z-logo
open-access-imgOpen Access
Do Automated Fixes Truly Mitigate Smart Contract Exploits?
Author(s) -
Sofia Bobadilla,
Monica Jin,
Martin Monperrus
Publication year - 2025
Publication title -
ieee transactions on software engineering
Language(s) - English
Resource type - Magazines
SCImago Journal Rank - 0.857
H-Index - 169
eISSN - 1939-3520
pISSN - 0098-5589
DOI - 10.1109/tse.2025.3618123
Subject(s) - computing and processing
Automated Program Repair (APR) for smart contract security promises to automatically mitigate smart contract vulnerabilities responsible for billions in financial losses. However, the true effectiveness of this research in addressing smart contract exploits remains uncharted territory. This paper bridges this critical gap by introducing a novel and systematic experimental framework for evaluating exploit mitigation of program repair tools for smart contracts. We qualitatively and quantitatively analyze 20 state-of-the-art APR tools using a dataset of 143 vulnerable smart contracts, for which we manually craft 91 executable exploits. We are the very first to define and measure the essential “exploit mitigation rate”, giving researchers and practitioners a real sense of effectiveness of cutting edge techniques. Our findings reveal substantial disparities in the state of the art, with an exploit mitigation rate ranging from a low of 29% to a high of 74%. Our study identifies systemic limitations, such as inconsistent functionality preservation, that must be addressed in future research on program repair for smart contracts.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom