Evaluation of Smart Contract Vulnerability Analysis Tools: A Domain-Specific Perspective
Abstract
:1. Introduction
- Which tool performs best in analyzing the vulnerability of smart energy contracts?
- Do energy contracts contain more vulnerabilities and poor coding practices compared to other classes of contracts?
- Are there domain-specific security flaws that existing tools fail to detect?
- Are certain state-of-the-art vulnerability analysis tools more effective in specific application domains?
- Is there any benefit to developing domain-specific vulnerability detection tools?
2. Background and Motivation
3. Vulnerability Analysis Tools
- Honeybadger [20] is an Oyente-based honeypot detection system that relies on symbolic execution and well-defined heuristics.
- Osiris [21] is another Oyente-based tool that claims to be capable of finding previously unknown critical vulnerabilities in some cases. Using symbolic execution coupled with taint analysis, Orisis offers the detection of a diverse range of defects with improved detection specificity.
- Solhint [22] was proposed as a linting tool for solidity smart contracts. Using pre-configured patterns and rulesets, it offers a good coverage of known security defects.
- Smartcheck [23] validates contracts against XPAth queries using their XML representation. This intermediate representation facilitates the localization of detections across the source code to provide complete code coverage.
- Oyente [24] leverages operational semantics to search for execution traces in the code where the transaction sequence has affected the Ether flow or the result of computations is dependent on timestamps.
- Conkas [20] is another static analysis method that incorporates control flow graphs (CFGs) as intermediate representations for symbolic execution. If the user does not specify the dependency files, Conkas is not capable of tracing the vulnerabilities encapsulated in the library files.
- Mythril [25] is intended to uncover common security issues and cannot detect the concerns ingrained in business logic. It incorporates concolic, taint, and control flow analysis to search for attributes that cause vulnerabilities in smart contracts.
- Slither [26] employs its own internal representation language for an intermediate representation and performs data flow and taint analysis for information retrieval and refinement. Slither determines a set of predefined analyses and a static single assessment (SSA) in a multistage procedure. With the abstract syntax tree (AST) as input, it can provide enhanced information to the other components and simplify the computation of a diverse array of code analysis.
- Confuzzius [27] is the first hybrid fuzzer that integrates evolutionary fuzzing with constraint solving to explore both shallow and deep fragments of contracts. Using dynamic data dependency analysis, Confuzzius can derive transaction sequences that lead to states with implicit security flaws.
4. Domain-Specific Perspective
Listing 1. Sample energy smart contract. |
5. Analysis
5.1. Benchmark
5.2. Energy
6. Discussion
Listing 2. Smart contract with reentrancy. |
7. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Abbreviations
DApps | Decentralized Applications |
EVM | Ethereum Virtual Machine |
XML | Extensible Markup Language |
XPath | XML Path Language |
CE | Code Elements |
RR | Relationship Restrictions |
ER | Element Restrictions |
CFG | Control Flow Graphs |
SSA | Static Single Assessment |
AST | Abstract Syntax Tree |
SB | Smart Bugs |
LLOC | Logical Lines of Code |
NL | Nesting Levels |
NA | Number of Attributes |
NOS | Number of Statements |
CBO | Coupling Between Objects |
DIT | Deeper Inheritance Tree |
SLOC | Source Lines of Code |
SC | Smart Contract |
FP | False Positive |
FN | False Negative |
References
- Wu, C.; Xiong, J.; Xiong, H.; Zhao, Y.; Yi, W. A review on recent progress of smart contract in blockchain. IEEE Access 2022, 10, 50839–50863. [Google Scholar] [CrossRef]
- Singh, A.; Parizi, R.M.; Zhang, Q.; Choo, K.K.R.; Dehghantanha, A. Blockchain smart contracts formalization: Approaches and challenges to address vulnerabilities. Comput. Secur. 2020, 88, 101654. [Google Scholar] [CrossRef]
- Kushwaha, S.S.; Joshi, S.; Singh, D.; Kaur, M.; Lee, H.N. Systematic review of security vulnerabilities in ethereum blockchain smart contract. IEEE Access 2022, 10, 6605–6621. [Google Scholar] [CrossRef]
- Code Is Law. Available online: https://ethereumclassic.org/why-classic/code-is-law (accessed on 11 November 2022).
