{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T02:14:18Z","timestamp":1775873658144,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T00:00:00Z","timestamp":1608508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Natural Science Foundation of China","award":["61972373"],"award-info":[{"award-number":["61972373"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,21]]},"DOI":"10.1145\/3324884.3416553","type":"proceedings-article","created":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T23:38:56Z","timestamp":1611790736000},"page":"1029-1040","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":66,"title":["Cross-contract static analysis for detecting practical reentrancy vulnerabilities in smart contracts"],"prefix":"10.1145","author":[{"given":"Yinxing","family":"Xue","sequence":"first","affiliation":[{"name":"University of Science and Technology of China, Hefei, China"}]},{"given":"Mingliang","family":"Ma","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, Hefei, China"}]},{"given":"Yun","family":"Lin","sequence":"additional","affiliation":[{"name":"National University of Singapore Singapore"}]},{"given":"Yulei","family":"Sui","sequence":"additional","affiliation":[{"name":"University of Technology Sydney, Sydney, Austrilia"}]},{"given":"Jiaming","family":"Ye","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, Hefei, China"}]},{"given":"Tianyong","family":"Peng","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, Hefei, China"}]}],"member":"320","published-online":{"date-parts":[[2021,1,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Ethereum: Blockchain App Platform. https:\/\/www.ethereum.org\/. (2015). Online","year":"2019","unstructured":"2015. Ethereum: Blockchain App Platform. https:\/\/www.ethereum.org\/. (2015). Online; accessed 29 January 2019."},{"key":"e_1_3_2_1_2_1","volume-title":"A Block Explorer and Analytics Platform for Ethereum. https:\/\/etherscan.io\/. (2019). Online","year":"2019","unstructured":"2019. A Block Explorer and Analytics Platform for Ethereum. https:\/\/etherscan.io\/. (2019). Online; accessed 29 January 2019."},{"key":"e_1_3_2_1_3_1","volume-title":"LLVM Language Reference Manual. https:\/\/blog.sigmaprime.io\/solidity-security.html. (2019). Online","year":"2019","unstructured":"2019. LLVM Language Reference Manual. https:\/\/blog.sigmaprime.io\/solidity-security.html. (2019). Online; accessed 29 January 2019."},{"key":"e_1_3_2_1_4_1","volume-title":"https:\/\/github.com\/quoscient\/octopus. (2019). Online","year":"2019","unstructured":"2019. Octopus. https:\/\/github.com\/quoscient\/octopus. (2019). Online; accessed 29 January 2019."},{"key":"e_1_3_2_1_5_1","volume-title":"https:\/\/toolman-demo.readthedocs.io\/en\/latest\/index.html. (2020). Online","year":"2020","unstructured":"2020. Clairvoyance:. https:\/\/toolman-demo.readthedocs.io\/en\/latest\/index.html. (2020). Online; accessed 1 May 2020."},{"key":"e_1_3_2_1_6_1","volume-title":"Solidity Security: Comprehensive List of Known Attack Vectors and Common Anti-patterns. https:\/\/blog.sigmaprime.io\/solidity-security.html. (30","author":"Manning Adrian","year":"2018","unstructured":"Adrian Manning. 30 May 2018. Solidity Security: Comprehensive List of Known Attack Vectors and Common Anti-patterns. https:\/\/blog.sigmaprime.io\/solidity-security.html. (30 May 2018). Online; accessed 29 January 2019."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594299"},{"key":"e_1_3_2_1_8_1","first-page":"1007","article-title":"A survey of attacks on Ethereum smart contracts","volume":"2016","author":"Atzei Nicola","year":"2016","unstructured":"Nicola Atzei, Massimo Bartoletti, and Tiziana Cimoli. 2016. A survey of attacks on Ethereum smart contracts. IACR Cryptology ePrint Archive 2016 (2016), 1007.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/236338.236371"},{"key":"e_1_3_2_1_10_1","volume-title":"https:\/\/securify.chainsecurity.com\/. (2019). Online","year":"2019","unstructured":"ChainSecurity. 2019. Securify. https:\/\/securify.chainsecurity.com\/. (2019). Online; accessed 29 January 2019."},{"key":"e_1_3_2_1_11_1","volume-title":"Smart Check. https:\/\/tool.smartdec.net\/. (2019). Online","year":"2019","unstructured":"ChainSecurity. 2019. Smart Check. https:\/\/tool.smartdec.net\/. (2019). Online; accessed 29 January 2019."