{"id":"https://openalex.org/W7117123985","doi":"https://doi.org/10.1145/3756681.3756943","title":"Automated Vulnerability Injection in Solidity Smart Contracts: A Mutation-Based Approach for Benchmark Development","display_name":"Automated Vulnerability Injection in Solidity Smart Contracts: A Mutation-Based Approach for Benchmark Development","publication_year":2025,"publication_date":"2025-06-17","ids":{"openalex":"https://openalex.org/W7117123985","doi":"https://doi.org/10.1145/3756681.3756943"},"language":null,"primary_location":{"id":"doi:10.1145/3756681.3756943","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3756681.3756943","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 29th International Conference on Evaluation and Assessment in Software Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3756681.3756943","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103098699","display_name":"Giuseppe Iuliano","orcid":"https://orcid.org/0000-0001-6546-0014"},"institutions":[{"id":"https://openalex.org/I131729948","display_name":"University of Salerno","ror":"https://ror.org/0192m2k53","country_code":"IT","type":"education","lineage":["https://openalex.org/I131729948"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Gerardo Iuliano","raw_affiliation_strings":["Software Engineering Lab (SeSa Lab), University of Salerno, Fisciano, Italy"],"affiliations":[{"raw_affiliation_string":"Software Engineering Lab (SeSa Lab), University of Salerno, Fisciano, Italy","institution_ids":["https://openalex.org/I131729948"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000675508","display_name":"Luigi Allocca","orcid":"https://orcid.org/0000-0002-5149-1052"},"institutions":[{"id":"https://openalex.org/I131729948","display_name":"University of Salerno","ror":"https://ror.org/0192m2k53","country_code":"IT","type":"education","lineage":["https://openalex.org/I131729948"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Luigi Allocca","raw_affiliation_strings":["Software Engineering Lab (SeSa Lab), University of Salerno, Fisciano, Italy"],"affiliations":[{"raw_affiliation_string":"Software Engineering Lab (SeSa Lab), University of Salerno, Fisciano, Italy","institution_ids":["https://openalex.org/I131729948"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010149821","display_name":"Matteo Cicalese","orcid":null},"institutions":[{"id":"https://openalex.org/I131729948","display_name":"University of Salerno","ror":"https://ror.org/0192m2k53","country_code":"IT","type":"education","lineage":["https://openalex.org/I131729948"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Matteo Cicalese","raw_affiliation_strings":["Software Engineering Lab (SeSa Lab), University of Salerno, Fisciano, Italy"],"affiliations":[{"raw_affiliation_string":"Software Engineering Lab (SeSa Lab), University of Salerno, Fisciano, Italy","institution_ids":["https://openalex.org/I131729948"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072127726","display_name":"Dario Di Nucci","orcid":"https://orcid.org/0000-0002-3861-1902"},"institutions":[{"id":"https://openalex.org/I131729948","display_name":"University of Salerno","ror":"https://ror.org/0192m2k53","country_code":"IT","type":"education","lineage":["https://openalex.org/I131729948"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Dario Di Nucci","raw_affiliation_strings":["Software Engineering Lab (SeSa Lab), University of Salerno, Fisciano, Italy"],"affiliations":[{"raw_affiliation_string":"Software Engineering Lab (SeSa Lab), University of Salerno, Fisciano, Italy","institution_ids":["https://openalex.org/I131729948"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5103098699"],"corresponding_institution_ids":["https://openalex.org/I131729948"],"apc_list":null,"apc_paid":null,"fwci":3.2641,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.94786997,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"91","last_page":"101"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.8726000189781189,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.8726000189781189,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.02500000037252903,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.013399999588727951,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.7354999780654907},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.5504999756813049},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.4982999861240387},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.4959999918937683},{"id":"https://openalex.org/keywords/solidity","display_name":"Solidity","score":0.4507000148296356},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.44839999079704285},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.3513999879360199}],"concepts":[{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.7354999780654907},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.645799994468689},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.5504999756813049},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4991999864578247},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.4982999861240387},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.4959999918937683},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.48890000581741333},{"id":"https://openalex.org/C2778362873","wikidata":"https://www.wikidata.org/wiki/Q24909565","display_name":"Solidity","level":2,"score":0.4507000148296356},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.44839999079704285},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.3513999879360199},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.3393000066280365},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.3264000117778778},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.3057999908924103},{"id":"https://openalex.org/C77109596","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Application