- Nikolić, I.; Kolluri, A.; Sergey, I.; Saxena, P.; Hobor, A. Finding the greedy, prodigal, and suicidal contracts at scale. In Proceedings of the 34th Annual Computer Security Applications Conference, San Juan, PR, USA, 3–7 December 2018; pp. 653–663. [Google Scholar]
- Aidee, N.A.N.; Johar, M.G.M.; Alkawaz, M.H.; Hajamydeen, A.I.; Al-Tamimi, M.S.H. Vulnerability assessment on ethereum based smart contract applications. In Proceedings of the 2021 IEEE International Conference on Automatic Control & Intelligent Systems (I2CACIS), Shah Alam, Malaysia, 26 June 2021; pp. 13–18. [Google Scholar]
- Sayeed, S.; Marco-Gisbert, H.; Caira, T. Smart contract: Attacks and protections. IEEE Access 2020, 8, 24416–24427. [Google Scholar] [CrossRef]
- Ibba, G.; Ortu, M. Analysis of the Relationship between Smart Contracts’ Categories and Vulnerabilities. In Proceedings of the 2022 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), Honolulu, HI, USA, 15–18 March 2022; pp. 1212–1218. [Google Scholar]
- Kalra, S.; Goel, S.; Dhawan, M.; Sharma, S. ZEUS: Analyzing Safety of Smart Contracts. In Proceedings of the 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, CA, USA, 18–21 February 2018. [Google Scholar]
- Chia, V.; Hartel, P.; Hum, Q.; Ma, S.; Piliouras, G.; Reijsbergen, D.; Van Staalduinen, M.; Szalachowski, P. Rethinking blockchain security: Position paper. In Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada, 30 July–3 August 2018; pp. 1273–1280. [Google Scholar]
- Demir, M.; Alalfi, M.; Turetken, O.; Ferworn, A. Security smells in smart contracts. In Proceedings of the 2019 IEEE 19th International Conference on Software Quality, Reliability and Security Companion (QRS-C), Sofia, Bulgaria, 22–26 July 2019; pp. 442–449. [Google Scholar]
- Chen, J.; Xia, X.; Lo, D.; Grundy, J.; Luo, X.; Chen, T. Defining smart contract defects on ethereum. IEEE Trans. Softw. Eng. 2020, 48, 327–345. [Google Scholar] [CrossRef]
- Kannengießer, N.; Lins, S.; Sander, C.; Winter, K.; Frey, H.; Sunyaev, A. Challenges and common solutions in smart contract development. IEEE Trans. Softw. Eng. 2021, 48, 4291–4318. [Google Scholar] [CrossRef]
- Górski, T. Reconfigurable Smart Contracts for Renewable Energy Exchange with Re-Use of Verification Rules. Appl. Sci. 2022, 12, 5339. [Google Scholar] [CrossRef]
- Durieux, T.; Ferreira, J.F.; Abreu, R.; Cruz, P. Empirical review of automated analysis tools on 47,587 ethereum smart contracts. In Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering, Seoul, Republic of Korea, 27 June–19 July 2020; pp. 530–541. [Google Scholar]
- Agarwal, R.; Thapliyal, T.; Shukla, S. Analyzing malicious activities and detecting adversarial behavior in cryptocurrency based permissionless blockchains: An Ethereum usecase. Distrib. Ledger Technol. Res. Pract. 2022, 1, 1–21. [Google Scholar] [CrossRef]
- Barreto, C.; Eghtesad, T.; Eisele, S.; Laszka, A.; Dubey, A.; Koutsoukos, X. Cyber-attacks and mitigation in blockchain based transactive energy systems. In Proceedings of the 2020 IEEE Conference on Industrial Cyberphysical Systems (ICPS), Tampere, Finland, 9–12 June 2020; Volume 1, pp. 129–136. [Google Scholar]
- Shi, C.; Xiang, Y.; Yu, J.; Gao, L.; Sood, K.; Doss, R.R.M. A bytecode-based approach for smart contract classification. In Proceedings of the 2022 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), Honolulu, HI, USA, 15–18 March 2022; pp. 1046–1054. [Google Scholar]
- Kushwaha, S.S.; Joshi, S.; Singh, D.; Kaur, M.; Lee, H.N. Ethereum smart contract analysis tools: A systematic review. IEEE Access 2022, 10, 57037–57062. [Google Scholar] [CrossRef]
- Smartbugs. Smartbugs/Smartbugs: Smartbugs: A Framework to Analyze Ethereum Smart Contracts. Available online: https://github.com/smartbugs/smartbugs (accessed on 19 July 2023).
