{"id":"https://openalex.org/W7134235221","doi":"https://doi.org/10.48550/arxiv.2603.06029","title":"When Specifications Meet Reality: Uncovering API Inconsistencies in Ethereum Infrastructure","display_name":"When Specifications Meet Reality: Uncovering API Inconsistencies in Ethereum Infrastructure","publication_year":2026,"publication_date":"2026-03-06","ids":{"openalex":"https://openalex.org/W7134235221","doi":"https://doi.org/10.48550/arxiv.2603.06029"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2603.06029","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.06029","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2603.06029","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Ma, Jie","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Ma, Jie","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"He, Ningyu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"He, Ningyu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Xi, Jinwen","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xi, Jinwen","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Xing, Mingzhe","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xing, Mingzhe","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Liu, Liangxin","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Liu, Liangxin","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Luo, Jiushenzi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Luo, Jiushenzi","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Fu, Xiaopeng","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Fu, Xiaopeng","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Wu, Chiachih","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wu, Chiachih","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Wang, Haoyu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wang, Haoyu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Gao, Ying","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gao, Ying","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Yue, Yinliang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yue, Yinliang","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":11,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.3562000095844269,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.3562000095844269,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.2468000054359436,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.21359999477863312,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.498199999332428},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.48809999227523804},{"id":"https://openalex.org/keywords/debugging","display_name":"Debugging","score":0.4618000090122223},{"id":"https://openalex.org/keywords/software-bug","display_name":"Software bug","score":0.45989999175071716},{"id":"https://openalex.org/keywords/pace","display_name":"Pace","score":0.4587000012397766},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.43970000743865967},{"id":"https://openalex.org/keywords/interface","display_name":"Interface (matter)","score":0.42399999499320984},{"id":"https://openalex.org/keywords/application-programming-interface","display_name":"Application programming interface","score":0.3725000023841858}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7347999811172485},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.498199999332428},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.48809999227523804},{"id":"https://openalex.org/C168065819","wikidata":"https://www.wikidata.org/wiki/Q845566","display_name":"Debugging","level":2,"score":0.4618000090122223},{"id":"https://openalex.org/C1009929","wikidata":"https://www.wikidata.org/wiki/Q179550","display_name":"Software bug","level":3,"score":0.45989999175071716},{"id":"https://openalex.org/C2777526511","wikidata":"https://www.wikidata.org/wiki/Q691543","display_name":"Pace","level":2,"score":0.4587000012397766},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.43970000743865967},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.4357999861240387},{"id":"https://openalex.org/C113843644","wikidata":"https://www.wikidata.org/wiki/Q901882","display_name":"Interface (matter)","level":4,"score":0.42399999499320984},{"id":"https://openalex.org/C99613125","wikidata":"https://www.wikidata.org/wiki/Q165194","display_name":"Application programming interface","level":2,"score":0.3725000023841858},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.34540000557899475},{"id":"https://openalex.org/C2777267654","wikidata":"https://www.wikidata.org/wiki/Q3519023","display_name":"Test (biology)","level":2,"score":0.3359000086784363},{"id":"https://openalex.org/C199519371","wikidata":"https://www.wikidata.org/wiki/Q942695","display_name":"Source lines of code","level":3,"score":0.3319999873638153},{"id":"https://openalex.org/C132964779","wikidata":"https://www.wikidata.org/wiki/Q2110223","display_name":"Raw