{"id":"https://openalex.org/W4414956263","doi":"https://doi.org/10.1109/tse.2025.3618123","title":"Do Automated Fixes Truly Mitigate Smart Contract Exploits?","display_name":"Do Automated Fixes Truly Mitigate Smart Contract Exploits?","publication_year":2025,"publication_date":"2025-10-08","ids":{"openalex":"https://openalex.org/W4414956263","doi":"https://doi.org/10.1109/tse.2025.3618123"},"language":"en","primary_location":{"id":"doi:10.1109/tse.2025.3618123","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tse.2025.3618123","pdf_url":null,"source":{"id":"https://openalex.org/S8351582","display_name":"IEEE Transactions on Software Engineering","issn_l":"0098-5589","issn":["0098-5589","1939-3520","2326-3881"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Software Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1109/tse.2025.3618123","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050065507","display_name":"Sofia Bobadilla","orcid":"https://orcid.org/0000-0003-3116-3278"},"institutions":[{"id":"https://openalex.org/I86987016","display_name":"KTH Royal Institute of Technology","ror":"https://ror.org/026vcq606","country_code":"SE","type":"education","lineage":["https://openalex.org/I86987016"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Sofia Bobadilla","raw_affiliation_strings":["KTH Royal Institute of Technology, Stockholm, Sweden","KTH Royal Institute of Technology"],"raw_orcid":"https://orcid.org/0000-0003-3116-3278","affiliations":[{"raw_affiliation_string":"KTH Royal Institute of Technology, Stockholm, Sweden","institution_ids":["https://openalex.org/I86987016"]},{"raw_affiliation_string":"KTH Royal Institute of Technology","institution_ids":["https://openalex.org/I86987016"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5115829816","display_name":"Monica Jin","orcid":null},"institutions":[{"id":"https://openalex.org/I86987016","display_name":"KTH Royal Institute of Technology","ror":"https://ror.org/026vcq606","country_code":"SE","type":"education","lineage":["https://openalex.org/I86987016"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Monica Jin","raw_affiliation_strings":["KTH Royal Institute of Technology, Stockholm, Sweden","KTH Royal Institute of Technology"],"raw_orcid":"https://orcid.org/0009-0000-8775-2093","affiliations":[{"raw_affiliation_string":"KTH Royal Institute of Technology, Stockholm, Sweden","institution_ids":["https://openalex.org/I86987016"]},{"raw_affiliation_string":"KTH Royal Institute of Technology","institution_ids":["https://openalex.org/I86987016"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027206285","display_name":"Martin Monperrus","orcid":"https://orcid.org/0000-0003-3505-3383"},"institutions":[{"id":"https://openalex.org/I86987016","display_name":"KTH Royal Institute of Technology","ror":"https://ror.org/026vcq606","country_code":"SE","type":"education","lineage":["https://openalex.org/I86987016"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Martin Monperrus","raw_affiliation_strings":["KTH Royal Institute of Technology, Stockholm, Sweden","KTH Royal Institute of Technology"],"raw_orcid":"https://orcid.org/0000-0003-3505-3383","affiliations":[{"raw_affiliation_string":"KTH Royal Institute of Technology, Stockholm, Sweden","institution_ids":["https://openalex.org/I86987016"]},{"raw_affiliation_string":"KTH Royal Institute of Technology","institution_ids":["https://openalex.org/I86987016"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5050065507"],"corresponding_institution_ids":["https://openalex.org/I86987016"],"apc_list":null,"apc_paid":null,"fwci":15.3921,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.98783009,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"52","issue":"1","first_page":"100","last_page":"115"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9843000173568726,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9843000173568726,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11995","display_name":"FinTech, Crowdfunding, Digital Finance","score":0.9704999923706055,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12394","display_name":"Insurance and Financial Risk Management","score":0.906000018119812,"subfield":{"id":"https://openalex.org/subfields/2002","display_name":"Economics and Econometrics"},"field":{"id":"https://openalex.org/fields/20","display_name":"Economics, Econometrics and Finance"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.9420999884605408},{"id":"https://openalex.org/keywords/executable","display_name":"Executable","score":0.7896999716758728},{"id":"https://openalex.org/keywords/smart-contract","display_name":"Smart contract","score":0.6051999926567078},{"id":"https://openalex.org/keywords/craft","display_name":"Craft","score":0.4587000012397766},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.38519999384880066},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.3637999892234802}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.9420999884605408},{"id":"https://openalex.org/C160145156","wikidata":"https://www.wikidata.org/wiki/Q778586","display_name":"Executable","level":2,"score":0.7896999716758728},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7577999830245972},{"id":"https://openalex.org/C2779950589","wikidata":"https://www.wikidata.org/wiki/Q7544035","display_name":"Smart