- Torres, C.F.; Schütte, J.; State, R. Osiris: Hunting for integer bugs in ethereum smart contracts. In Proceedings of the 34th Annual Computer Security Applications Conference, San Juan, PR, USA, 3–7 December 2018; pp. 664–676. [Google Scholar]
- Solhint. Available online: https://protofire.github.io/solhint/ (accessed on 19 July 2023).
- Tikhomirov, S.; Voskresenskaya, E.; Ivanitskiy, I.; Takhaviev, R.; Marchenko, E.; Alexandrov, Y. Smartcheck: Static analysis of ethereum smart contracts. In Proceedings of the 1st International Workshop on Emerging Trends in Software Engineering for Blockchain, Gothenburg, Sweden, 27 May–3 June 2018; pp. 9–16. [Google Scholar]
- Luu, L.; Chu, D.H.; Olickel, H.; Saxena, P.; Hobor, A. Making smart contracts smarter. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24–28 October 2016; pp. 254–269. [Google Scholar]
- ConsenSys. Consensys/Surya: A Set of Utilities for Exploring Solidity Contracts. Available online: https://github.com/ConsenSys/surya (accessed on 19 July 2023).
- Feist, J.; Grieco, G.; Groce, A. Slither: A static analysis framework for smart contracts. In Proceedings of the 2019 IEEE/ACM 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB), Montreal, QC, Canada, 27 May 2019; pp. 8–15. [Google Scholar]
- Torres, C.F.; Iannillo, A.K.; Gervais, A.; State, R. Confuzzius: A data dependency-aware hybrid fuzzer for smart contracts. In Proceedings of the 2021 IEEE European Symposium on Security and Privacy (EuroS&P), Vienna, Austria, 6–10 September 2021; pp. 103–119. [Google Scholar]
- Lashkari, B.; Musilek, P. Detection and Analysis of Ethereum Energy Smart Contracts. Appl. Sci. 2023, 13, 6027. [Google Scholar] [CrossRef]
- Kirli, D.; Couraud, B.; Robu, V.; Salgado-Bravo, M.; Norbu, S.; Andoni, M.; Antonopoulos, I.; Negrete-Pincetic, M.; Flynn, D.; Kiprakis, A. Smart contracts in energy systems: A systematic review of fundamental approaches and implementations. Renew. Sustain. Energy Rev. 2022, 158, 112013. [Google Scholar] [CrossRef]
- Zhang, P.; Xiao, F.; Luo, X. A framework and dataset for bugs in ethereum smart contracts. In Proceedings of the 2020 IEEE International Conference on Software Maintenance and Evolution (ICSME), Adelaide, Australia, 27 September–3 October 2020; pp. 139–150. [Google Scholar]
- Sebastian-Cardenas, D.J.; Gourisetti, S.N.G.; Saha, S.S.; Khan, K.; Tillman, L.C.; Cali, U.; Hughes, T. Cybersecurity and Privacy Aspects of Smart Contracts in the Energy Domain. In Proceedings of the 2022 IEEE 1st Global Emerging Technology Blockchain Forum: Blockchain & Beyond (iGETblockchain), Irvine, CA, USA, 7–11 November 2022; pp. 1–6. [Google Scholar]
