{"id":"https://openalex.org/W7077871931","doi":"https://doi.org/10.48550/arxiv.2508.17964","title":"MoveScanner: Analysis of Security Risks of Move Smart Contracts","display_name":"MoveScanner: Analysis of Security Risks of Move Smart Contracts","publication_year":2025,"publication_date":"2025-08-25","ids":{"openalex":"https://openalex.org/W7077871931","doi":"https://doi.org/10.48550/arxiv.2508.17964"},"language":"en","primary_location":{"id":"pmh:doi:10.48550/arxiv.2508.17964","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Luo, Yuhe","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Luo, Yuhe","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Li, Zhongwen","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Li, Zhongwen","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Li, Xiaoqi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Li, Xiaoqi","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T12157","display_name":"Geochemistry and Geologic Mapping","score":0.36649999022483826,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12157","display_name":"Geochemistry and Geologic Mapping","score":0.36649999022483826,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13177","display_name":"Geological and Geophysical Studies","score":0.053199999034404755,"subfield":{"id":"https://openalex.org/subfields/1907","display_name":"Geology"},"field":{"id":"https://openalex.org/fields/19","display_name":"Earth and Planetary Sciences"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13067","display_name":"Geological Modeling and Analysis","score":0.03139999881386757,"subfield":{"id":"https://openalex.org/subfields/1906","display_name":"Geochemistry and Petrology"},"field":{"id":"https://openalex.org/fields/19","display_name":"Earth and Planetary Sciences"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.46389999985694885},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.4586000144481659},{"id":"https://openalex.org/keywords/security-through-obscurity","display_name":"Security through obscurity","score":0.40130001306533813},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.3959999978542328},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.39079999923706055},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.38109999895095825},{"id":"https://openalex.org/keywords/security-testing","display_name":"Security testing","score":0.3644999861717224},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.35429999232292175}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6883999705314636},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5507000088691711},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.46389999985694885},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.4586000144481659},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.4499000012874603},{"id":"https://openalex.org/C114869243","wikidata":"https://www.wikidata.org/wiki/Q133735","display_name":"Security through obscurity","level":5,"score":0.40130001306533813},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.3959999978542328},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.39079999923706055},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.38109999895095825},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.3644999861717224},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.35429999232292175},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.3517000079154968},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.3458000123500824},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.34119999408721924},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.3271999955177307},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.32519999146461487},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.31859999895095825},{"id":"https://openalex.org/C77109596","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Application security","level":5,"score":0.3084999918937683},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3061999976634979},{"id":"https://openalex.org/C13159133","wikidata":"https://www.wikidata.org/wiki/Q365674","display_name":"Security engineering","level":5,"score":0.2840999960899353},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.2833999991416931},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.2775999903678894},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.2680000066757202}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:doi:10.48550/arxiv.2508.17964","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},{"id":"doi:10.48550/arxiv.2508.17964","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2508.17964","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:doi:10.48550/arxiv.2508.17964","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"As":[0],"blockchain":[1],"technology":[2],"continues":[3],"to":[4,51,136,231],"evolve,":[5],"the":[6,37,56,67,74,161,178,184,199,212,238],"security":[7,38,48,71,119,181,195,217,234],"of":[8,39,69,118,132,194,214],"smart":[9,43,215],"contracts":[10,44],"has":[11],"increasingly":[12],"drawn":[13],"attention":[14],"from":[15],"both":[16],"academia":[17],"and":[18,28,55,77,100,127,143,146,153,203,208,227],"industry.":[19],"The":[20],"Move":[21,75,185],"language,":[22],"with":[23,60],"its":[24],"unique":[25,80],"resource":[26,122,149],"model":[27],"linear":[29],"type":[30],"system,":[31],"provides":[32,204],"a":[33,90,96,137,205,233],"solid":[34],"foundation":[35,207],"for":[36,211],"digital":[40],"assets.":[41],"However,":[42],"still":[45],"face":[46],"new":[47,192],"challenges":[49],"due":[50],"developer":[52],"programming":[53,201],"errors":[54],"potential":[57],"risks":[58,196],"associated":[59],"cross-module":[61,107],"interactions.":[62],"This":[63],"paper":[64,189],"systematically":[65],"analyzes":[66],"limitations":[68],"existing":[70],"tools":[72,182],"within":[73],"ecosystem":[76],"reveals":[78],"their":[79],"vulnerability":[81],"patterns.":[82],"To":[83],"address":[84],"these":[85],"issues,":[86],"it":[87],"introduces":[88,147],"MoveScanner,":[89],"static":[91],"analysis":[92,103,142,156,229],"tool":[93],"based":[94,197],"on":[95,198,223],"control":[97],"flow":[98,102],"graph":[99,109],"data":[101],"architecture.":[104],"By":[105],"incorporating":[106],"call":[108],"tracking,":[110],"MoveScanner":[111,134,169],"can":[112],"effectively":[113],"identify":[114],"five":[115],"key":[116],"types":[117,193],"vulnerabilities,":[120],"including":[121],"leaks,":[123],"weak":[124],"permission":[125],"management,":[126],"arithmetic":[128],"overflows.":[129],"In":[130],"terms":[131],"design,":[133],"adheres":[135],"modular":[138],"principle,":[139],"supports":[140],"bytecode-level":[141],"multi-chain":[144],"adaptation,":[145],"innovative":[148],"trajectory":[150],"tracking":[151],"algorithms":[152],"capability":[154],"matrix":[155],"methods,":[157],"thereby":[158],"significantly":[159],"reducing":[160],"false":[162],"positive":[163],"rate.":[164],"Empirical":[165],"results":[166],"show":[167],"that":[168],"achieved":[170],"88.2%":[171],"detection":[172],"accuracy":[173],"in":[174,180,183],"benchmark":[175],"testing,":[176],"filling":[177],"gap":[179],"ecosystem.":[186],"Furthermore,":[187],"this":[188],"identifies":[190],"twelve":[191],"resource-oriented":[200],"paradigm":[202],"theoretical":[206],"practical":[209],"experience":[210],"development":[213],"contract":[216,240],"mechanisms.":[218],"Future":[219],"work":[220],"will":[221],"focus":[222],"combining":[224],"formal":[225],"verification":[226],"dynamic":[228],"techniques":[230],"build":[232],"protection":[235],"framework":[236],"covering":[237],"entire":[239],"lifecycle":[241]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
