{"id":"https://openalex.org/W4285490421","doi":"https://doi.org/10.1145/3533767.3534222","title":"SmartDagger: a bytecode-based static analysis approach for detecting cross-contract vulnerability","display_name":"SmartDagger: a bytecode-based static analysis approach for detecting cross-contract vulnerability","publication_year":2022,"publication_date":"2022-07-15","ids":{"openalex":"https://openalex.org/W4285490421","doi":"https://doi.org/10.1145/3533767.3534222"},"language":"en","primary_location":{"id":"doi:10.1145/3533767.3534222","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3533767.3534222","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067714027","display_name":"Zeqin Liao","orcid":"https://orcid.org/0000-0003-0306-7465"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zeqin Liao","raw_affiliation_strings":["Sun Yat-sen University, China"],"affiliations":[{"raw_affiliation_string":"Sun Yat-sen University, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000582109","display_name":"Zibin Zheng","orcid":"https://orcid.org/0000-0002-7878-4330"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zibin Zheng","raw_affiliation_strings":["Sun Yat-sen University, China"],"affiliations":[{"raw_affiliation_string":"Sun Yat-sen University, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100373718","display_name":"Xiao Chen","orcid":"https://orcid.org/0000-0002-3290-507X"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiao Chen","raw_affiliation_strings":["Sun Yat-sen University, China"],"affiliations":[{"raw_affiliation_string":"Sun Yat-sen University, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065097911","display_name":"Yuhong Nan","orcid":"https://orcid.org/0000-0001-9597-9888"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuhong Nan","raw_affiliation_strings":["Sun Yat-sen University, China"],"affiliations":[{"raw_affiliation_string":"Sun Yat-sen University, China","institution_ids":["https://openalex.org/I157773358"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5067714027"],"corresponding_institution_ids":["https://openalex.org/I157773358"],"apc_list":null,"apc_paid":null,"fwci":19.4507,"has_fulltext":false,"cited_by_count":64,"citation_normalized_percentile":{"value":0.99353221,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"752","last_page":"764"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9800000190734863,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9645000100135803,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bytecode","display_name":"Bytecode","score":0.9078981280326843},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7946518063545227},{"id":"https://openalex.org/keywords/smart-contract","display_name":"Smart contract","score":0.6615172624588013},{"id":"https://openalex.org/keywords/false-positive-paradox","display_name":"False positive paradox","score":0.5816184878349304},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5542299151420593},{"id":"https://openalex.org/keywords/cross-platform","display_name":"Cross-platform","score":0.523004949092865},{"id":"https://openalex.org/keywords/aspectj","display_name":"AspectJ","score":0.5215116143226624},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.4952446520328522},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.49359309673309326},{"id":"https://openalex.org/keywords/design-by-contract","display_name":"Design by contract","score":0.48192858695983887},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4263761639595032},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4089981019496918},{"id":"https://openalex.org/keywords/aspect-oriented-programming","display_name":"Aspect-oriented programming","score":0.35787320137023926},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3355141282081604},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.2013120949268341},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.18453103303909302},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.1242419183254242},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.11037230491638184},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.09921684861183167}],"concepts":[{"id":"https://openalex.org/C2779818221","wikidata":"https://www.wikidata.org/wiki/Q837330","display_name":"Bytecode","level":3,"score":0.9078981280326843},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7946518063545227},{"id":"https://openalex.org/C2779950589","wikidata":"https://www.wikidata.org/wiki/Q7544035","display_name":"Smart contract","level":3,"score":0.6615172624588013},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.5816184878349304},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5542299151420593},{"id":"https://openalex.org/C92400490","wikidata":"https://www.wikidata.org/wiki/Q174666","display_name":"Cross-platform","level":2,"score":0.523004949092865},{"id":"https://openalex.org/C2781009160","wikidata":"https://www.wikidata.org/wiki/Q735604","display_name":"AspectJ","level":4,"score":0.5215116143226624},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.4952446520328522},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.49359309673309326},{"id":"https://openalex.org/C80291951","wikidata":"https://www.wikidata.org/wiki/Q1200691","display_name":"Design by