contract","level":3,"score":0.6051999926567078},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5911999940872192},{"id":"https://openalex.org/C2779732396","wikidata":"https://www.wikidata.org/wiki/Q2207288","display_name":"Craft","level":2,"score":0.4587000012397766},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.44929999113082886},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.38519999384880066},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3741999864578247},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.3637999892234802},{"id":"https://openalex.org/C2778464652","wikidata":"https://www.wikidata.org/wiki/Q309849","display_name":"Open research","level":2,"score":0.29919999837875366},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.2786000072956085},{"id":"https://openalex.org/C120936955","wikidata":"https://www.wikidata.org/wiki/Q2155640","display_name":"Empirical research","level":2,"score":0.2745000123977661},{"id":"https://openalex.org/C83931994","wikidata":"https://www.wikidata.org/wiki/Q1149653","display_name":"Building automation","level":2,"score":0.2623000144958496},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.2551000118255615},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.2551000118255615}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tse.2025.3618123","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tse.2025.3618123","pdf_url":null,"source":{"id":"https://openalex.org/S8351582","display_name":"IEEE Transactions on Software Engineering","issn_l":"0098-5589","issn":["0098-5589","1939-3520","2326-3881"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Software Engineering","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1109/tse.2025.3618123","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tse.2025.3618123","pdf_url":null,"source":{"id":"https://openalex.org/S8351582","display_name":"IEEE Transactions on Software Engineering","issn_l":"0098-5589","issn":["0098-5589","1939-3520","2326-3881"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Software Engineering","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W1771830246","https://openalex.org/W2539190473","https://openalex.org/W2805052744","https://openalex.org/W2908007588","https://openalex.org/W2963465913","https://openalex.org/W2963610883","https://openalex.org/W2964144608","https://openalex.org/W2970809537","https://openalex.org/W2975871742","https://openalex.org/W2982275082","https://openalex.org/W3001458527","https://openalex.org/W3004205122","https://openalex.org/W3007045600","https://openalex.org/W3014792488","https://openalex.org/W3015325345","https://openalex.org/W3026203297","https://openalex.org/W3091512861","https://openalex.org/W3155100939","https://openalex.org/W3210206069","https://openalex.org/W4306406277","https://openalex.org/W4362663576","https://openalex.org/W4367359426","https://openalex.org/W4376606573","https://openalex.org/W4384304916","https://openalex.org/W4385489073","https://openalex.org/W4385507108","https://openalex.org/W4386699788","https://openalex.org/W4388422146","https://openalex.org/W4388483609","https://openalex.org/W4389161628","https://openalex.org/W4389560241","https://openalex.org/W4391484042","https://openalex.org/W4391558507","https://openalex.org/W4391653691","https://openalex.org/W4391754100","https://openalex.org/W4396941524","https://openalex.org/W4399372500","https://openalex.org/W4402262358","https://openalex.org/W4402263599","https://openalex.org/W4405601314","https://openalex.org/W4408934902","https://openalex.org/W4412567570"],"related_works":[],"abstract_inverted_index":{"Automated":[0],"Program":[1],"Repair":[2],"(APR)":[3],"for":[4,16,50,58,80,162],"smart":[5,12,30,59,78,163],"contract":[6,13,31],"security":[7],"promises":[8],"to":[9,93,137],"automatically":[10],"mitigate":[11],"vulnerabilities":[14],"responsible":[15],"billions":[17],"in":[18,28,120,156],"financial":[19],"losses.":[20],"However,":[21],"the":[22,90,97,121,124],"true":[23],"effectiveness":[24,110],"of":[25,54,75,109,111,123,135,140],"this":[26,39],"research":[27,158],"addressing":[29],"exploits":[32],"remains":[33],"uncharted":[34],"territory.":[35],"This":[36],"paper":[37],"bridges":[38],"critical":[40],"gap":[41],"by":[42],"introducing":[43],"a":[44,73,106,133,138],"novel":[45],"and":[46,65,95,104],"systematic":[47],"experimental":[48],"framework":[49],"evaluating":[51],"exploit":[52,128],"mitigation":[53,100,129],"program":[55,160],"repair":[56,161],"tools":[57,71],"contracts.":[60,164],"<p":[61],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[62],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">We":[63],"qualitatively":[64],"quantitatively":[66],"analyze":[67],"20":[68],"state-of-the-art":[69],"APR":[70],"using":[72],"dataset":[74],"143":[76],"vulnerable":[77],"contracts,":[79],"which":[81],"we":[82],"manually":[83],"craft":[84],"91":[85],"executable":[86],"exploits.":[87],"We":[88],"are":[89],"very":[91],"first":[92],"define":[94],"measure":[96],"essential":[98],"\u201cexploit":[99],"rate\u201d,":[101],"giving":[102],"researchers":[103],"practitioners":[105],"real":[107],"sense":[108],"cutting":[112],"edge":[113],"techniques.":[114],"Our":[115,142],"findings":[116],"reveal":[117],"substantial":[118],"disparities":[119],"state":[122],"art,":[125],"with":[126],"an":[127],"rate":[130],"ranging":[131],"from":[132],"low":[134],"29%":[136],"high":[139],"74%.":[141],"study":[143],"identifies":[144],"systemic":[145],"limitations,":[146],"such":[147],"as":[148],"inconsistent":[149],"functionality":[150],"preservation,":[151],"that":[152],"must":[153],"be":[154],"addressed":[155],"future":[157],"on":[159]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":4}],"updated_date":"2026-05-22T09:01:20.584952","created_date":"2025-10-10T00:00:00"}