- Fadhel, N.; Lombardi, F.; Aniello, L.; Margheri, A.; Sassone, V. Towards a semantic modelling for threat analysis of IoT applications: A case study on transactive energy. In Proceedings of the Living in the Internet of Things (IoT 2019), London, UK, 1–2 May 2019. [Google Scholar]
- Ford, T. Benchmarking Ethereum Smart Contract Static Analysis Tools. Ph.D. Thesis, Texas A&M University, College Station, TX, USA, 2022. [Google Scholar]
- Xue, Y.; Ma, M.; Lin, Y.; Sui, Y.; Ye, J.; Peng, T. Cross-contract static analysis for detecting practical reentrancy vulnerabilities in smart contracts. In Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, Melbourne, Australia, 21–25 September 2020; pp. 1029–1040. [Google Scholar]
- Wu, H.; Zhang, Z.; Wang, S.; Lei, Y.; Lin, B.; Qin, Y.; Zhang, H.; Mao, X. Peculiar: Smart contract vulnerability detection based on crucial data flow graph and pre-training techniques. In Proceedings of the 2021 IEEE 32nd International Symposium on Software Reliability Engineering (ISSRE), Wuhan, China, 25–28 October 2021; pp. 378–389. [Google Scholar]
- Ghaleb, A.; Pattabiraman, K. How effective are smart contract analysis tools? evaluating smart contract static analysis tools using bug injection. In Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual, 18–22 July 2020; pp. 415–427. [Google Scholar]
- Rameder, H.; Di Angelo, M.; Salzer, G. Review of automated vulnerability analysis of smart contracts on Ethereum. Front. Blockchain 2022, 5, 814977. [Google Scholar] [CrossRef]
- Sifra, E.M. Security Vulnerabilities and Countermeasures of Smart Contracts: A Survey. In Proceedings of the 2022 IEEE International Conference on Blockchain (Blockchain), Espoo, Finland, 22–25 August 2022; pp. 512–515. [Google Scholar]
- Zhang, Z.; Lei, Y.; Yan, M.; Yu, Y.; Chen, J.; Wang, S.; Mao, X. Reentrancy Vulnerability Detection and Localization: A Deep Learning Based Two-phase Approach. In Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, Rochester, MI, USA, 10–14 October 2022; pp. 1–13. [Google Scholar]
- Kaur, G.; Habibi Lashkari, A.; Sharafaldin, I.; Habibi Lashkari, Z. Smart Contracts and DeFi Security and Threats. In Understanding Cybersecurity Management in Decentralized Finance: Challenges, Strategies, and Trends; Springer: Berlin/Heidelberg, Germany, 2023; pp. 91–111. [Google Scholar]
- He, D.; Wu, R.; Li, X.; Chan, S.; Guizani, M. Detection of Vulnerabilities of Blockchain Smart Contracts. IEEE Internet Things J. 2023, 10, 12178–12185. [Google Scholar] [CrossRef]
- Solidity. Available online: https://solidity-by-example.org/call/ (accessed on 19 July 2023).
- Solidity. Available online: https://solidity-by-example.org/sending-ether/ (accessed on 19 July 2023).
