{"id":"https://openalex.org/W4411523000","doi":"https://doi.org/10.1145/3728924","title":"Enhancing Smart Contract Security Analysis with Execution Property Graphs","display_name":"Enhancing Smart Contract Security Analysis with Execution Property Graphs","publication_year":2025,"publication_date":"2025-06-22","ids":{"openalex":"https://openalex.org/W4411523000","doi":"https://doi.org/10.1145/3728924"},"language":"en","primary_location":{"id":"doi:10.1145/3728924","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3728924","pdf_url":null,"source":{"id":"https://openalex.org/S4404663975","display_name":"Proceedings of the ACM on software engineering.","issn_l":"2994-970X","issn":["2994-970X"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM on Software Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047509636","display_name":"Kaihua Qin","orcid":"https://orcid.org/0000-0003-2190-3623"},"institutions":[{"id":"https://openalex.org/I32971472","display_name":"Yale University","ror":"https://ror.org/03v76x132","country_code":"US","type":"education","lineage":["https://openalex.org/I32971472"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Kaihua Qin","raw_affiliation_strings":["Yale University, New Haven, USA"],"affiliations":[{"raw_affiliation_string":"Yale University, New Haven, USA","institution_ids":["https://openalex.org/I32971472"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001765655","display_name":"\u54f2 \u7530\u91ce","orcid":"https://orcid.org/0000-0002-6446-5072"},"institutions":[{"id":"https://openalex.org/I95457486","display_name":"University of California, Berkeley","ror":"https://ror.org/01an7q238","country_code":"US","type":"education","lineage":["https://openalex.org/I95457486"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zhe Ye","raw_affiliation_strings":["University of California, Berkeley, Berkeley, USA"],"affiliations":[{"raw_affiliation_string":"University of California, Berkeley, Berkeley, USA","institution_ids":["https://openalex.org/I95457486"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067852580","display_name":"Zhun Wang","orcid":"https://orcid.org/0009-0008-8576-7337"},"institutions":[{"id":"https://openalex.org/I95457486","display_name":"University of California, Berkeley","ror":"https://ror.org/01an7q238","country_code":"US","type":"education","lineage":["https://openalex.org/I95457486"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zhun Wang","raw_affiliation_strings":["University of California, Berkeley, Berkeley, USA"],"affiliations":[{"raw_affiliation_string":"University of California, Berkeley, Berkeley, USA","institution_ids":["https://openalex.org/I95457486"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102796770","display_name":"W. D. Li","orcid":"https://orcid.org/0009-0007-2878-2314"},"institutions":[{"id":"https://openalex.org/I45129253","display_name":"University College London","ror":"https://ror.org/02jx3x895","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I45129253"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Weilin Li","raw_affiliation_strings":["University College London, London, United Kingdom"],"affiliations":[{"raw_affiliation_string":"University College London, London, United Kingdom","institution_ids":["https://openalex.org/I45129253"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037118069","display_name":"Liyi Zhou","orcid":"https://orcid.org/0000-0002-2820-9872"},"institutions":[{"id":"https://openalex.org/I129604602","display_name":"University of Sydney","ror":"https://ror.org/0384j8v12","country_code":"AU","type":"education","lineage":["https://openalex.org/I129604602"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Liyi Zhou","raw_affiliation_strings":["University of Sydney, Sydney, Australia"],"affiliations":[{"raw_affiliation_string":"University of Sydney, Sydney, Australia","institution_ids":["https://openalex.org/I129604602"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100460096","display_name":"Chao Zhang","orcid":"https://orcid.org/0000-0001-7894-8828"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chao Zhang","raw_affiliation_strings":["Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019426968","display_name":"Dawn Song","orcid":"https://orcid.org/0000-0001-9745-6802"},"institutions":[{"id":"https://openalex.org/I95457486","display_name":"University of California, Berkeley","ror":"https://ror.org/01an7q238","country_code":"US","type":"education","lineage":["https://openalex.org/I95457486"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dawn Song","raw_affiliation_strings":["University of California, Berkeley, Berkeley, USA"],"affiliations":[{"raw_affiliation_string":"University of California, Berkeley, Berkeley, USA","institution_ids":["https://openalex.org/I95457486"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063253761","display_name":"Arthur Gervais","orcid":"https://orcid.org/0000-0002-3565-3410"},"institutions":[{"id":"https://openalex.org/I45129253","display_name":"University College London","ror":"https://ror.org/02jx3x895","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I45129253"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Arthur Gervais","raw_affiliation_strings":["University College London, London, United Kingdom"],"affiliations":[{"raw_affiliation_string":"University College London, London, United Kingdom","institution_ids":["https://openalex.org/I45129253"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5047509636"],"corresponding_institution_ids":["https://openalex.org/I32971472"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.23622841,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2","issue":"ISSTA","first_page":"1101","last_page":"1122"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9878000020980835,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8350708484649658},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.5496349334716797},{"id":"https://openalex.org/keywords/rendering","display_name":"Rendering (computer