{"id":"https://openalex.org/W4285490458","doi":"https://doi.org/10.1145/3533767.3534378","title":"eTainter: detecting gas-related vulnerabilities in smart contracts","display_name":"eTainter: detecting gas-related vulnerabilities in smart contracts","publication_year":2022,"publication_date":"2022-07-15","ids":{"openalex":"https://openalex.org/W4285490458","doi":"https://doi.org/10.1145/3533767.3534378"},"language":"en","primary_location":{"id":"doi:10.1145/3533767.3534378","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3533767.3534378","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046148961","display_name":"Asem Ghaleb","orcid":"https://orcid.org/0000-0002-2190-8304"},"institutions":[{"id":"https://openalex.org/I141945490","display_name":"University of British Columbia","ror":"https://ror.org/03rmrcq20","country_code":"CA","type":"education","lineage":["https://openalex.org/I141945490"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Asem Ghaleb","raw_affiliation_strings":["University of British Columbia, Canada"],"affiliations":[{"raw_affiliation_string":"University of British Columbia, Canada","institution_ids":["https://openalex.org/I141945490"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029269318","display_name":"Julia Rubin","orcid":"https://orcid.org/0000-0001-7280-1614"},"institutions":[{"id":"https://openalex.org/I141945490","display_name":"University of British Columbia","ror":"https://ror.org/03rmrcq20","country_code":"CA","type":"education","lineage":["https://openalex.org/I141945490"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Julia Rubin","raw_affiliation_strings":["University of British Columbia, Canada"],"affiliations":[{"raw_affiliation_string":"University of British Columbia, Canada","institution_ids":["https://openalex.org/I141945490"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073641368","display_name":"Karthik Pattabiraman","orcid":"https://orcid.org/0000-0003-2380-3415"},"institutions":[{"id":"https://openalex.org/I141945490","display_name":"University of British Columbia","ror":"https://ror.org/03rmrcq20","country_code":"CA","type":"education","lineage":["https://openalex.org/I141945490"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Karthik Pattabiraman","raw_affiliation_strings":["University of British Columbia, Canada"],"affiliations":[{"raw_affiliation_string":"University of British Columbia, Canada","institution_ids":["https://openalex.org/I141945490"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5046148961"],"corresponding_institution_ids":["https://openalex.org/I141945490"],"apc_list":null,"apc_paid":null,"fwci":7.5971,"has_fulltext":false,"cited_by_count":55,"citation_normalized_percentile":{"value":0.98182121,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"728","last_page":"739"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bytecode","display_name":"Bytecode","score":0.796804666519165},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7726725935935974},{"id":"https://openalex.org/keywords/smart-contract","display_name":"Smart contract","score":0.6615960597991943},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.636888325214386},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.47756344079971313},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4605407416820526},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4279380440711975},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.3993954658508301},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.35949304699897766},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3317272961139679},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.26031801104545593},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.16066712141036987},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.14140662550926208},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.13305562734603882},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.08611524105072021}],"concepts":[{"id":"https://openalex.org/C2779818221","wikidata":"https://www.wikidata.org/wiki/Q837330","display_name":"Bytecode","level":3,"score":0.796804666519165},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7726725935935974},{"id":"https://openalex.org/C2779950589","wikidata":"https://www.wikidata.org/wiki/Q7544035","display_name":"Smart