Analysis Tools | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|
Vulnerabilities | Metrics | Confuzzius | Conkas | Honeybadger | Mythril | Osiris | Oyente | Slither | Smartcheck | Solhint |
Bad randomness # 1 | Duration | 8.737881184 | 43.17423201 | 42.6293509 | 117.7532399 | 35.8527348 | 12.72187996 | 2.460914135 | 7.229845047 | 2.348021984 |
Detection | ✔ | ✕ | ✕ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |
Bad randomness #2 | Duration | 5.140118837 | 4.026548862 | 77.663939 | 35.02412128 | 4.400139093 | 9.356572151 | 2.505437136 | 8.295716047 | 2.406748772 |
Detection | ✔ | ✔ | ✕ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |
Bad randomness #3 | Duration | 5.883338928 | 5.733039141 | 4.730108023 | 23.37867403 | 5.190639257 | 4.574568987 | 4.68672204 | 12.09117603 | 4.312572956 |
Detection | ✕ | ✕ | ✔ | ✔ | ✕ | ✕ | ✔ | ✔ | ✕ | |
Bad randomness #4 | Duration | 13.40132713 | 25.54713297 | 270.5662198 | 665.0775077 | 52.94841003 | 31.93285203 | 2.299463034 | 7.967276096 | 2.468337059 |
Detection | ✔ | ✔ | ✔ | ✕ | ✔ | ✔ | ✔ | ✔ | ✔ | |
Access Control #1 | Duration | 5.200572014 | 4.012099981 | 4.676064968 | 29.09435225 | 3.299962044 | 3.316371918 | 1.745553017 | 9.402060032 | 2.072764874 |
Detection | ✕ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |
Access Control #2 | Duration | 8.697600126 | 32.12349224 | 4.971230984 | 287.8219483 | 4.574355125 | 4.499389887 | 2.58026576 | 9.426314116 | 2.655647039 |
Detection | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |
Access Control #3 | Duration | 12.31246901 | 7.738770008 | 4.431187153 | 75.809196 | 4.460098982 | 3.817485809 | 3.226504803 | 12.97784209 | 5.038857222 |
Detection | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |
Access Control #4 | Duration | 9.177275181 | 12.17278075 | 6.860949993 | 187.0252879 | 3.602584839 | 5.654606819 | 4.357161045 | 8.529126167 | 2.500974655 |
Detection | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |
Reentrancy #1 | Duration | 26.17377186 | 556.3664987 | 22.80289483 | 64.55575109 | 106.8687789 | 56.45254993 | 3.139178038 | 103.8020959 | 7.275887251 |
Detection | ✔ | ✔ | ✕ | ✕ | ✔ | ✔ | ✔ | ✕ | ✕ | |
Reentrancy #2 | Duration | 8.124588966 | 3.576477051 | 2.981256962 | 66.90424418 | 3.465710878 | 4.1645298 | 2.385936975 | 8.54885602 | 2.344093084 |
Detection | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | |
Reentrancy #3 | Duration | 10.48157692 | 3.779005289 | 2.671264648 | 18.282516 | 4.615365267 | 4.575246096 | 2.574982882 | 11.23986912 | 2.040110826 |
Detection | ✔ | ✔ | ✕ | ✕ | ✔ | ✔ | ✔ | ✕ | ✕ | |
Reentrancy #4 | Duration | 3.70638895 | 3.037296772 | 2.180539131 | 26.53004694 | 4.16880393 | 3.100974798 | 1.809810877 | 5.179394245 | 2.098110199 |
Detection | ✔ | ✔ | ✕ | ✕ | ✔ | ✔ | ✔ | ✕ | ✕ | |
Time Manipulation #1 | Duration | 4.84670186 | 3.274656057 | 5.653620005 | 21.299891 | 3.301398754 | 2.669829845 | 1.798388243 | 11.70897198 | 1.994317055 |
Detection | ✔ | ✔ | ✕ | ✔ | ✔ | ✕ | ✔ | ✕ | ✕ | |
