{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T18:50:49Z","timestamp":1773773449033,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":64,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T00:00:00Z","timestamp":1572998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key R&D Program of China","award":["2018YFB0804100"],"award-info":[{"award-number":["2018YFB0804100"]}]},{"name":"National Natural Science Foundation of China","award":["61872057"],"award-info":[{"award-number":["61872057"]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1718787 and 1846151"],"award-info":[{"award-number":["1718787 and 1846151"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,6]]},"DOI":"10.1145\/3319535.3345664","type":"proceedings-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T13:08:32Z","timestamp":1573132112000},"page":"1503-1520","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":113,"title":["TokenScope"],"prefix":"10.1145","author":[{"given":"Ting","family":"Chen","sequence":"first","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"given":"Yufei","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"given":"Zihao","family":"Li","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong, Hong Kong"}]},{"given":"Ting","family":"Wang","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, University Park, PA, USA"}]},{"given":"Rong","family":"Cao","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"given":"Xiuzhuo","family":"Xiao","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"given":"Xiaosong","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]}],"member":"320","published-online":{"date-parts":[[2019,11,6]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3167084"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2993600.2993611"},{"key":"e_1_3_2_2_3_1","volume-title":"Vandal: A Scalable Security Analysis Framework for Smart Contracts. https:\/\/arxiv.org\/pdf\/1809.03981.pdf.","author":"Brent Lexi","year":"2018"},{"key":"e_1_3_2_2_4_1","unstructured":"Jialiang Chang Bo Gao Hao Xiao Jun Sun and Zijiang Yang. 2018. sCompile: Critical Path Identification and Analysis for Smart Contracts. https:\/\/arxiv.org\/pdf\/1808.00624.pdf. (2018).  Jialiang Chang Bo Gao Hao Xiao Jun Sun and Zijiang Yang. 2018. sCompile: Critical Path Identification and Analysis for Smart Contracts. https:\/\/arxiv.org\/pdf\/1808.00624.pdf. (2018)."},{"key":"e_1_3_2_2_5_1","volume-title":"Quantitative Analysis of Smart Contracts. In European Symposium on Programming.","author":"Chatterjee Krishnendu","year":"2018"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2017.7884650"},{"key":"e_1_3_2_2_7_1","unstructured":"Curvegrid. 2018. toy-block-explorer. https:\/\/github.com\/curvegrid\/toy-block-explorer. (2018).  Curvegrid. 2018. toy-block-explorer. https:\/\/github.com\/curvegrid\/toy-block-explorer. (2018)."},{"key":"e_1_3_2_2_8_1","unstructured":"enkrypt. 2018. EthVM: Open Source Ethereum Blockchain Explorer. https:\/\/github.com\/enKryptIO\/ethvm. (2018).  enkrypt. 2018. EthVM: Open Source Ethereum Blockchain Explorer. https:\/\/github.com\/enKryptIO\/ethvm. (2018)."},{"key":"e_1_3_2_2_9_1","unstructured":"EtherDelta. 2018. EtherDelta. https:\/\/etherdelta.com\/. (2018).  EtherDelta. 2018. EtherDelta. https:\/\/etherdelta.com\/. (2018)."},{"key":"e_1_3_2_2_10_1","unstructured":"Ethereum. 2017a. ERC223 token standard. https:\/\/github.com\/ethereum\/EIPs\/issues\/223. (2017).  Ethereum. 2017a. ERC223 token standard. https:\/\/github.com\/ethereum\/EIPs\/issues\/223. (2017)."},{"key":"e_1_3_2_2_11_1","unstructured":"Ethereum. 2017b. Management APIs. https:\/\/github.com\/ethereum\/go-ethereum\/wiki\/Management-APIs. (2017).  Ethereum. 2017b. Management APIs. https:\/\/github.com\/ethereum\/go-ethereum\/wiki\/Management-APIs. (2017)."},{"key":"e_1_3_2_2_12_1","unstructured":"Ethereum. 2017c. Token Standard Extension for Increasing & Decreasing Supply. https:\/\/github.com\/ethereum\/EIPs\/pull\/621. (2017).  Ethereum. 2017c. Token Standard Extension for Increasing & Decreasing Supply. https:\/\/github.com\/ethereum\/EIPs\/pull\/621. (2017)."},{"key":"e_1_3_2_2_13_1","unstructured":"Ethereum. 2018a. ETCExplorer. https:\/\/github.com\/ethereumclassic\/explorer. (2018).  Ethereum. 2018a. ETCExplorer. https:\/\/github.com\/ethereumclassic\/explorer. (2018)."},{"key":"e_1_3_2_2_14_1","unstructured":"Ethereum. 2018b. Etherscan -- The Ethereum Block Explorer. https:\/\/etherscan.io\/. (2018).  Ethereum. 2018b. Etherscan -- The Ethereum Block Explorer. https:\/\/etherscan.io\/. (2018)."},{"key":"e_1_3_2_2_15_1","unstructured":"EtherEx. 2018. EthEx: Decentralized exchange built on Ethereum. https:\/\/github.com\/etherex\/etherex. (2018).  EtherEx. 2018. EthEx: Decentralized exchange built on Ethereum. https:\/\/github.com\/etherex\/etherex. (2018)."},{"key":"e_1_3_2_2_16_1","unstructured":"Etherscan. 2018. Token Tracker. https:\/\/etherscan.io\/tokens. (2018).  Etherscan. 2018. Token Tracker. https:\/\/etherscan.io\/tokens. (2018)."},{"key":"e_1_3_2_2_17_1","unstructured":"Etherscan. 2019. Decentralized Exchange Order Tracker. https:\/\/etherscan.io\/dextracker. (2019).  Etherscan. 2019. Decentralized Exchange Order Tracker. https:\/\/etherscan.io\/dextracker. (2019)."},{"key":"e_1_3_2_2_18_1","volume-title":"Etherwall: The first Ethereum desktop wallet. https:\/\/www.etherwall.com\/.","year":"2018"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67816-0_20"},{"key":"e_1_3_2_2_20_1","unstructured":"Michael Fr\u00f6wis Andreas Fuchs and Rainer B\u00f6hme. 2018. Detecting Token Systems on Ethereum. https:\/\/arxiv.org\/pdf\/1811.11645.pdf. (2018).  Michael Fr\u00f6wis Andreas Fuchs and Rainer B\u00f6hme. 2018. Detecting Token Systems on Ethereum. https:\/\/arxiv.org\/pdf\/1811.11645.pdf. (2018)."},{"key":"e_1_3_2_2_21_1","unstructured":"FunFairTech. 2017. Funfair token contract update. https:\/\/www.reddit.com\/r\/FunfairTech\/comments\/6nadvm\/funfair_token_contract_update\/. (2017).  FunFairTech. 2017. Funfair token contract update. https:\/\/www.reddit.com\/r\/FunfairTech\/comments\/6nadvm\/funfair_token_contract_update\/. (2017)."},{"key":"e_1_3_2_2_22_1","unstructured":"Google. 2019. Ethereum ETL. https:\/\/github.com\/blockchain-etl\/ethereum-etl. (2019).  Google. 2019. Ethereum ETL. https:\/\/github.com\/blockchain-etl\/ethereum-etl. (2019)."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"crossref","volume-title":"MadMax: Surviving Out-of-Gas Conditions in Ethereum Smart Contracts. In ACM international conference on Object-oriented Programming, Systems, Languages, and Applications.","author":"Grech N.","DOI":"10.1145\/3416262"},{"key":"e_1_3_2_2_24_1","unstructured":"Ilya Grishchenko Matteo Maffei and Clara Schneidewind. 2018a. EtherTrust: Sound Static Analysis of Ethereum bytecode. https:\/\/www.netidee.at\/sites\/default\/files\/2018-07\/staticanalysis.pdf. (2018).  Ilya Grishchenko Matteo Maffei and Clara Schneidewind. 