\begin{thebibliography}{1} \bibitem{smartian} Jaeseung Choi, Doyeon Kim, Soomin Kim, Gustavo Grieco, Alex Groce, and Sang~Kil Cha. \newblock Smartian: Enhancing smart contract fuzzing with static and dynamic data-flow analyses. \newblock In {\em 2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE)}, pages 227--239, 2021. \bibitem{doughoyte} doughoyte. \newblock Merdetoken: It's some hot shit. \newblock \url{https://github.com/Arachnid/uscc/tree/master/submissions-2017/doughoyte} [Accessed: Oct. 27th 2023]. \bibitem{teether} Johannes Krupp and Christian Rossow. \newblock {teEther}: Gnawing at ethereum to automatically exploit smart contracts. \newblock In {\em 27th USENIX Security Symposium (USENIX Security 18)}, pages 1317--1333, Baltimore, MD, August 2018. USENIX Association. \bibitem{fuzzdrivegen} Siddhasagar Pani, Harshita~Vani Nallagonda, Vigneswaran, Raveendra~Kumar Medicherla, and Rajan M. \newblock Smartfuzzdrivergen: Smart contract fuzzing automation for golang. \newblock In {\em Proceedings of the 16th Innovations in Software Engineering Conference}, ISEC '23, New York, NY, USA, 2023. Association for Computing Machinery. \bibitem{securify} Petar Tsankov, Andrei Dan, Dana Drachsler-Cohen, Arthur Gervais, Florian B\"{u}nzli, and Martin Vechev. \newblock Securify: Practical security analysis of smart contracts. \newblock In {\em Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security}, CCS '18, page 67–82, New York, NY, USA, 2018. Association for Computing Machinery. \end{thebibliography}