{"id":"https://openalex.org/W4386631269","doi":"https://doi.org/10.1145/3594556.3594618","title":"Smart Contract Symbol Execution Vulnerability Detection Method Based on CFG Path Pruning","display_name":"Smart Contract Symbol Execution Vulnerability Detection Method Based on CFG Path Pruning","publication_year":2023,"publication_date":"2023-07-10","ids":{"openalex":"https://openalex.org/W4386631269","doi":"https://doi.org/10.1145/3594556.3594618"},"language":"en","primary_location":{"id":"doi:10.1145/3594556.3594618","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3594556.3594618","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3594556.3594618","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3594556.3594618","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100773308","display_name":"Yichuan Wang","orcid":"https://orcid.org/0000-0001-6575-1954"},"institutions":[{"id":"https://openalex.org/I4210115513","display_name":"Xi\u2019an University","ror":"https://ror.org/01zzmf129","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210115513"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yichuan Wang","raw_affiliation_strings":["Xi'an University of technology, School of Computer Science and Engineering, China"],"raw_orcid":"https://orcid.org/0000-0001-6575-1954","affiliations":[{"raw_affiliation_string":"Xi'an University of technology, School of Computer Science and Engineering, China","institution_ids":["https://openalex.org/I4210115513"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103056988","display_name":"Jingjing Zhao","orcid":"https://orcid.org/0009-0006-5323-9519"},"institutions":[{"id":"https://openalex.org/I4210115513","display_name":"Xi\u2019an University","ror":"https://ror.org/01zzmf129","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210115513"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingjing Zhao","raw_affiliation_strings":["Xi'an University of technology, School of Computer Science and Engineering, China"],"raw_orcid":"https://orcid.org/0009-0006-5323-9519","affiliations":[{"raw_affiliation_string":"Xi'an University of technology, School of Computer Science and Engineering, China","institution_ids":["https://openalex.org/I4210115513"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038791055","display_name":"Yaling Zhang","orcid":"https://orcid.org/0000-0002-1759-6678"},"institutions":[{"id":"https://openalex.org/I4210115513","display_name":"Xi\u2019an University","ror":"https://ror.org/01zzmf129","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210115513"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yaling Zhang","raw_affiliation_strings":["Xi'an University of technology, School of Computer Science and Engineering, China"],"raw_orcid":"https://orcid.org/0000-0002-1759-6678","affiliations":[{"raw_affiliation_string":"Xi'an University of technology, School of Computer Science and Engineering, China","institution_ids":["https://openalex.org/I4210115513"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073391035","display_name":"Xinhong Hei","orcid":"https://orcid.org/0000-0002-6394-0492"},"institutions":[{"id":"https://openalex.org/I4210115513","display_name":"Xi\u2019an University","ror":"https://ror.org/01zzmf129","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210115513"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinhong Hei","raw_affiliation_strings":["Xi'an University of technology, School of Computer Science and Engineering, China"],"raw_orcid":"https://orcid.org/0000-0002-6394-0492","affiliations":[{"raw_affiliation_string":"Xi'an University of technology, School of Computer Science and Engineering, China","institution_ids":["https://openalex.org/I4210115513"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103029948","display_name":"Lei Zhu","orcid":"https://orcid.org/0000-0001-5925-5743"},"institutions":[{"id":"https://openalex.org/I4210115513","display_name":"Xi\u2019an University","ror":"https://ror.org/01zzmf129","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210115513"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Zhu","raw_affiliation_strings":["Xi'an University of technology, School of Computer Science and Engineering, China"],"raw_orcid":"https://orcid.org/0000-0001-5925-5743","affiliations":[{"raw_affiliation_string":"Xi'an University of technology, School of Computer Science and Engineering, China","institution_ids":["https://openalex.org/I4210115513"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100773308"],"corresponding_institution_ids":["https://openalex.org/I4210115513"],"apc_list":null,"apc_paid":null,"fwci":1.3431,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.85311435,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"132","last_page":"139"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9563000202178955,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7863985896110535},{"id":"https://openalex.org/keywords/smart-contract","display_name":"Smart contract","score":0.7741039395332336},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5873702168464661},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5479358434677124},{"id":"https://openalex.org/keywords/bytecode","display_name":"Bytecode","score":0.5263741612434387},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.4646902084350586},{"id":"https://openalex.org/keywords/pruning","display_name":"Pruning","score":0.45768678188323975},{"id":"https://openalex.org/keywords/model-checking","display_name":"Model checking","score":0.4254840016365051},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.4148976802825928},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2602645754814148},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.1680915653705597},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1471908688545227},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.11668157577514648}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7863985896110535},{"id":"https://openalex.org/C2779950589","wikidata":"https://www.wikidata.org/wiki/Q7544035","display_name":"Smart