{"id":"https://openalex.org/W7084158924","doi":"https://doi.org/10.1109/infocom55648.2025.11044590","title":"ConWatcher: Towards Adaptive and Label-Efficient Online Smart Contract Analysis in Blockchains","display_name":"ConWatcher: Towards Adaptive and Label-Efficient Online Smart Contract Analysis in Blockchains","publication_year":2025,"publication_date":"2025-05-19","ids":{"openalex":"https://openalex.org/W7084158924","doi":"https://doi.org/10.1109/infocom55648.2025.11044590"},"language":"en","primary_location":{"id":"doi:10.1109/infocom55648.2025.11044590","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocom55648.2025.11044590","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2025 - IEEE Conference on Computer Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Qinnan Hu","orcid":null},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qinnan Hu","raw_affiliation_strings":["School of Cyber Science and Engineering, Xi&#x0027;an Jiaotong University,Xi&#x0027;an,China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Xi&#x0027;an Jiaotong University,Xi&#x0027;an,China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yuntao Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuntao Wang","raw_affiliation_strings":["School of Cyber Science and Engineering, Xi&#x0027;an Jiaotong University,Xi&#x0027;an,China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Xi&#x0027;an Jiaotong University,Xi&#x0027;an,China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Zhou Su","orcid":null},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhou Su","raw_affiliation_strings":["School of Cyber Science and Engineering, Xi&#x0027;an Jiaotong University,Xi&#x0027;an,China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Xi&#x0027;an Jiaotong University,Xi&#x0027;an,China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Tom H. Luan","orcid":null},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tom H. Luan","raw_affiliation_strings":["School of Cyber Science and Engineering, Xi&#x0027;an Jiaotong University,Xi&#x0027;an,China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Xi&#x0027;an Jiaotong University,Xi&#x0027;an,China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"last","author":{"id":null,"display_name":"Ruidong Li","orcid":null},"institutions":[{"id":"https://openalex.org/I10091056","display_name":"Kanazawa University","ror":"https://ror.org/02hwp6a56","country_code":"JP","type":"education","lineage":["https://openalex.org/I10091056"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Ruidong Li","raw_affiliation_strings":["Institute of Science and Engineering, Kanazawa University,Japan"],"affiliations":[{"raw_affiliation_string":"Institute of Science and Engineering, Kanazawa University,Japan","institution_ids":["https://openalex.org/I10091056"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I87445476"],"apc_list":null,"apc_paid":null,"fwci":3.4811,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.93657556,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T11662","display_name":"Legal Cases and Commentary","score":0.028699999675154686,"subfield":{"id":"https://openalex.org/subfields/2743","display_name":"Reproductive Medicine"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}},"topics":[{"id":"https://openalex.org/T11662","display_name":"Legal Cases and Commentary","score":0.028699999675154686,"subfield":{"id":"https://openalex.org/subfields/2743","display_name":"Reproductive Medicine"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}},{"id":"https://openalex.org/T13713","display_name":"Diverse Perspectives in Modern Studies","score":0.018400000408291817,"subfield":{"id":"https://openalex.org/subfields/2002","display_name":"Economics and Econometrics"},"field":{"id":"https://openalex.org/fields/20","display_name":"Economics, Econometrics and Finance"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5008000135421753},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.47269999980926514},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.4196000099182129},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.38999998569488525},{"id":"https://openalex.org/keywords/noise-reduction","display_name":"Noise reduction","score":0.36800000071525574},{"id":"https://openalex.org/keywords/control-flow","display_name":"Control flow","score":0.3472000062465668},{"id":"https://openalex.org/keywords/mainstream","display_name":"Mainstream","score":0.3237000107765198},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.3212999999523163}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7692000269889832},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5256999731063843},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5008000135421753},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.47269999980926514},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.4196000099182129},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.38999998569488525},{"id":"https://openalex.org/C163294075","wikidata":"https://www.wikidata.org/wiki/Q581861","display_name":"Noise