contract","level":3,"score":0.6615960597991943},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.636888325214386},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.47756344079971313},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4605407416820526},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4279380440711975},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.3993954658508301},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.35949304699897766},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3317272961139679},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.26031801104545593},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.16066712141036987},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.14140662550926208},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.13305562734603882},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.08611524105072021},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3533767.3534378","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3533767.3534378","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.8100000023841858}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W2076090418","https://openalex.org/W2122049982","https://openalex.org/W2539190473","https://openalex.org/W2598139937","https://openalex.org/W2794825356","https://openalex.org/W2805052744","https://openalex.org/W2805827286","https://openalex.org/W2808452017","https://openalex.org/W2888928288","https://openalex.org/W2898569715","https://openalex.org/W2908007588","https://openalex.org/W2963610883","https://openalex.org/W2975871742","https://openalex.org/W2982275082","https://openalex.org/W2999378142","https://openalex.org/W3009278394","https://openalex.org/W3026203297","https://openalex.org/W3026315212","https://openalex.org/W3034136313","https://openalex.org/W3088323786","https://openalex.org/W3098149161","https://openalex.org/W3106007553","https://openalex.org/W3107814273","https://openalex.org/W3186717497","https://openalex.org/W3207304130","https://openalex.org/W4205689130"],"related_works":["https://openalex.org/W3092702943","https://openalex.org/W4297798448","https://openalex.org/W2939663913","https://openalex.org/W4285161539","https://openalex.org/W2982625131","https://openalex.org/W4320715980","https://openalex.org/W3034787960","https://openalex.org/W3122124622","https://openalex.org/W3150062897","https://openalex.org/W3197684247"],"abstract_inverted_index":{"The":[0,134],"execution":[1,21,44,50,61],"of":[2,69,114,131,152,166,182],"smart":[3,115],"contracts":[4,54,65,169],"on":[5,108,128,155,170,194],"the":[6,26,32,42,64,84,112,124,171],"Ethereum":[7,172],"blockchain":[8],"consumes":[9],"gas":[10,39],"paid":[11],"for":[12,103],"by":[13,35,76,120],"users":[14,27],"submitting":[15],"contracts'":[16],"invocation":[17],"requests.":[18],"A":[19],"contract":[20,43,190],"proceeds":[22],"as":[23,25],"long":[24],"dedicate":[28],"enough":[29],"gas,":[30],"within":[31],"limit":[33],"set":[34],"Ethereum.":[36],"If":[37],"insufficient":[38],"is":[40],"provided,":[41],"halts":[45],"and":[46,144,146,185],"changes":[47],"made":[48],"during":[49],"get":[51],"reverted.":[52],"Unfortunately,":[53],"may":[55],"contain":[56],"code":[57],"patterns":[58,72],"that":[59,137,147,176,186],"increase":[60],"cost,":[62],"causing":[63],"to":[66,79,162],"run":[67],"out":[68],"gas.":[70],"These":[71],"can":[73],"be":[74],"manipulated":[75],"malicious":[77],"attackers":[78],"induce":[80],"unwanted":[81],"behavior":[82],"in":[83,111,141,180,191],"targeted":[85],"victim":[86],"contracts,":[87,184],"e.g.,":[88],"Denial-of-Service":[89],"(DoS)":[90],"attacks.":[91],"We":[92,97,117,158,174],"call":[93],"these":[94,183],"gas-related":[95,105,177],"vulnerabilities.":[96],"propose":[98],"eTainter,":[99],"a":[100,129,150,189],"static":[101],"analyzer":[102],"detecting":[104],"vulnerabilities":[106,178],"based":[107,154],"taint":[109],"tracking":[110],"bytecode":[113],"contracts.":[116,133],"evaluate":[118],"eTainter":[119,138,148,161,187],"comparing":[121],"it":[122],"with":[123],"prior":[125],"work,":[126],"MadMax,":[127],"dataset":[130],"annotated":[132],"results":[135],"show":[136],"outperforms":[139],"MadMax":[140],"both":[142],"precision":[143,151],"recall,":[145],"has":[149],"90%":[153],"manual":[156],"inspection.":[157],"also":[159],"use":[160],"perform":[163],"large-scale":[164],"analysis":[165],"60,612":[167],"real-world":[168],"blockchain.":[173],"find":[175],"exist":[179],"2,763":[181],"analyzes":[188],"eight":[192],"seconds,":[193],"average.":[195]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":19},{"year":2024,"cited_by_count":20},{"year":2023,"cited_by_count":11},{"year":2022,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