},{"key":"e_1_3_2_1_12_1","volume-title":"sCompile: Critical Path Identification and Analysis for Smart Contracts. CoRR abs\/1808.00624","author":"Chang Jialiang","year":"2018","unstructured":"Jialiang Chang, Bo Gao, Hao Xiao, Jun Sun, and Zijiang Yang. 2018. sCompile: Critical Path Identification and Analysis for Smart Contracts. CoRR abs\/1808.00624 (2018). arXiv:1808.00624 http:\/\/arxiv.org\/abs\/1808.00624"},{"key":"e_1_3_2_1_13_1","volume-title":"https:\/\/github.com\/ConsenSys\/mythril-classic. (2019). Online","year":"2019","unstructured":"ConsenSys. 2019. Mythril. https:\/\/github.com\/ConsenSys\/mythril-classic. (2019). Online; accessed 29 January 2019."},{"key":"e_1_3_2_1_14_1","volume-title":"https:\/\/mythx.io\/. (2019). Online","author":"X.","year":"2019","unstructured":"ConsenSys. 2019. MythX. https:\/\/mythx.io\/. (2019). Online; accessed 29 January 2019."},{"key":"e_1_3_2_1_15_1","volume-title":"Ethereum Smart Contract Best Practices:Known Attacks. https:\/\/consensys.github.io\/smart-contract-best-practices\/known_attacks\/. (2019). Online","author":"Diligence ConsenSys","year":"2019","unstructured":"ConsenSys Diligence. 2019. Ethereum Smart Contract Best Practices:Known Attacks. https:\/\/consensys.github.io\/smart-contract-best-practices\/known_attacks\/. (2019). Online; accessed 29 January 2019."},{"key":"e_1_3_2_1_16_1","unstructured":"David Siegel. [n. d.]. Understanding the DAO Attack. Website. ([n. d.]). https:\/\/www.coindesk.com\/understanding-dao-hack-journalists."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1792734.1792766"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/646153.679523"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3092703.3092729"},{"key":"e_1_3_2_1_20_1","volume-title":"Slither: A Static Analysis Framework For Smart Contracts. In 2nd IEEE\/ACM International Workshop on Emerging Trends in Software Engineering for Blockchain, WETSEB@ICSE","author":"Feist Josselin","year":"2019","unstructured":"Josselin Feist, Gustavo Greico, and Alex Groce. 2019. Slither: A Static Analysis Framework For Smart Contracts. In 2nd IEEE\/ACM International Workshop on Emerging Trends in Software Engineering for Blockchain, WETSEB@ICSE 2019, Montr\u00c3l'al, Canada. to appear."},{"key":"e_1_3_2_1_21_1","volume-title":"sFuzz: An AFL based fuzzer for smart contracts. https:\/\/fuzzing.gitbook.io\/sfuzz\/. (2019). Online","year":"2019","unstructured":"GuardStrike. 2019. sFuzz: An AFL based fuzzer for smart contracts. https:\/\/fuzzing.gitbook.io\/sfuzz\/. (2019). Online; accessed 27 May 2019."},{"key":"e_1_3_2_1_22_1","volume-title":"The SeaHorn Verification Framework. In CAV","author":"Gurfinkel Arie","year":"2015","unstructured":"Arie Gurfinkel, Temesghen Kahsai, Anvesh Komuravelli, and Jorge A. Navas. 2015. The SeaHorn Verification Framework. In CAV 2015. 343--361."},{"key":"e_1_3_2_1_23_1","volume-title":"Google Big Query Open Dataset. https:\/\/cloud.google.com\/bigquery\/public-data. (2019). Online","author":"Google Inc. 2019.","year":"2019","unstructured":"Google Inc. 2019. Google Big Query Open Dataset. https:\/\/cloud.google.com\/bigquery\/public-data. (2019). Online; accessed 29 January 2019."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Bo Jiang Ye Liu and W. K. Chan. 2018. ContractFuzzer: fuzzing smart contracts for vulnerability detection. In ASE. ACM 259--269.","DOI":"10.1145\/3238147.3238177"},{"key":"e_1_3_2_1_25_1","volume-title":"ZEUS: Analyzing Safety of Smart Contracts. In NDSS","author":"Kalra Sukrit","year":"2018","unstructured":"Sukrit Kalra, Seep Goel, Mohan Dhawan, and Subodh Sharma. 2018. ZEUS: Analyzing Safety of Smart Contracts. In NDSS 2018."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330560"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36579-6_12"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115652"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786871"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397358"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238163"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.43"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.56"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/949952.940114"},{"key":"e_1_3_2_1_35_1","volume-title":"Making Smart Contracts Smarter. In CCS","author":"Luu Loi","year":"2016","unstructured":"Loi Luu, Duc-Hiep Chu, Hrishi Olickel, Prateek Saxena, and Aquinas Hobor. 