{"id":"https://openalex.org/W4306406277","doi":"https://doi.org/10.1145/3545948.3545975","title":"Elysium: Context-Aware Bytecode-Level Patching to Automatically Heal Vulnerable Smart Contracts","display_name":"Elysium: Context-Aware Bytecode-Level Patching to Automatically Heal Vulnerable Smart Contracts","publication_year":2022,"publication_date":"2022-10-17","ids":{"openalex":"https://openalex.org/W4306406277","doi":"https://doi.org/10.1145/3545948.3545975"},"language":"en","primary_location":{"id":"doi:10.1145/3545948.3545975","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3545948.3545975","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3545948.3545975","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3545948.3545975","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067908322","display_name":"Christof Ferreira Torres","orcid":"https://orcid.org/0000-0001-6992-703X"},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":true,"raw_author_name":"Christof Ferreira Torres","raw_affiliation_strings":["University of Luxembourg, Luxembourg"],"affiliations":[{"raw_affiliation_string":"University of Luxembourg, Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090429213","display_name":"Hugo Jonker","orcid":"https://orcid.org/0000-0002-7958-8921"},"institutions":[{"id":"https://openalex.org/I7876267","display_name":"Open University of the Netherlands","ror":"https://ror.org/018dfmf50","country_code":"NL","type":"education","lineage":["https://openalex.org/I7876267"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Hugo Jonker","raw_affiliation_strings":["Open University of the Netherlands, Netherlands"],"affiliations":[{"raw_affiliation_string":"Open University of the Netherlands, Netherlands","institution_ids":["https://openalex.org/I7876267"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069228908","display_name":"Radu State","orcid":"https://orcid.org/0000-0002-4751-9577"},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Radu State","raw_affiliation_strings":["University of Luxembourg, Luxembourg"],"affiliations":[{"raw_affiliation_string":"University of Luxembourg, Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5067908322"],"corresponding_institution_ids":["https://openalex.org/I186903577"],"apc_list":null,"apc_paid":null,"fwci":10.5287,"has_fulltext":true,"cited_by_count":35,"citation_normalized_percentile":{"value":0.98317643,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"115","last_page":"128"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9728000164031982,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.97079998254776,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bytecode","display_name":"Bytecode","score":0.9735262989997864},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.777183473110199},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.6928384900093079},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.58799809217453},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5811226963996887},{"id":"https://openalex.org/keywords/template","display_name":"Template","score":0.5792165398597717},{"id":"https://openalex.org/keywords/open-source","display_name":"Open source","score":0.5698400139808655},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.4883441627025604},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.4582499861717224},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.4535563588142395},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4408568739891052},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4018462002277374},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3240482211112976},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.30862292647361755},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.25285816192626953},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.13558822870254517},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1046845018863678}],"concepts":[{"id":"https://openalex.org/C2779818221","wikidata":"https://www.wikidata.org/wiki/Q837330","display_name":"Bytecode","level":3,"score":0.9735262989997864},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.777183473110199},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.6928384900093079},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.58799809217453},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5811226963996887},{"id":"https://openalex.org/C82714645","wikidata":"https://www.wikidata.org/wiki/Q438331","display_name":"Template","level":2,"score":0.5792165398597717},{"id":"https://openalex.org/C3018397939","wikidata":"https://www.wikidata.org/wiki/Q3644502","display_name":"Open