reduction","level":2,"score":0.36800000071525574},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3481000065803528},{"id":"https://openalex.org/C160191386","wikidata":"https://www.wikidata.org/wiki/Q868299","display_name":"Control flow","level":2,"score":0.3472000062465668},{"id":"https://openalex.org/C2777617010","wikidata":"https://www.wikidata.org/wiki/Q18957","display_name":"Mainstream","level":2,"score":0.3237000107765198},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.3212999999523163},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3118000030517578},{"id":"https://openalex.org/C102379954","wikidata":"https://www.wikidata.org/wiki/Q2589940","display_name":"Call graph","level":2,"score":0.2953999936580658},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.29420000314712524},{"id":"https://openalex.org/C167981075","wikidata":"https://www.wikidata.org/wiki/Q2667186","display_name":"Sandbox (software development)","level":2,"score":0.2768999934196472},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.27309998869895935},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.26649999618530273},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.2621000111103058},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.2605000138282776},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.25220000743865967},{"id":"https://openalex.org/C120936955","wikidata":"https://www.wikidata.org/wiki/Q2155640","display_name":"Empirical research","level":2,"score":0.2508000135421753}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/infocom55648.2025.11044590","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocom55648.2025.11044590","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2025 - IEEE Conference on Computer Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Due":[0],"to":[1,51,81,100,135,154,194],"the":[2,12,65,89,150],"immutable":[3],"nature":[4],"of":[5,30,244,249,254],"smart":[6],"contracts,":[7],"online":[8,23,46],"contract":[9,47,139,179,202,216],"analysis":[10,48,180],"is":[11],"only":[13],"viable":[14],"approach":[15],"for":[16,215],"revealing":[17],"vulnerabilities":[18,96],"in":[19,28,73,115],"deployed":[20],"contracts.":[21],"Existing":[22],"approaches":[24],"face":[25],"significant":[26],"challenges":[27],"terms":[29],"efficiency,":[31,239],"adaptability,":[32,236],"and":[33,44,105,125,157,189,197,230,237],"reliance":[34,59],"on":[35,60,212,222],"vulnerability":[36,61,111],"labels.":[37,62,112],"This":[38],"paper":[39],"proposes":[40],"ConWatcher,":[41],"an":[42,177,241],"adaptive":[43,178],"label-efficient":[45,208],"framework":[49],"capable":[50],"detect":[52,106],"yet-unknown":[53,74,107],"attacks":[54,75,108,250],"under":[55],"evolving":[56],"tactics":[57,70],"without":[58,109,251],"ConWatcher":[63,113],"simulates":[64],"Advanced":[66],"Persistent":[67],"Threat":[68],"(APT)":[69],"commonly":[71],"used":[72],"by":[76,93],"continuously":[77],"applying":[78],"minor":[79,156],"perturbations":[80],"legitimate":[82],"interaction":[83,119],"behaviors.":[84,143],"It":[85],"then":[86],"reversely":[87],"learns":[88],"denoising":[90,165,171],"process,":[91],"guided":[92],"potential":[94],"logic":[95],"(i.e.,":[97],"functionality":[98,173,199],"dependencies),":[99],"adaptively":[101],"identify":[102],"stealthy":[103],"anomalies":[104],"needing":[110],"proceeds":[114],"four":[116],"steps.":[117],"First,":[118],"behavior":[120],"modeling.":[121],"Via":[122],"bytecode-level,":[123],"account-level,":[124],"revenue-level":[126],"modeling,":[127],"we":[128,175],"propose":[129],"behavior-aware":[130],"multivariate":[131],"time":[132],"series":[133],"model":[134,153],"accurately":[136],"represent":[137],"long-term":[138],"interactions":[140],"with":[141,161,183,240],"multi-faceted":[142],"Second,":[144],"APT-like":[145,159],"noise":[146],"adding.":[147],"We":[148,205],"leverage":[149],"forward":[151],"diffusion":[152],"produce":[155],"stochastic":[158],"noises":[160],"efficiency.":[162],"Third,":[163],"reverse":[164,170],"learning.":[166],"To":[167],"effectively":[168],"guide":[169],"using":[172],"dependencies,":[174],"devise":[176],"engine":[181],"equipped":[182],"heterogeneous":[184,190],"control":[185],"flow":[186],"graph":[187],"modeling":[188],"message":[191],"passing":[192],"mechanisms":[193],"extract":[195],"function-level":[196],"bytecode-level":[198],"dependencies.":[200],"Last,":[201],"anomaly":[203,217],"detection.":[204,218],"design":[206],"a":[207,223],"attack":[209],"detector":[210],"based":[211],"reconstruction":[213],"error":[214],"Extensive":[219],"empirical":[220],"validations":[221],"manually":[224],"constructed":[225],"dataset,":[226],"covering":[227],"both":[228],"mainstream":[229],"novel":[231],"vulnerabilities,":[232],"demonstrate":[233],"ConWatcher's":[234],"effectiveness,":[235],"label":[238],"average":[242],"F1-score":[243],"0.88":[245],"across":[246],"all":[247],"types":[248],"prior":[252],"knowledge":[253],"corresponding":[255],"vulnerabilities.":[256]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2026-03-25T14:56:36.534964","created_date":"2025-10-10T00:00:00"}