Time Manipulation #2 | Duration | 20.45597315 | 3.69738698 | 4.367240906 | 271.6076109 | 3.699479103 | 5.648472071 | 2.266718149 | 14.23034596 | 4.238348961 |
Detection | ✕ | ✔ | ✕ | ✔ | ✕ | ✕ | ✔ | ✕ | ✕ | |
Time Manipulation #3 | Duration | 5.510486841 | 4.209807873 | 3.619537115 | 10.61389804 | 4.293602228 | 3.043504953 | 2.796922207 | 30.98754811 | 3.026561022 |
Detection | ✔ | ✔ | ✕ | ✕ | ✔ | ✔ | ✕ | ✕ | ✕ | |
Time Manipulation #4 | Duration | 4.280456066 | 5.245132685 | 6.81735301 | 47.40231466 | 3.229922056 | 9.511505842 | 2.836236 | 115.5346749 | 10.58052206 |
Detection | ✔ | ✔ | ✕ | ✕ | ✕ | ✕ | ✕ | ✕ | ✕ | |
Arithmetic #1 | Duration | 45.14880013 | 168.2332873 | 134.6065137 | 1164.381769 | 68.61356902 | 22.46259093 | 2.334701061 | 66.02848577 | 1.904673099 |
Detection | ✔ | ✔ | ✕ | ✕ | ✔ | ✔ | ✔ | ✔ | ✕ | |
Arithmetic #2 | Duration | 5.890422106 | 4.1947999 | 3.174847841 | 44.70256901 | 3.405447006 | 4.478739262 | 2.407759905 | 6.777735949 | 2.308213234 |
Detection | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✕ | |
Arithmetic #3 | Duration | 5.996674776 | 10.97875404 | 4.431731939 | 10.24328518 | 3.966572762 | 2.237618208 | 2.955077171 | 6.18700695 | 3.424798965 |
Detection | ✕ | ✔ | ✕ | ✔ | ✔ | ✔ | ✔ | ✔ | ✕ | |
Arithmetic #4 | Duration | 4.674688101 | 3.455864906 | 2.2919631 | 15.65696096 | 2.958543062 | 3.122613907 | 1.941857815 | 5.639773846 | 1.919955969 |
Detection | ✕ | ✔ | ✕ | ✕ | ✔ | ✔ | ✔ | ✔ | ✕ | |
Overall | Ave Run-time | 11.09354825 | 41.26028123 | 30.50163874 | 144.1282029 | 16.69934145 | 9.188536117 | 2.730805665 | 20.65260627 | 3.381286818 |
TP | 0.67 | 0.83 | 0.33 | 0.54 | 0.79 | 0.71 | 0.92 | 0.58 | 0.33 | |
FN | 0.33 | 0.17 | 0.67 | 0.46 | 0.25 | 0.29 | 0.08 | 0.42 | 0.67 | |
Accuracy | 0.67 | 0.83 | 0.33 | 0.54 | 0.79 | 0.70 | 0.92 | 0.58 | 0.33 |
Domain | Contract | Conkas | Slither | Osiris |
---|---|---|---|---|
Energy | Xad417b.sol | ✔ | ✕ | ✕ |
X3d9900.sol | ✔ | ✕ | ✕ | |
X9001cb.sol | ✔ | ✕ | ✕ | |
Xe69ba3.sol | ✔ | ✔ | ✕ | |
X5f10fd.sol | ✔ | ✕ | ✕ | |
Non-Energy | Xb99bf.sol | ✔ | ✔ | ✕ |
XE3bcd.sol | ✔ | ✕ | ✕ | |
X92658.sol | ✔ | ✕ | ✕ | |
X6b0481.sol | ✔ | ✔ | ✕ | |
X326c72.sol | ✔ | ✕ | ✕ | |
X75d9e6.sol | ✔ | ✕ | ✕ | |
X091d3f.sol | ✔ | ✔ | ✔ |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Lashkari, B.; Musilek, P. Evaluation of Smart Contract Vulnerability Analysis Tools: A Domain-Specific Perspective. Information 2023, 14, 533. https://doi.org/10.3390/info14100533
Lashkari B, Musilek P. Evaluation of Smart Contract Vulnerability Analysis Tools: A Domain-Specific Perspective. Information. 2023; 14(10):533. https://doi.org/10.3390/info14100533
Chicago/Turabian StyleLashkari, Bahareh, and Petr Musilek. 2023. "Evaluation of Smart Contract Vulnerability Analysis Tools: A Domain-Specific Perspective" Information 14, no. 10: 533. https://doi.org/10.3390/info14100533
APA StyleLashkari, B., & Musilek, P. (2023). Evaluation of Smart Contract Vulnerability Analysis Tools: A Domain-Specific Perspective. Information, 14(10), 533. https://doi.org/10.3390/info14100533