contract","level":3,"score":0.7741039395332336},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5873702168464661},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5479358434677124},{"id":"https://openalex.org/C2779818221","wikidata":"https://www.wikidata.org/wiki/Q837330","display_name":"Bytecode","level":3,"score":0.5263741612434387},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.4646902084350586},{"id":"https://openalex.org/C108010975","wikidata":"https://www.wikidata.org/wiki/Q500094","display_name":"Pruning","level":2,"score":0.45768678188323975},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.4254840016365051},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.4148976802825928},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2602645754814148},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.1680915653705597},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1471908688545227},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.11668157577514648},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C6557445","wikidata":"https://www.wikidata.org/wiki/Q173113","display_name":"Agronomy","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3594556.3594618","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3594556.3594618","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3594556.3594618","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3594556.3594618","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3594556.3594618","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3594556.3594618","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1906728897","display_name":null,"funder_award_id":"U20B2050","funder_id":"https://openalex.org/F4320336350","funder_display_name":"Key Research and Development Projects of Shaanxi Province"},{"id":"https://openalex.org/G6933866272","display_name":null,"funder_award_id":"2022GY-040","funder_id":"https://openalex.org/F4320336350","funder_display_name":"Key Research and Development Projects of Shaanxi Province"},{"id":"https://openalex.org/G7972219819","display_name":null,"funder_award_id":"62072368","funder_id":"https://openalex.org/F4320336350","funder_display_name":"Key Research and Development Projects of Shaanxi Province"}],"funders":[{"id":"https://openalex.org/F4320336350","display_name":"Key Research and Development Projects of Shaanxi Province","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4386631269.pdf","grobid_xml":"https://content.openalex.org/works/W4386631269.grobid-xml"},"referenced_works_count":16,"referenced_works":["https://openalex.org/W2523326849","https://openalex.org/W2539190473","https://openalex.org/W2784680128","https://openalex.org/W2790202156","https://openalex.org/W2805052744","https://openalex.org/W2846896781","https://openalex.org/W2885034081","https://openalex.org/W2888393465","https://openalex.org/W2963610883","https://openalex.org/W2999378142","https://openalex.org/W3016155638","https://openalex.org/W3049135223","https://openalex.org/W3091620507","https://openalex.org/W3098450669","https://openalex.org/W3125989628","https://openalex.org/W3154651159"],"related_works":["https://openalex.org/W2808452017","https://openalex.org/W3176636969","https://openalex.org/W4286331375","https://openalex.org/W4287163518","https://openalex.org/W4322765894","https://openalex.org/W4398239070","https://openalex.org/W4255703437","https://openalex.org/W2778144710","https://openalex.org/W3114041051","https://openalex.org/W3095721059"],"abstract_inverted_index":{"In":[0],"recent":[1],"years,":[2],"with":[3,166],"the":[4,10,27,34,56,63,77,84,92,144,163,167,171,183],"continuous":[5],"promotion":[6],"of":[7,12,30,36,137,174],"blockchain":[8],"technology,":[9,44],"application":[11],"smart":[13,22,38,50,99,122,158],"contracts":[14,159],"has":[15,147,177,187],"shown":[16],"an":[17,48],"explosive":[18],"growth":[19],"trend,":[20],"and":[21,87,107,116,135,151,182],"contract":[23,39,51,100,123],"vulnerabilities":[24,124,161],"seriously":[25],"threaten":[26],"ecological":[28],"security":[29],"blockchain.":[31],"Aiming":[32],"at":[33,55],"inefficiency":[35],"existing":[37],"Symbolic":[40],"Execution":[41],"vulnerability":[42,52,118,152],"detection":[43,53,149,153],"this":[45,175],"paper":[46],"proposes":[47],"effective":[49],"method":[54],"source":[57],"code":[58],"level.":[59],"Firstly,":[60],"we":[61,75,96],"define":[62,76],"critical":[64,85,93],"path.":[65],"As":[66],"attackers":[67],"typically":[68],"aim":[69],"to":[70,80,112],"steal":[71],"or":[72],"freeze":[73],"funds,":[74],"path":[78,114],"related":[79,89],"fund":[81],"transfer":[82],"as":[83,126],"path,":[86],"its":[88],"instructions":[90],"are":[91],"instructions.":[94],"Then,":[95],"constructed":[97],"a":[98,109],"control":[101],"flowchart":[102],"based":[103],"on":[104,156],"Ethereum":[105],"bytecode":[106],"used":[108],"constraint":[110],"solver":[111],"solve":[113],"constraints":[115],"corresponding":[117],"constraints.":[119],"Detect":[120],"common":[121],"such":[125],"reentrancy,":[127],"access":[128],"control,":[129],"arithmetic":[130],"vulnerabilities,":[131],"unchecked":[132],"low":[133],"calls,":[134],"denial":[136],"service.":[138],"The":[139],"experimental":[140],"results":[141],"show":[142],"that":[143],"proposed":[145],"scheme":[146,176],"good":[148],"performance,":[150],"was":[154],"performed":[155],"55":[157],"containing":[160],"in":[162],"dataset.":[164],"Compared":[165],"pre":[168],"optimized":[169],"scheme,":[170],"precision":[172],"rate":[173],"been":[178,188],"improved":[179],"by":[180,190],"7.52%,":[181],"total":[184],"execution":[185],"time":[186],"reduced":[189],"34.92%.":[191]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":2}],"updated_date":"2026-04-26T08:31:28.666265","created_date":"2025-10-10T00:00:00"}
