Last updated on Monday, October 06, 2025
@inproceedings{Demeyer2022isola,
author = {Demeyer, Serge and Rocha, Henrique and
Verheijke, Darin},
booktitle = {Proceedings {ISOLA 2022} (Leveraging Applications of
Formal Methods, Verification and Validation:
Engineering Principles)},
month = oct,
publisher = {Springer International Publishing},
title = {Refactoring Solidity Smart Contracts to Protect
Against Reentrancy Exploits},
year = {2022},
abstract = {Solidity is the dominant programming language for
specifying smart contracts deployed on the Ethereum
blockchain platform. Smart contracts permit the
exchange of cryptocurrency, and hence are vulnerable
to security attacks, most notably reentrancy
exploits. Extensions to the solidity language,
therefore, provide safer alternatives via
special-purpose syntactic constructs. Based on an
analysis of 26,799 contracts actually deployed on the
Ethereum platform, it appears that these safer
alternatives are indeed adopted. Next, we investigate
whether the SMTChecker provided with the Solidity
compiler is able to confirm that two safer
alternatives (``Check-Effects-Interactions'' and
``Mutex'') actually prevent against reentrancy
exploits.},
annote = {workshoppaper},
doi = {10.1007/978-3-031-19756-7_18},
}