{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:06:40Z","timestamp":1775912800703,"version":"3.50.1"},"reference-count":73,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11]]},"DOI":"10.1109\/ase51524.2021.9678888","type":"proceedings-article","created":{"date-parts":[[2022,1,20]],"date-time":"2022-01-20T20:33:49Z","timestamp":1642710829000},"page":"227-239","source":"Crossref","is-referenced-by-count":149,"title":["SMARTIAN: Enhancing Smart Contract Fuzzing with Static and Dynamic Data-Flow Analyses"],"prefix":"10.1109","author":[{"given":"Jaeseung","family":"Choi","sequence":"first","affiliation":[]},{"given":"Doyeon","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Soomin","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Gustavo","family":"Grieco","sequence":"additional","affiliation":[]},{"given":"Alex","family":"Groce","sequence":"additional","affiliation":[]},{"given":"Sang Kil","family":"Cha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2018.8328743"},{"key":"ref72","article-title":"American Fuzzy Lop","author":"zalewski","year":"0"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380388"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3417064"},{"key":"ref39","first-page":"1317","article-title":"teether: Gnawing at ethereum to automatically exploit smart contracts","author":"krupp","year":"2018","journal-title":"Proceedings of the USENIX Security Symposium"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23082"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134103"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51280-4_34"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3404366"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3276486"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2019.23051"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238177"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363230"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23263"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00032"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/3194113.3194115"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3020266"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274737"},{"key":"ref28","first-page":"2577","article-title":"GREYONE: Data flow sensitive fuzzing","author":"gan","year":"2020","journal-title":"Proceedings of the USENIX Security Symposium"},{"key":"ref64","article-title":"Securify2","author":"tsankov","year":"0"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/WETSEB.2019.00008"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243780"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-NIER.2019.00009"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3037332"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.37"},{"key":"ref69","article-title":"Ethereum: A secure decentralised generalised transaction ledger","author":"wood","year":"0"},{"key":"ref2","article-title":"Assertion failure","year":"0"},{"key":"ref1","article-title":"Arbitrary jump with function type variable","year":"0"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00082"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/512950.512973"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00114"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/DAPPCON.2019.00018"},{"key":"ref23","article-title":"Analysis of the dao exploit","author":"daian","year":"2016"},{"key":"ref26","article-title":"Ethereum whitepaper","year":"0"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380364"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00133"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/1995376.1995394"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081750"},{"key":"ref58","author":"rival","year":"2020","journal-title":"Introduction to Static Analysis An Abstract Interpretation Perspective"},{"key":"ref57","article-title":"Ethereum ide and tools for the web","author":"remix","year":"2017"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23404"},{"key":"ref55","first-page":"729","article-title":"MoonShine: Optimizing OS fuzzer seed selection with trace distillation","author":"pailoor","year":"2018","journal-title":"Proceedings of the USENIX Security Symposium"},{"key":"ref54","first-page":"653","article-title":"Finding the greedy, prodigal, and suicidal contracts at scale","author":"nikoliundefined","year":"2018","journal-title":"Proceedings of the Annual Computer Security Applications Conference"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380334"},{"key":"ref52","article-title":"Smashing ethereum smart contracts for fun and actual profit","author":"mueller","year":"2018","journal-title":"Proceedings of the HITB Security Conference"},{"key":"ref10","article-title":"Solidity documentation","year":"0"},{"key":"ref11","article-title":"Solidity expressions and control structures","year":"0"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238176"},{"key":"ref12","article-title":"Write to arbitrary storage location","year":"0"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23371"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409748"},{"key":"ref15","article-title":"Vandal: A scalable security analysis framework for smart contracts","author":"brent","year":"2018"},{"key":"ref16","first-page":"286","article-title":"sCompile: Critical path identification and analysis for smart contracts","author":"chang","year":"2019","journal-title":"Proc 1st Int Conf Formal Engineering Methods"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243849"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00046"},{"key":"ref19","article-title":"Eclipser","author":"choi","year":"2019"},{"key":"ref4","article-title":"Decentralized application security project","year":"0"},{"key":"ref3","article-title":"Authorization through tx.origin","year":"0"},{"key":"ref6","article-title":"Etherscan","year":"0"},{"key":"ref5","article-title":"Dos with failed call","year":"0"},{"key":"ref8","article-title":"Requirement violation","year":"0"},{"key":"ref7","article-title":"Nethermind","year":"0"},{"key":"ref49","article-title":"Static program analysis","author":"m\u00f8ller","year":"2019"},{"key":"ref9","article-title":"Smart contract weakness classification registry","year":"0"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380421"},{"key":"ref45","article-title":"The art, science, and engineering of fuzzing: A survey","author":"man\u00e8s","year":"2019","journal-title":"IEEE Transactions on Software Engineering"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.294"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397348"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338975"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106295"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"ref43","first-page":"65","article-title":"ReGuard: Finding Reentrancy Bugs in Smart Contracts","author":"liu","year":"2018","journal-title":"2018 IEEE\/ACM 40th International Conference on Software Engineering Companion (ICSE-Companion) ICSE-Companion"}],"event":{"name":"2021 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE)","location":"Melbourne, Australia","start":{"date-parts":[[2021,11,15]]},"end":{"date-parts":[[2021,11,19]]}},"container-title":["2021 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9678507\/9678392\/09678888.pdf?arnumber=9678888","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,9]],"date-time":"2022-07-09T02:19:36Z","timestamp":1657333176000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9678888\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11]]},"references-count":73,"URL":"https:\/\/doi.org\/10.1109\/ase51524.2021.9678888","relation":{},"subject":[],"published":{"date-parts":[[2021,11]]}}}