2018a. EtherTrust: Sound Static Analysis of Ethereum bytecode. https:\/\/www.netidee.at\/sites\/default\/files\/2018-07\/staticanalysis.pdf. (2018)."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-89722-6_10"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3158136"},{"key":"e_1_3_2_2_27_1","volume-title":"KEVM: A Complete Semantics of the Ethereum Virtual Machine. https:\/\/www.ideals.illinois.edu\/bitstream\/handle\/2142\/97207\/hildenbrandt-saxena-zhu-rodrigues-guth-daian-rosu-2017-tr.pdf'sequence=2.","author":"Hildenbrandt Everett","year":"2017"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70278-0_33"},{"key":"e_1_3_2_2_29_1","unstructured":"TonTon Hsien-De Huang. 2018. Hunting the Ethereum Smart Contract: Color-inspired Inspection of Potential Attacks. https:\/\/arxiv.org\/pdf\/1807.01868.pdf. (2018).  TonTon Hsien-De Huang. 2018. Hunting the Ethereum Smart Contract: Color-inspired Inspection of Potential Attacks. https:\/\/arxiv.org\/pdf\/1807.01868.pdf. (2018)."},{"key":"e_1_3_2_2_30_1","volume-title":"ACM\/IEEE International Conference on Automated Software Engineering.","author":"Jiang Bo"},{"key":"e_1_3_2_2_31_1","unstructured":"Jiao Jiao Shuanglong Kan Shang-Wei Lin David Sanan Yang Liu and Jun Sun. 2018. Executable Operational Semantics of Solidity. https:\/\/arxiv.org\/pdf\/1804.01295.pdf. (2018).  Jiao Jiao Shuanglong Kan Shang-Wei Lin David Sanan Yang Liu and Jun Sun. 2018. Executable Operational Semantics of Solidity. https:\/\/arxiv.org\/pdf\/1804.01295.pdf. (2018)."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23082"},{"key":"e_1_3_2_2_33_1","unstructured":"Kaustav. 2018. The Effects of the ERC20 Batch Overflow Bug. https:\/\/globalcoinreport.com\/the-effects-of-the-erc20-batch-overflow-bug\/. (2018).  Kaustav. 2018. The Effects of the ERC20 Batch Overflow Bug. https:\/\/globalcoinreport.com\/the-effects-of-the-erc20-batch-overflow-bug\/. (2018)."},{"key":"e_1_3_2_2_34_1","unstructured":"Aashish Kolluri Ivica Nikolic Ilya Sergey Aquinas Hobor and Prateek Saxena. 2018. Exploiting The Laws of Order in Smart Contracts. https:\/\/arxiv.org\/pdf\/1810.11605.pdf. (2018).  Aashish Kolluri Ivica Nikolic Ilya Sergey Aquinas Hobor and Prateek Saxena. 2018. Exploiting The Laws of Order in Smart Contracts. https:\/\/arxiv.org\/pdf\/1810.11605.pdf. (2018)."},{"key":"e_1_3_2_2_35_1","volume-title":"USENIX Security Symposium.","author":"Krupp Johannes","year":"2018"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"e_1_3_2_2_37_1","unstructured":"METAMASK. 2018. METAMASK -- Brings Ethereum to your browser. https:\/\/metamask.io\/. (2018).  METAMASK. 2018. METAMASK -- Brings Ethereum to your browser. https:\/\/metamask.io\/. (2018)."},{"key":"e_1_3_2_2_38_1","unstructured":"MyEtherWallet. 2018. MyEtherWallet. https:\/\/www.myetherwallet.com\/. (2018).  MyEtherWallet. 2018. MyEtherWallet. https:\/\/www.myetherwallet.com\/. (2018)."},{"key":"e_1_3_2_2_39_1","unstructured":"Mythril. 2018. Mythril Platform enables a secure and thriving ecosystem of Ethereum dapps & smarts contracts. https:\/\/mythril.ai\/. (2018).  Mythril. 2018. Mythril Platform enables a secure and thriving ecosystem of Ethereum dapps & smarts contracts. https:\/\/mythril.ai\/. (2018)."},{"key":"e_1_3_2_2_40_1","unstructured":"OKCoin. 2018. OKEx Safe from USDT \"Fake Deposit\" Issue. https:\/\/support.okex.com\/hc\/en-us\/articles\/360006305532-OKEx-Safe-from-USDT-Fake-Deposit-Issue. (2018).  OKCoin. 2018. OKEx Safe from USDT \"Fake Deposit\" Issue. https:\/\/support.okex.com\/hc\/en-us\/articles\/360006305532-OKEx-Safe-from-USDT-Fake-Deposit-Issue. (2018)."},{"key":"e_1_3_2_2_41_1","unstructured":"openANX. 2017. openANX: Decentralised Exchange Token Sale Smart Contract. https:\/\/github.com\/openanx\/OpenANXToken. (2017).  openANX. 2017. openANX: Decentralised Exchange Token Sale Smart Contract. https:\/\/github.com\/openanx\/OpenANXToken. (2017)."},{"key":"e_1_3_2_2_42_1","unstructured":"OpenZeppelin. 2019. SafeMath Library. https:\/\/github.com\/OpenZeppelin\/openzeppelin-solidity\/blob\/master\/contracts\/math\/SafeMath.sol. (2019).  OpenZeppelin. 2019. SafeMath Library. https:\/\/github.com\/OpenZeppelin\/openzeppelin-solidity\/blob\/master\/contracts\/math\/SafeMath.sol. (2019)."},{"key":"e_1_3_2_2_43_1","volume-title":"Empirical Vulnerability Analysis of Automated Smart Contracts Security Testing on Blockchains. In Annual International Conference on Computer Science and Software Engineering.","author":"Parizi Reza M.","year":"2018"},{"key":"e_1_3_2_2_44_1","unstructured":"peckchield. 2018. New proxyOverflow Bug in Multiple ERC20 Smart Contracts (CVE-2018--10376). https:\/\/blog.peckshield.com\/2018\/04\/25\/proxyOverflow\/. (2018).  peckchield. 2018. New proxyOverflow Bug in Multiple ERC20 Smart Contracts (CVE-2018--10376). https:\/\/blog.peckshield.com\/2018\/04\/25\/proxyOverflow\/. (2018)."},{"key":"e_1_3_2_2_45_1","unstructured":"PeckShield. 2018. New proxyOverflow Bug in Multiple ERC20 Smart Contracts (CVE-2018--10376). https:\/\/blog.peckshield.com\/2018\/04\/25\/proxyOverflow\/. (2018).  PeckShield. 2018. New proxyOverflow Bug in Multiple ERC20 Smart Contracts (CVE-2018--10376). https:\/\/blog.peckshield.com\/2018\/04\/25\/proxyOverflow\/. (2018)."},{"key":"e_1_3_2_2_46_1","unstructured":"Plutocracy. 2019. Krown whitepaper. https:\/\/plutocracy.co\/resources\/pdf\/Plutocracy_Whitepaper.pdf. (2019).  Plutocracy. 2019. Krown whitepaper. https:\/\/plutocracy.co\/resources\/pdf\/Plutocracy_Whitepaper.pdf. (2019)."},{"key":"e_1_3_2_2_47_1","unstructured":"POA. 2018. BlockScout Blockchain Explorer for inspecting and analyzing EVM Chains. https:\/\/github.com\/poanetwork\/blockscout. (2018).  POA. 2018. BlockScout Blockchain Explorer for inspecting and analyzing EVM Chains. https:\/\/github.com\/poanetwork\/blockscout. (2018)."},{"key":"e_1_3_2_2_48_1","volume-title":"Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks. In The Network and Distributed System Security Symposium.","author":"Rodler Michael","year":"2019"},{"key":"e_1_3_2_2_49_1","volume-title":"K: A Semantic Framework for Programming Languages and Formal Analysis Tools.","author":"Rosu Grigore","year":"2017"},{"key":"e_1_3_2_2_50_1","volume-title":"Leibniz International Proceedings in Informatics.","author":"Rosu Grigore","year":"2018"},{"key":"e_1_3_2_2_51_1","volume-title":"Data flow analysis: theory and practice","author":"Sanyal Amitabha","year":"2009"},{"key":"e_1_3_2_2_52_1","unstructured":"SECBIT. 2018. bad_tokens..csv. https:\/\/github.com\/sec-bit\/awesome-buggy-erc20-tokens\/blob\/master\/bad_tokens..csv. (2018).  SECBIT. 2018. bad_tokens..csv. https:\/\/github.com\/sec-bit\/awesome-buggy-erc20-tokens\/blob\/master\/bad_tokens..csv. (2018)."},{"key":"e_1_3_2_2_53_1","unstructured":"Oguz Serdar. 2018. Ethereum bug causes integer overflow in numerous ERC20 smart contracts [Update]. https:\/\/thenextweb.com\/hardfork\/2018\/04\/25\/ethereum-smart-contract-integer-overflow\/. (2018).  Oguz Serdar. 