{"id":"https://openalex.org/W4415329357","doi":"https://doi.org/10.48550/arxiv.2505.15756","title":"An Empirical Analysis of Vulnerability Detection Tools for Solidity Smart Contracts Using Line Level Manually Annotated Vulnerabilities","display_name":"An Empirical Analysis of Vulnerability Detection Tools for Solidity Smart Contracts Using Line Level Manually Annotated Vulnerabilities","publication_year":2025,"publication_date":"2025-05-21","ids":{"openalex":"https://openalex.org/W4415329357","doi":"https://doi.org/10.48550/arxiv.2505.15756"},"language":"en","primary_location":{"id":"pmh:oai:arXiv.org:2505.15756","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2505.15756","pdf_url":"https://arxiv.org/pdf/2505.15756","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"type":"preprint","indexed_in":["arxiv","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2505.15756","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091987471","display_name":"Francesco Salzano","orcid":"https://orcid.org/0000-0002-1029-4861"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Salzano, Francesco","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5120054864","display_name":"Cosmo Kevin Antenucci","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Antenucci, Cosmo Kevin","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079406478","display_name":"Simone Scalabrino","orcid":"https://orcid.org/0000-0003-1764-9685"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Scalabrino, Simone","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101499242","display_name":"Giovanni Rosa","orcid":"https://orcid.org/0000-0002-5241-1608"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rosa, Giovanni","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009727039","display_name":"Rocco Oliveto","orcid":"https://orcid.org/0000-0002-7995-8582"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Oliveto, Rocco","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5039062411","display_name":"Remo Pareschi","orcid":"https://orcid.org/0000-0002-4912-582X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Pareschi, Remo","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5091987471"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12394","display_name":"Insurance and Financial Risk Management","score":0.8194000124931335,"subfield":{"id":"https://openalex.org/subfields/2002","display_name":"Economics and Econometrics"},"field":{"id":"https://openalex.org/fields/20","display_name":"Economics, Econometrics and Finance"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12394","display_name":"Insurance and Financial Risk Management","score":0.8194000124931335,"subfield":{"id":"https://openalex.org/subfields/2002","display_name":"Economics and Econometrics"},"field":{"id":"https://openalex.org/fields/20","display_name":"Economics, Econometrics and Finance"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/solidity","display_name":"Solidity","score":0.7759000062942505},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.736299991607666},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.6025000214576721},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.5166000127792358},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.47130000591278076},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.47110000252723694}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8371000289916992},{"id":"https://openalex.org/C2778362873","wikidata":"https://www.wikidata.org/wiki/Q24909565","display_name":"Solidity","level":2,"score":0.7759000062942505},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.736299991607666},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.6025000214576721},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.5166000127792358},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.47130000591278076},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.47110000252723694},{"id":"https://openalex.org/C120936955","wikidata":"https://www.wikidata.org/wiki/Q2155640","display_name":"Empirical research","level":2,"score":0.38909998536109924},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.38760000467300415},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.38019999861717224},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.32190001010894775},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3019999861717224},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29319998621940613},{"id":"https://openalex.org/C58489278","wikidata":"https://www.wikidata.org/wiki/Q1172284","display_name":"Data set","level":2,"score":0.2750999927520752},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.2653000056743622},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.25270000100135803}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:arXiv.org:2505.15756","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2505.15756","pdf_url":"https://arxiv.org/pdf/2505.15756","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"doi:10.48550/arxiv.2505.15756","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2505.15756","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2505.15756","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2505.15756","pdf_url":"https://arxiv.org/pdf/2505.15756","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4415329357.pdf","grobid_xml":"https://content.openalex.org/works/W4415329357.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0],"rapid":[1],"adoption":[2],"of":[3,9,13,35,66,82,89,103,143,150,163,194,207,211],"blockchain":[4,27],"technology":[5],"highlighted":[6],"the":[7,11,47,79,94,101,122,139,148,187,191,204,208],"importance":[8],"ensuring":[10],"security":[12],"smart":[14,44,131,197],"contracts":[15,198],"due":[16],"to":[17,155,170,179,186,213],"their":[18],"critical":[19],"role":[20],"in":[21,85,138],"automated":[22,36],"business":[23],"logic":[24],"execution":[25],"on":[26,110,181],"platforms.":[28],"This":[29,183],"paper":[30],"provides":[31],"an":[32,63],"empirical":[33,205],"evaluation":[34,77,206],"vulnerability":[37,74,157,201],"analysis":[38,55],"tools":[39,84,145,165,212],"specifically":[40],"designed":[41],"for":[42],"Solidity":[43],"contracts.":[45,132],"Leveraging":[46],"extensive":[48],"SmartBugs":[49],"2.0":[50],"framework,":[51],"which":[52],"includes":[53],"20":[54],"tools,":[56],"we":[57,69,117],"conducted":[58],"a":[59,104,161],"comprehensive":[60],"assessment":[61],"using":[62],"annotated":[64,71],"dataset":[65,193],"2,182":[67],"instances":[68],"manually":[70,195],"with":[72,121,199],"line-level":[73,200],"labels.":[75],"Our":[76,133],"highlights":[78],"detection":[80,108,127,153],"effectiveness":[81,102],"these":[83],"detecting":[86],"various":[87],"types":[88],"vulnerabilities,":[90],"as":[91],"categorized":[92],"by":[93,189],"DASP":[95],"TOP":[96],"10":[97],"taxonomy.":[98],"We":[99,159],"evaluated":[100],"Large":[105],"Language":[106],"Model-based":[107],"method":[109],"two":[111,123],"popular":[112],"datasets.":[113],"In":[114],"this":[115],"case,":[116],"obtained":[118],"inconsistent":[119],"results":[120],"datasets,":[124],"showing":[125],"unreliable":[126],"when":[128],"analyzing":[129],"real-world":[130],"study":[134,184],"identifies":[135],"significant":[136],"variations":[137],"accuracy":[140],"and":[141,146,203],"reliability":[142],"different":[144],"demonstrates":[147],"advantages":[149],"combining":[151],"multiple":[152],"methods":[154],"improve":[156],"identification.":[158],"identified":[160],"set":[162],"3":[164],"that,":[166],"combined,":[167],"achieve":[168],"up":[169],"76.78\\%":[171],"found":[172],"vulnerabilities":[173],"taking":[174],"less":[175],"than":[176],"one":[177],"minute":[178],"run,":[180],"average.":[182],"contributes":[185],"field":[188],"releasing":[190],"largest":[192],"analyzed":[196],"annotations":[202],"greatest":[209],"number":[210],"date.":[214]},"counts_by_year":[],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-19T00:00:00"}
