{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T09:23:33Z","timestamp":1770283413783,"version":"3.49.0"},"reference-count":67,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key R&#x0026;D Program of China","award":["2018YFB0804100"],"award-info":[{"award-number":["2018YFB0804100"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872057"],"award-info":[{"award-number":["61872057"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"HK RGC Project","award":["152193\/19E"],"award-info":[{"award-number":["152193\/19E"]}]},{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1951729"],"award-info":[{"award-number":["1951729"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1953813"],"award-info":[{"award-number":["1953813"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1953893"],"award-info":[{"award-number":["1953893"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2022,8,1]]},"DOI":"10.1109\/tse.2021.3078342","type":"journal-article","created":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T01:09:16Z","timestamp":1620436156000},"page":"3066-3086","source":"Crossref","is-referenced-by-count":27,"title":["SigRec: Automatic Recovery of Function Signatures in Smart Contracts"],"prefix":"10.1109","volume":"48","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9165-8331","authenticated-orcid":false,"given":"Ting","family":"Chen","sequence":"first","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4382-577X","authenticated-orcid":false,"given":"Zihao","family":"Li","sequence":"additional","affiliation":[{"name":"Hong Kong Polytechnic University, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9082-3208","authenticated-orcid":false,"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"Hong Kong Polytechnic University, Hong Kong"}]},{"given":"Xiaofeng","family":"Wang","sequence":"additional","affiliation":[{"name":"Indiana University, Bloomington, IN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4927-5833","authenticated-orcid":false,"given":"Ting","family":"Wang","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, State College, PA, USA"}]},{"given":"Zheyuan","family":"He","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"given":"Kezhao","family":"Fang","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"given":"Yufei","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"given":"Hang","family":"Zhu","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1961-7946","authenticated-orcid":false,"given":"Hongwei","family":"Li","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"given":"Yan","family":"Cheng","sequence":"additional","affiliation":[{"name":"Ant Group, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9886-1412","authenticated-orcid":false,"given":"Xiaosong","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Solidity documentation \u2014 Introduction to smart contracts","year":"2019"},{"key":"ref2","article-title":"Solidity documentation","year":"2019"},{"key":"ref3","article-title":"Solidity documentation \u2014 Contract ABI specification","year":"2019"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1109\/ICBC48266.2020.9169467","article-title":"Wallet contracts on Ethereum","author":"di Angelo","year":"2020"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32101-7_7"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-54455-3_28"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3345664"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238177"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363230"},{"key":"ref10","article-title":"The ERC20 short address attack explained","author":"Vessenes","year":"2017"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3338999"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67816-0_20"},{"key":"ref13","article-title":"Welcome to the Ethereum function signature database","year":"2019"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00120"},{"key":"ref15","article-title":"Eveem","year":"2019"},{"key":"ref16","article-title":"Online solidity decompiler","year":"2019"},{"key":"ref17","article-title":"EVM bytecode decompiler","year":"2019"},{"key":"ref18","article-title":"Ethereum smart contract decompiler","year":"2019"},{"key":"ref19","article-title":"Ethereum (EVM) smart contracts reverse engineering helper utility","author":"Ganiev","year":"2018"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.21236\/ADA538737"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2843859.2843861"},{"key":"ref22","first-page":"1","article-title":"Automatic reverse engineering of data structures from binary execution","volume-title":"Proc. Netw. Distrib. Syst. Secur. Symp.","author":"Lin"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2001.957843"},{"key":"ref24","first-page":"1","article-title":"Tie: Principled reverse engineering of types in binary programs","volume-title":"Proc. Netw. Distrib. Syst. Secur. Symp.","author":"Lee"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2010.24"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2908080.2908119"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2837614.2837674"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68690-5_26"},{"key":"ref29","first-page":"1","article-title":"Howard: A dynamic excavator for reverse engineering data structures","volume-title":"Proc. Netw. Distrib. Syst. Secur. Symp.","author":"Slowinska"},{"key":"ref30","article-title":"Ethereum: A secure decentralised generalised transaction ledger byzantium version bdec180\u20132019\u201305-01","author":"Wood","year":"2019"},{"key":"ref31","article-title":"Bitwise shifting instructions in evm","author":"Beregszaszi","year":"2017"},{"key":"ref32","article-title":"Solidity documentation \u2014 Types","year":"2019"},{"key":"ref33","article-title":"Vyper documentation","year":"2021"},{"key":"ref34","article-title":"Go ethereum \u2013 Official golang implementation of the ethereum protocol","year":"2019"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486401"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2019.00137"},{"key":"ref37","article-title":"Etherscan \u2014 Ethereum (ETH) blockchain explorer","year":"2019"},{"key":"ref38","article-title":"Contract library","year":"2019"},{"key":"ref39","article-title":"Solidity documentation \u2014 Changelog","year":"2021"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/BRAINS49436.2020.9223278"},{"key":"ref41","article-title":"Solidity, problem with bytes decoding","year":"2019"},{"key":"ref42","article-title":"Encode data input of the raw transaction to update an contract function?","author":"Luis","year":"2017"},{"key":"ref43","article-title":"Solidity \u201ccall \u201d function with array as input","year":"2017"},{"key":"ref44","article-title":"Compatibility with newer web3 versions","year":"2019"},{"key":"ref45","article-title":"Can\u2019t install web3 version 1.2 on windows 10","year":"2019"},{"key":"ref46","article-title":"Solidity v0.5.0 breaking changes","year":"2018"},{"key":"ref47","first-page":"778","article-title":"sFuzz: An efficient adaptive fuzzer for solidity smart contracts","volume-title":"Proc. ACM\/IEEE 42nd Int. Conf. Softw. Eng.","author":"Nguyen"},{"key":"ref48","first-page":"789","article-title":"Targeted greybox fuzzing with static lookahead analysis","volume-title":"Proc. ACM\/IEEE 42nd Int. Conf. Softw. Eng.","author":"W\u00c3stholz"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363230"},{"key":"ref50","first-page":"1371","article-title":"Erays: Reverse engineering ethereum\u2019s opaque smart contracts","volume-title":"Proc. 27th USENIX Secur. Symp.","author":"Zhou"},{"key":"ref51","article-title":"Vandal: A scalable security analysis framework for smart contracts","author":"Brent","year":"2018"},{"key":"ref52","first-page":"1","article-title":"Porosity: A decompiler for blockchain-based smart contracts bytecode","volume-title":"Proc. DEFCON 25","author":"Suiche"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01090-4_30"},{"key":"ref54","article-title":"Mythril","year":"2019"},{"key":"ref55","first-page":"81","article-title":"Towards saving money in using smart contracts","volume-title":"Proc. IEEE\/ACM 40th Int. Conf. Softw. Eng.: New Ideas Emerg. Technol. Results","author":"Chen"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2019.8870156"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/tetc.2020.2979019"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274737"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2009.24"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/2491956.2462165"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2465351.2465380"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2007.163"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.21236\/ADA449077"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.29"},{"key":"ref65","first-page":"845","article-title":"BYTEWEIGHT: Learning to recognize functions in binary code","volume-title":"Proc. 23rd USENIX Secur. Symp.","author":"Bao"},{"key":"ref66","first-page":"611","article-title":"Recognizing functions in binaries with neural networks","volume-title":"Proc. 24th USENIX Secur. Symp.","author":"Shin"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2017.59"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/32\/9857502\/9426396-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/9857502\/09426396.pdf?arnumber=9426396","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T04:01:59Z","timestamp":1725249719000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9426396\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,1]]},"references-count":67,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/tse.2021.3078342","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,8,1]]}}}