contract","level":5,"score":0.48192858695983887},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4263761639595032},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4089981019496918},{"id":"https://openalex.org/C60051680","wikidata":"https://www.wikidata.org/wiki/Q30267","display_name":"Aspect-oriented programming","level":3,"score":0.35787320137023926},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3355141282081604},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.2013120949268341},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.18453103303909302},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.1242419183254242},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.11037230491638184},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.09921684861183167},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C186846655","wikidata":"https://www.wikidata.org/wiki/Q3398377","display_name":"Software construction","level":4,"score":0.0},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3533767.3534222","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3533767.3534222","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W2026794345","https://openalex.org/W2539190473","https://openalex.org/W2604844934","https://openalex.org/W2790202156","https://openalex.org/W2805052744","https://openalex.org/W2805827286","https://openalex.org/W2846896781","https://openalex.org/W2884681705","https://openalex.org/W2889740224","https://openalex.org/W2905447857","https://openalex.org/W2908007588","https://openalex.org/W2955447707","https://openalex.org/W2963465913","https://openalex.org/W2963610883","https://openalex.org/W2964257386","https://openalex.org/W2969775414","https://openalex.org/W2970809537","https://openalex.org/W2982275082","https://openalex.org/W2984656466","https://openalex.org/W2999378142","https://openalex.org/W3000168638","https://openalex.org/W3005700089","https://openalex.org/W3034136313","https://openalex.org/W3043576244","https://openalex.org/W3098149161","https://openalex.org/W3105187050","https://openalex.org/W3121385509","https://openalex.org/W3122543528","https://openalex.org/W3122752779","https://openalex.org/W3125989628","https://openalex.org/W3133932565","https://openalex.org/W3137892723","https://openalex.org/W3151748982","https://openalex.org/W3178523963","https://openalex.org/W3183979683","https://openalex.org/W3217484985","https://openalex.org/W4210411324","https://openalex.org/W4288257480","https://openalex.org/W4289548059","https://openalex.org/W6776775275","https://openalex.org/W6805102222"],"related_works":["https://openalex.org/W2070229111","https://openalex.org/W1529395937","https://openalex.org/W2067692122","https://openalex.org/W2035862850","https://openalex.org/W2065407468","https://openalex.org/W1537921975","https://openalex.org/W2785957750","https://openalex.org/W2079777989","https://openalex.org/W2523138543","https://openalex.org/W2150693788"],"abstract_inverted_index":{"With":[0],"the":[1,26,33,37,72,96,101,117,135,184],"increasing":[2],"popularity":[3],"of":[4,35,51,79,115,131,179,192],"blockchain,":[5],"automatically":[6],"detecting":[7,65,167],"vulnerabilities":[8,23],"in":[9,183],"smart":[10,21,102,181],"contracts":[11,182],"is":[12,106,122],"becoming":[13],"a":[14,48,61,77,129,148,175],"significant":[15],"problem.":[16],"Prior":[17],"research":[18],"mainly":[19],"identifies":[20],"contract":[22,97,103],"without":[24],"considering":[25],"interactions":[27],"between":[28],"multiple":[29],"contracts.":[30],"Due":[31],"to":[32,82,140],"lack":[34],"analyzing":[36],"fine-grained":[38],"contextual":[39],"information":[40,99],"during":[41],"cross-contract":[42,66,89,111,168,189],"invocations,":[43],"existing":[44],"approaches":[45],"often":[46],"produced":[47],"large":[49],"number":[50],"false":[52,55],"positives":[53],"and":[54,86,124,133,164],"negatives.":[56],"This":[57],"paper":[58],"proposes":[59],"SmartDagger,":[60],"new":[62],"framework":[63],"for":[64,88,108,166],"vulnerability":[67,90],"through":[68],"static":[69],"analysis":[70,120],"at":[71],"bytecode":[73],"level.":[74],"SmartDagger":[75,93,126,154,173,186],"integrates":[76],"set":[78],"novel":[80],"mechanisms":[81],"ensure":[83],"its":[84,142],"effectiveness":[85],"efficiency":[87],"detection.":[91],"Particularly,":[92],"effectively":[94],"recovers":[95],"attribute":[98],"from":[100],"bytecode,":[104],"which":[105,121,138,193],"critical":[107],"accurately":[109],"identifying":[110],"vulnerabilities.":[112,169],"Besides,":[113],"instead":[114],"performing":[116],"typical":[118],"whole-program":[119],"heavy-weight":[123],"time-consuming,":[125],"selectively":[127],"analyzes":[128],"subset":[130],"functions":[132],"reuses":[134],"data-flow":[136],"results,":[137],"helps":[139],"improve":[141],"efficiency.":[143],"Our":[144],"further":[145],"evaluation":[146],"over":[147,174],"manually":[149],"labelled":[150],"dataset":[151,178],"showed":[152],"that":[153],"significantly":[155],"outperforms":[156],"other":[157],"state-of-the-art":[158],"tools":[159],"(i.e.,":[160],"Oyente,":[161],"Slither,":[162],"Osiris,":[163],"Mythril)":[165],"In":[170],"addition,":[171],"running":[172],"randomly":[176],"selected":[177],"250":[180],"real-world,":[185],"detects":[187],"11":[188],"vulnerabilities,":[190],"all":[191],"are":[194],"missed":[195],"by":[196],"prior":[197],"tools.":[198]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":23},{"year":2024,"cited_by_count":27},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