2018. Ethereum bug causes integer overflow in numerous ERC20 smart contracts [Update]. https:\/\/thenextweb.com\/hardfork\/2018\/04\/25\/ethereum-smart-contract-integer-overflow\/. (2018)."},{"key":"e_1_3_2_2_54_1","volume-title":"Formally Establishes ERC20 Standard. https:\/\/www.ethnews.com\/ethereum-improvement-proposal-20-finalized-formally-establishes-erc20-standard.","author":"Silva Matthew De","year":"2017"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"crossref","unstructured":"Remon Sinnema. 2013. eXtensible Access Control Markup Language (XACML) XML Media Type. https:\/\/tools.ietf.org\/html\/rfc7061. (2013).  Remon Sinnema. 2013. eXtensible Access Control Markup Language (XACML) XML Media Type. https:\/\/tools.ietf.org\/html\/rfc7061. (2013).","DOI":"10.17487\/rfc7061"},{"key":"e_1_3_2_2_56_1","volume-title":"Network Analysis of ERC20 Tokens Trading on Ethereum Blockchain. In International Conference on Complex Systems.","author":"Somin Shahar","year":"2018"},{"key":"e_1_3_2_2_57_1","volume-title":"SmartCheck: Static Analysis of Ethereum Smart Contracts. In IEEE\/ACM International Workshop on Emerging Trends in Software Engineering for Blockchain.","author":"Tikhomirov Sergei","year":"2016"},{"key":"e_1_3_2_2_58_1","volume-title":"Osiris: Hunting for Integer Bugs in Ethereum Smart Contracts. In Annual Computer Security Applications Conference.","author":"Torres Christof Ferreira","year":"2018"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243780"},{"key":"e_1_3_2_2_60_1","volume-title":"VULTRON: Catching Vulnerable Smart Contracts Once and for All. In International Conference on Software Engineering -- NIER.","author":"Wang Haijun","year":"2019"},{"key":"e_1_3_2_2_61_1","volume-title":"IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution. In The Network and Distributed System Security Symposium.","author":"Wang Tielei","year":"2009"},{"key":"e_1_3_2_2_62_1","unstructured":"WIKI. 2018. ERC20 Token Standard. https:\/\/github.com\/ethereum\/EIPs\/blob\/master\/EIPS\/eip-20.md. (2018).  WIKI. 2018. ERC20 Token Standard. https:\/\/github.com\/ethereum\/EIPs\/blob\/master\/EIPS\/eip-20.md. (2018)."},{"key":"e_1_3_2_2_63_1","volume-title":"Ethereum: A Secure Decentralised Generalised Transaction Ledger. https:\/\/ethereum.github.io\/yellowpaper\/paper.pdf.","author":"Wood Gavin","year":"2018"},{"key":"e_1_3_2_2_64_1","unstructured":"ZeusTrade. 2018. Topic: there was a coin out of my wallet that I did not even get what it is. https:\/\/bitcointalk.org\/index.php?topic=5023796.0. (2018).  ZeusTrade. 2018. Topic: there was a coin out of my wallet that I did not even get what it is. https:\/\/bitcointalk.org\/index.php?topic=5023796.0. (2018)."}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","location":"London United Kingdom","acronym":"CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3345664","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3345664","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3345664","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:24:02Z","timestamp":1750202642000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3345664"}},"subtitle":["Automatically Detecting Inconsistent Behaviors of Cryptocurrency Tokens in Ethereum"],"short-title":[],"issued":{"date-parts":[[2019,11,6]]},"references-count":64,"alternative-id":["10.1145\/3319535.3345664","10.1145\/3319535"],"URL":"https:\/\/doi.org\/10.1145\/3319535.3345664","relation":{},"subject":[],"published":{"date-parts":[[2019,11,6]]},"assertion":[{"value":"2019-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}