2016. Making Smart Contracts Smarter. In CCS 2016. 254--269."},{"key":"e_1_3_2_1_36_1","volume-title":"https:\/\/github.com\/melonproject\/oyente. (2019). Online","year":"2019","unstructured":"melonproject. 2019. Oyente. https:\/\/github.com\/melonproject\/oyente. (2019). Online; accessed 29 January 2019."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380334"},{"key":"e_1_3_2_1_38_1","volume-title":"Smart Contracts: Building Blocks for Digital Markets","author":"Szabo Nick","year":"1996","unstructured":"Nick Szabo. 1996. Smart Contracts: Building Blocks for Digital Markets. http:\/\/www.fon.hum.uva.nl\/rob\/Courses\/InformationInSpeech\/CDROM\/Literature\/LOTwinterschool2006\/szabo.best.vwh.net\/smart_contracts_2.html. (1996). Online; accessed 29 January 2019."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274743"},{"key":"e_1_3_2_1_40_1","volume-title":"VerX: Safety Verification of Smart Contracts","author":"Permenev Anton","year":"2020","unstructured":"Anton Permenev, Dimitar Dimitrov, Petar Tsankov, Dana Drachsler-Cohen, and Martin Vechev. 2020. VerX: Safety Verification of Smart Contracts. In IEEE S&P 2020."},{"key":"e_1_3_2_1_41_1","volume-title":"https:\/\/github.com\/crytic\/slither\/wiki\/SlithIR. (2019). Online","author":"Dev. Team IR","year":"2019","unstructured":"SlithIR Dev. Team. 2019. SlithIR Types. https:\/\/github.com\/crytic\/slither\/wiki\/SlithIR. (2019). Online; accessed 30 June 2019."},{"key":"e_1_3_2_1_42_1","volume-title":"Solidity --- Security Considerations. https:\/\/solidity.readthedocs.io\/en\/v0.5.0\/security-considerations.html. (2019). Online","author":"Dev. Team Solidity","year":"2019","unstructured":"Solidity Dev. Team. 2019. Solidity --- Security Considerations. https:\/\/solidity.readthedocs.io\/en\/v0.5.0\/security-considerations.html. (2019). Online; accessed 30 June 2019."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950296"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2338965.2336784"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/353171.353189"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3194113.3194115"},{"key":"e_1_3_2_1_47_1","volume-title":"https:\/\/github.com\/trailofbits\/echidna. (2019). Online","year":"2019","unstructured":"trailofbits. 2019. Echidna. https:\/\/github.com\/trailofbits\/echidna. (2019). Online; accessed 29 January 2019."},{"key":"e_1_3_2_1_48_1","volume-title":"https:\/\/github.com\/trailofbits\/manticore. (2019). Online","year":"2019","unstructured":"trailofbits. 2019. Manticore. https:\/\/github.com\/trailofbits\/manticore. (2019). Online; accessed 29 January 2019."},{"key":"e_1_3_2_1_49_1","unstructured":"trailofbits. 2019. Slither. github. (2019). https:\/\/github.com\/trailofbits\/slither."},{"key":"e_1_3_2_1_50_1","first-page":"67","article-title":"Securify","volume":"2018","author":"Tsankov Petar","year":"2018","unstructured":"Petar Tsankov, Andrei Marian Dan, Dana Drachsler-Cohen, Arthur Gervais, Florian B\u00fcnzli, and Martin T. Vechev. 2018. Securify: Practical Security Analysis of Smart Contracts. In CCS 2018. 67--82.","journal-title":"Practical Security Analysis of Smart Contracts. In CCS"},{"key":"e_1_3_2_1_51_1","volume-title":"Qinghua Zheng, and Ting Liu.","author":"Wang Haijun","year":"2019","unstructured":"Haijun Wang, Yun Lin, Zijiang Yang, Jun Sun, Yang Liu, Jin Song Dong, Qinghua Zheng, and Ting Liu. 2019. Explaining regressions via alignment slicing and mending. IEEE Transactions on Software Engineering (2019)."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.31"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180188"}],"event":{"name":"ASE '20: 35th IEEE\/ACM International Conference on Automated Software Engineering","location":"Virtual Event Australia","acronym":"ASE '20","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416553","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324884.3416553","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:37Z","timestamp":1750197697000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416553"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,21]]},"references-count":53,"alternative-id":["10.1145\/3324884.3416553","10.1145\/3324884"],"URL":"https:\/\/doi.org\/10.1145\/3324884.3416553","relation":{},"subject":[],"published":{"date-parts":[[2020,12,21]]},"assertion":[{"value":"2021-01-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}