security","level":5,"score":0.296099990606308},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.2689000070095062},{"id":"https://openalex.org/C172776598","wikidata":"https://www.wikidata.org/wiki/Q7943570","display_name":"Vulnerability management","level":4,"score":0.259799987077713},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.25519999861717224},{"id":"https://openalex.org/C501734568","wikidata":"https://www.wikidata.org/wiki/Q42918","display_name":"Mutation","level":3,"score":0.2540000081062317},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.2500999867916107}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3756681.3756943","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3756681.3756943","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 29th International Conference on Evaluation and Assessment in Software Engineering","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3756681.3756943","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3756681.3756943","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 29th International Conference on Evaluation and Assessment in Software Engineering","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W2135841285","https://openalex.org/W2539190473","https://openalex.org/W2604844934","https://openalex.org/W2725449579","https://openalex.org/W2792261072","https://openalex.org/W2808815243","https://openalex.org/W2846896781","https://openalex.org/W2911193845","https://openalex.org/W2949029756","https://openalex.org/W2963594166","https://openalex.org/W2970809537","https://openalex.org/W2975871742","https://openalex.org/W2979368426","https://openalex.org/W2982275082","https://openalex.org/W3004205122","https://openalex.org/W3026203297","https://openalex.org/W3036333383","https://openalex.org/W3042743284","https://openalex.org/W3110768398","https://openalex.org/W3121385022","https://openalex.org/W3174996440","https://openalex.org/W3180630398","https://openalex.org/W3181957689","https://openalex.org/W4206573979","https://openalex.org/W4221106574","https://openalex.org/W4286266904","https://openalex.org/W4294607906","https://openalex.org/W4381054315","https://openalex.org/W4386431634","https://openalex.org/W4388483609","https://openalex.org/W4393307116","https://openalex.org/W4399777225","https://openalex.org/W4400841293","https://openalex.org/W4404180552","https://openalex.org/W4413267605","https://openalex.org/W4414956263"],"related_works":[],"abstract_inverted_index":{"The":[0,130],"security":[1],"of":[2,41,190],"smart":[3,55,75,91,105,111,143],"contracts":[4,56,76,92,112,144],"is":[5],"critical":[6],"in":[7,174],"blockchain":[8],"systems,":[9],"where":[10],"even":[11],"minor":[12],"vulnerabilities":[13,52,73,148,164],"can":[14,49,63,145,186],"lead":[15],"to":[16,70,77,88,98,119,123,161],"substantial":[17],"financial":[18],"losses.":[19],"Researchers":[20],"proposed":[21],"several":[22],"vulnerability":[23,101,135],"detection":[24,191],"tools":[25,62,159,185],"evaluated":[26],"using":[27,113,166],"existing":[28],"benchmarks.":[29,82],"However,":[30],"most":[31],"benchmarks":[32,180],"are":[33],"outdated":[34],"and":[35,57,80,126,177],"focus":[36],"on":[37],"a":[38,86,115,137],"narrow":[39],"set":[40],"vulnerabilities.":[42],"This":[43],"work":[44],"evaluates":[45],"whether":[46,58],"mutation":[47,96,183],"seeding":[48,184],"effectively":[50],"inject":[51,72,99],"into":[53,74,103],"Solidity-based":[54],"state-of-the-art":[59],"static":[60,116,157,175],"analysis":[61,117,158],"detect":[64,162],"the":[65,152,170,188],"injected":[66,165],"flaws.":[67],"We":[68,83,107],"aim":[69],"automatically":[71],"generate":[78,89],"large":[79],"wide":[81],"propose":[84],"MuSe,":[85],"tool":[87],"vulnerable":[90,110],"by":[93,182],"leveraging":[94],"pattern-based":[95,167],"operators":[97],"six":[100],"types":[102],"real-world":[104],"contracts.":[106],"analyzed":[108],"these":[109],"Slither,":[114],"tool,":[118],"determine":[120],"its":[121],"capacity":[122],"identify":[124],"them":[125],"assess":[127],"their":[128],"validity.":[129],"results":[131],"show":[132],"that":[133,179],"each":[134],"has":[136],"different":[138],"injection":[139],"rate.":[140],"Not":[141],"all":[142,163],"exhibit":[146],"some":[147],"because":[149],"they":[150],"lack":[151],"prerequisites":[153],"for":[154,172],"injection.":[155],"Furthermore,":[156],"fail":[160],"mutations,":[168],"underscoring":[169],"need":[171],"enhancements":[173],"analyzers":[176],"demonstrating":[178],"generated":[181],"improve":[187],"evaluation":[189],"tools.":[192]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-03-28T08:17:26.163206","created_date":"2025-12-24T00:00:00"}