graphics)","score":0.5338073372840881},{"id":"https://openalex.org/keywords/tree-traversal","display_name":"Tree traversal","score":0.47642192244529724},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.475673109292984},{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.4519606828689575},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.43724381923675537},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4310176372528076},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40996938943862915},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3563333749771118},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.199448823928833},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.12217113375663757}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8350708484649658},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.5496349334716797},{"id":"https://openalex.org/C205711294","wikidata":"https://www.wikidata.org/wiki/Q176953","display_name":"Rendering (computer graphics)","level":2,"score":0.5338073372840881},{"id":"https://openalex.org/C140745168","wikidata":"https://www.wikidata.org/wiki/Q1210082","display_name":"Tree traversal","level":2,"score":0.47642192244529724},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.475673109292984},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.4519606828689575},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.43724381923675537},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4310176372528076},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40996938943862915},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3563333749771118},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.199448823928833},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.12217113375663757},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3728924","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3728924","pdf_url":null,"source":{"id":"https://openalex.org/S4404663975","display_name":"Proceedings of the ACM on software engineering.","issn_l":"2994-970X","issn":["2994-970X"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM on Software Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.699999988079071,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W1893177189","https://openalex.org/W1992114977","https://openalex.org/W2123804192","https://openalex.org/W2127637733","https://openalex.org/W2144344516","https://openalex.org/W2169044454","https://openalex.org/W2350778671","https://openalex.org/W2539190473","https://openalex.org/W2804093830","https://openalex.org/W2805052744","https://openalex.org/W2846896781","https://openalex.org/W2912366721","https://openalex.org/W2963900946","https://openalex.org/W2970809537","https://openalex.org/W2999378142","https://openalex.org/W3091620507","https://openalex.org/W3100284210","https://openalex.org/W3105187050","https://openalex.org/W3137707325","https://openalex.org/W3177186237","https://openalex.org/W3194103972","https://openalex.org/W3211314335","https://openalex.org/W4244800048","https://openalex.org/W4285586691","https://openalex.org/W4288057718","https://openalex.org/W4288072839","https://openalex.org/W4322765894","https://openalex.org/W4384155542","https://openalex.org/W4384347367","https://openalex.org/W4385080392","https://openalex.org/W4390204305","https://openalex.org/W4391558518","https://openalex.org/W4402443087"],"related_works":["https://openalex.org/W170547082","https://openalex.org/W2136735429","https://openalex.org/W2587876411","https://openalex.org/W2358332176","https://openalex.org/W4229950834","https://openalex.org/W1587123803","https://openalex.org/W2128075414","https://openalex.org/W4301044568","https://openalex.org/W2952867832","https://openalex.org/W244044452"],"abstract_inverted_index":{"Smart":[0],"contract":[1,44,60,106],"vulnerabilities":[2],"have":[3],"led":[4],"to":[5,95,100],"significant":[6],"financial":[7],"losses,":[8],"with":[9,147],"their":[10],"increasing":[11],"complexity":[12],"rendering":[13],"outright":[14],"prevention":[15],"of":[16,58,73,77,120],"hacks":[17],"increasingly":[18],"challenging.":[19],"This":[20],"trend":[21],"highlights":[22],"the":[23,69,90,113],"crucial":[24],"need":[25,51],"for":[26,52,89,169],"advanced":[27],"forensic":[28,171],"analysis":[29,36,85,172],"and":[30,55,71,138,152,173],"real-time":[31,174],"intrusion":[32,175],"detection,":[33],"where":[34],"dynamic":[35,84],"plays":[37],"a":[38,49,53,74,83,109,166],"key":[39,118],"role":[40],"in":[41],"dissecting":[42],"smart":[43,59],"executions.":[45],"Therefore,":[46],"there":[47],"is":[48,97,122,129],"pressing":[50],"unified":[54],"generic":[56],"representation":[57],"executions,":[61,107],"complemented":[62],"by":[63],"an":[64],"efficient":[65],"methodology":[66],"that":[67],"enables":[68],"modeling":[70],"identification":[72],"broad":[75],"spectrum":[76],"emerging":[78],"attacks.":[79],"We":[80],"introduce":[81],"Clue,":[82],"framework":[86],"specifically":[87],"designed":[88],"Ethereum":[91],"virtual":[92],"machine.":[93],"Central":[94],"Clue":[96,121],"its":[98,123],"ability":[99],"capture":[101],"critical":[102],"runtime":[103],"information":[104],"during":[105],"employing":[108],"novel":[110],"graph-based":[111],"representation,":[112],"Execution":[114],"Property":[115],"Graph.":[116],"A":[117],"feature":[119],"innovative":[124],"graph":[125],"traversal":[126],"technique,":[127],"which":[128],"adept":[130],"at":[131],"detecting":[132],"complex":[133],"attacks,":[134],"including":[135],"(read-only)":[136],"reentrancy":[137],"price":[139],"manipulation.":[140],"Evaluation":[141],"results":[142],"reveal":[143],"Clue's":[144,161],"superior":[145],"performance":[146],"high":[148],"true":[149],"positive":[150,155],"rates":[151],"low":[153],"false":[154],"rates,":[156],"outperforming":[157],"state-of-the-art":[158],"tools.":[159],"Furthermore,":[160],"efficiency":[162],"positions":[163],"it":[164],"as":[165],"valuable":[167],"tool":[168],"both":[170],"detection.":[176]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