source","level":3,"score":0.5698400139808655},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4883441627025604},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.4582499861717224},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.4535563588142395},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4408568739891052},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4018462002277374},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3240482211112976},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.30862292647361755},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.25285816192626953},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.13558822870254517},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1046845018863678},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3545948.3545975","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3545948.3545975","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3545948.3545975","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses","raw_type":"proceedings-article"},{"id":"pmh:oai:research.ou.nl:publications/259e0d21-4689-4617-b071-02464b6e8a3b","is_oa":true,"landing_page_url":"https://research.ou.nl/en/publications/259e0d21-4689-4617-b071-02464b6e8a3b","pdf_url":null,"source":{"id":"https://openalex.org/S4406922485","display_name":"Open University of the Netherlands Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Ferreira Torres, C, Jonker, H L & State, R 2022, Elysium: Context-Aware Bytecode-Level Patching to Automatically Heal Vulnerable Smart Contracts. in RAID '22: Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses. Association for Computing Machinery (ACM), pp. 115-128, 25th International Symposium on Research in Attacks, Intrusions and Defenses, Limassol , Cyprus, 26/10/22. https://doi.org/10.1145/3545948.3545975","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"doi:10.1145/3545948.3545975","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3545948.3545975","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3545948.3545975","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Reduced inequalities","score":0.5600000023841858,"id":"https://metadata.un.org/sdg/10"}],"awards":[{"id":"https://openalex.org/G2198168589","display_name":null,"funder_award_id":"13192291","funder_id":"https://openalex.org/F4320321038","funder_display_name":"Fonds National de la Recherche Luxembourg"}],"funders":[{"id":"https://openalex.org/F4320321038","display_name":"Fonds National de la Recherche Luxembourg","ror":"https://ror.org/039z13y21"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4306406277.pdf","grobid_xml":"https://content.openalex.org/works/W4306406277.grobid-xml"},"referenced_works_count":21,"referenced_works":["https://openalex.org/W2063387237","https://openalex.org/W2122947685","https://openalex.org/W2483433689","https://openalex.org/W2539190473","https://openalex.org/W2604844934","https://openalex.org/W2620854846","https://openalex.org/W2805052744","https://openalex.org/W2846896781","https://openalex.org/W2888928288","https://openalex.org/W2908007588","https://openalex.org/W2963610883","https://openalex.org/W2985495886","https://openalex.org/W2998145808","https://openalex.org/W3008357810","https://openalex.org/W3014792488","https://openalex.org/W3091512861","https://openalex.org/W3092117182","https://openalex.org/W3095431539","https://openalex.org/W3155100939","https://openalex.org/W3174560274","https://openalex.org/W4210311153"],"related_works":["https://openalex.org/W2546344830","https://openalex.org/W2170708539","https://openalex.org/W2406445318","https://openalex.org/W2395048784","https://openalex.org/W2113128227","https://openalex.org/W2565892306","https://openalex.org/W632256878","https://openalex.org/W4211197663","https://openalex.org/W2491403535","https://openalex.org/W3123068371"],"abstract_inverted_index":{"Fixing":[0],"bugs":[1],"is":[2,11,94],"easiest":[3],"by":[4],"patching":[5,81,107],"source":[6,9,31],"code.":[7],"However,":[8,55],"code":[10,32],"not":[12],"always":[13],"available:":[14],"only":[15],"0.3%":[16],"of":[17,74],"the":[18,91,122],"\u223c":[19],"49M":[20],"smart":[21],"contracts":[22,37,48,52,63],"that":[23,59,78,93],"are":[24,127],"currently":[25],"deployed":[26],"on":[27,61],"Ethereum":[28],"have":[29],"their":[30,100],"publicly":[33],"available.":[34],"Moreover,":[35],"since":[36],"may":[38,49],"call":[39],"functions":[40],"from":[41],"other":[42],"contracts,":[43],"security":[44],"flaws":[45],"in":[46],"closed-source":[47,62],"affect":[50],"open-source":[51],"as":[53,68,121],"well.":[54],"current":[56],"state-of-the-art":[57],"approaches":[58],"operate":[60],"(i.e.,":[64,133],"EVM":[65],"bytecode),":[66],"such":[67],"EVMPatch":[69],"and":[70,102],"SmartShield,":[71],"make":[72],"use":[73],"purely":[75],"hard-coded":[76,111],"templates":[77],"leverage":[79],"fix":[80],"patterns.":[82],"As":[83],"a":[84,113],"result,":[85],"they":[86],"cannot":[87],"dynamically":[88],"adapt":[89],"to":[90,118,124],"bytecode":[92],"being":[95],"patched,":[96],"which":[97],"severely":[98],"limits":[99],"flexibility":[101],"scalability.":[103],"For":[104],"instance,":[105],"when":[106],"integer":[108,131],"overflows":[109],"using":[110],"templates,":[112],"particular":[114],"patch":[115],"template":[116,135,139],"needs":[117],"be":[119,125],"employed":[120],"bounds":[123],"checked":[126],"different":[128],"for":[129,136,140],"each":[130],"size":[132],"one":[134],"uint256,":[137],"another":[138],"uint64,":[141],"etc.).":[142]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":17},{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":6}],"updated_date":"2026-04-23T09:07:50.710637","created_date":"2025-10-10T00:00:00"}