data","level":2,"score":0.32989999651908875},{"id":"https://openalex.org/C131275738","wikidata":"https://www.wikidata.org/wiki/Q7445023","display_name":"Security bug","level":5,"score":0.30889999866485596},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3061999976634979},{"id":"https://openalex.org/C2778348673","wikidata":"https://www.wikidata.org/wiki/Q739302","display_name":"Production (economics)","level":2,"score":0.29829999804496765},{"id":"https://openalex.org/C128942645","wikidata":"https://www.wikidata.org/wiki/Q1568346","display_name":"Test case","level":3,"score":0.2930999994277954},{"id":"https://openalex.org/C53942775","wikidata":"https://www.wikidata.org/wiki/Q1211721","display_name":"Code coverage","level":3,"score":0.2865999937057495},{"id":"https://openalex.org/C89505385","wikidata":"https://www.wikidata.org/wiki/Q47146","display_name":"User interface","level":2,"score":0.2842999994754791},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.27489998936653137},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.2703000009059906},{"id":"https://openalex.org/C93226319","wikidata":"https://www.wikidata.org/wiki/Q193137","display_name":"Differential (mechanical device)","level":2,"score":0.2678000032901764},{"id":"https://openalex.org/C512654426","wikidata":"https://www.wikidata.org/wiki/Q19652","display_name":"Public domain","level":2,"score":0.262800008058548},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.2565000057220459}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2603.06029","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.06029","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2603.06029","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.06029","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"score":0.6268858313560486,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0,199],"Ethereum":[1,154,200,225],"ecosystem,":[2],"which":[3,33],"secures":[4],"over":[5],"$381":[6],"billion":[7],"in":[8,162,214],"assets,":[9],"fundamentally":[10],"relies":[11],"on":[12],"client":[13,98],"APIs":[14,27],"as":[15],"the":[16,22,83,157,223],"sole":[17],"interface":[18],"between":[19],"users":[20],"and":[21,42,55,70,122,130,192,218],"blockchain.":[23],"However,":[24],"these":[25,178],"critical":[26],"suffer":[28],"from":[29,76,145],"widespread":[30],"implementation":[31,78],"inconsistencies,":[32],"can":[34],"lead":[35],"to":[36,44,63,72,90,141,184,222],"financial":[37],"discrepancies,":[38],"degraded":[39],"user":[40],"experiences,":[41],"threats":[43],"network":[45],"reliability.":[46],"Despite":[47],"this":[48],"criticality,":[49],"existing":[50,190],"testing":[51,87],"approaches":[52],"remain":[53],"manual":[54],"incomplete:":[56],"they":[57],"require":[58],"extensive":[59],"domain":[60],"expertise,":[61],"struggle":[62],"keep":[64],"pace":[65],"with":[66,126,169],"Ethereum's":[67,96],"rapid":[68],"evolution,":[69],"fail":[71],"distinguish":[73,142],"genuine":[74,143],"bugs":[75,144,161],"acceptable":[77,146],"variations.":[79,147],"We":[80],"present":[81],"APIDiffer,":[82],"first":[84],"specification-guided":[85,113],"differential":[86],"framework":[88],"designed":[89],"automatically":[91],"detect":[92],"API":[93,102,160],"inconsistencies":[94],"across":[95,150],"diverse":[97],"ecosystem.":[99],"APIDiffer":[100,165,181],"transforms":[101],"specifications":[103],"into":[104],"comprehensive":[105],"test":[106,114,210],"suites":[107],"through":[108],"two":[109],"key":[110],"innovations:":[111],"(1)":[112],"input":[115],"generation":[116],"that":[117,136],"creates":[118],"both":[119],"syntactically":[120],"valid":[121],"invalid":[123],"requests":[124],"enriched":[125],"real-time":[127],"blockchain":[128],"data,":[129],"(2)":[131],"specification-aware":[132],"false":[133,194],"positive":[134,195],"filtering":[135],"leverages":[137],"large":[138],"language":[139],"models":[140],"Our":[148],"evaluation":[149],"all":[151],"11":[152],"major":[153],"clients":[155],"reveals":[156],"pervasiveness":[158],"of":[159],"production":[163],"systems.":[164],"uncovered":[166],"72":[167],"bugs,":[168],"90.28%":[170],"already":[171],"confirmed":[172],"or":[173],"fixed":[174],"by":[175,197],"developers.":[176],"Beyond":[177],"raw":[179],"numbers,":[180],"achieves":[182],"up":[183],"89.67%":[185],"higher":[186],"code":[187],"coverage":[188],"than":[189],"tools":[191],"reduces":[193],"rates":[196],"37.38%.":[198],"community's":[201],"response":[202],"validates":[203],"our":[204,209,216],"impact:":[205],"developers":[206],"have":[207],"integrated":[208],"cases,":[211],"expressed":[212],"interest":[213],"adopting":[215],"methodology,":[217],"escalated":[219],"one":[220],"bug":[221],"official":[224],"Project":[226],"Management":[227],"meeting.":[228]},"counts_by_year":[],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2026-03-02T00:00:00"}
