],"standard":[107],"ensure":[109],"robustness":[111],"contract.":[114],"Moreover,":[115],"this":[116],"provides":[118],"future":[119],"work":[120],"enhance":[122],"approaches'":[124],"scalability":[125],"in":[126],"discovering":[127],"new":[128],"threat":[129],"or":[130],"attack":[131],"patterns.":[132]},"counts_by_year":[],"updated_date":"2025-12-22T23:10:17.713674","created_date":"2025-10-10T00:00:00"}
