{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T23:55:07Z","timestamp":1775346907763,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,7]],"date-time":"2020-11-07T00:00:00Z","timestamp":1604707200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001459","name":"Ministry of Education - Singapore","doi-asserted-by":"publisher","award":["MOE2018-T2-1-068"],"award-info":[{"award-number":["MOE2018-T2-1-068"]}],"id":[{"id":"10.13039\/501100001459","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,8]]},"DOI":"10.1145\/3368089.3409740","type":"proceedings-article","created":{"date-parts":[[2020,11,8]],"date-time":"2020-11-08T06:03:52Z","timestamp":1604815432000},"page":"666-677","source":"Crossref","is-referenced-by-count":27,"title":["Towards automated verification of smart contract fairness"],"prefix":"10.1145","author":[{"given":"Ye","family":"Liu","sequence":"first","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"given":"Yi","family":"Li","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"given":"Shang-Wei","family":"Lin","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"given":"Rong","family":"Zhao","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2020,11,7]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2019. Mythril. https:\/\/github.com\/ConsenSys\/mythril. A Security Analysis Tool for EVM Bytecode.  2019. Mythril. https:\/\/github.com\/ConsenSys\/mythril. A Security Analysis Tool for EVM Bytecode."},{"key":"e_1_3_2_2_2_1","unstructured":"2019. Oyente. https:\/\/github.com\/melonproject\/oyente. An Analysis Tool for Smart Contracts.  2019. Oyente. https:\/\/github.com\/melonproject\/oyente. An Analysis Tool for Smart Contracts."},{"key":"e_1_3_2_2_3_1","unstructured":"2020. DApp Statistics. https:\/\/www.stateofthedapps.com\/stats.  2020. DApp Statistics. https:\/\/www.stateofthedapps.com\/stats."},{"key":"e_1_3_2_2_4_1","unstructured":"2020. EIP-1202 : Voting Standard. https:\/\/eips.ethereum.org\/EIPS\/eip-1202.  2020. EIP-1202 : Voting Standard. https:\/\/eips.ethereum.org\/EIPS\/eip-1202."},{"key":"e_1_3_2_2_5_1","unstructured":"2020. Etherscan. https:\/\/etherscan.io.  2020. Etherscan. https:\/\/etherscan.io."},{"key":"e_1_3_2_2_6_1","volume-title":"Interface for Blind Auctions (Draft). https:\/\/github.com\/ethereum\/EIPs\/ pull\/","year":"1815"},{"key":"e_1_3_2_2_7_1","volume-title":"Formal Verification of Smart Contracts Based on Users and Blockchain Behaviors Models. In 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS). IEEE, 1-5.","author":"Abdellatif Tesnim","year":"2018"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133904"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287560.3287588"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"crossref","unstructured":"Massimo Bartoletti Salvatore Carta Tiziana Cimoli and Roberto Saia. 2019. Dissecting Ponzi Schemes on Ethereum: Identification Analysis and Impact. Future Generation Computer Systems ( 2019 ).  Massimo Bartoletti Salvatore Carta Tiziana Cimoli and Roberto Saia. 2019. Dissecting Ponzi Schemes on Ethereum: Identification Analysis and Impact. Future Generation Computer Systems ( 2019 ).","DOI":"10.1016\/j.future.2019.08.014"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.08.014"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2993600.2993611"},{"key":"e_1_3_2_2_13_1","volume-title":"Programming Languages with Applications to Biology and Security","author":"Bigi Giancarlo"},{"key":"e_1_3_2_2_14_1","volume-title":"sCompile: Critical Path Identification and Analysis for Smart Contracts. arXiv preprint arXiv","author":"Chang Jialiang","year":"1808"},{"key":"e_1_3_2_2_15_1","volume-title":"Quantitative Analysis of Smart Contracts. In European Symposium on Programming. Springer, Cham, 739-767","author":"Chatterjee Krishnendu","year":"2018"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2017.7884650"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186046"},{"key":"e_1_3_2_2_18_1","volume-title":"Blockchain Based Smart Contract for Bidding System. In 2018 IEEE International Conference on Applied System Invention (ICASI). IEEE, 208-211","author":"Chen Yi-Hui","year":"2018"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.42"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/77545"},{"key":"e_1_3_2_2_21_1","volume-title":"Runtime Verification of Ethereum Smart Contracts. In 2018 14th European Dependable Computing Conference (EDCC). IEEE, 158-163","author":"Ellul Joshua","year":"2018"},{"key":"e_1_3_2_2_22_1","volume-title":"Precise Attack Synthesis for Smart Contracts. arXiv preprint arXiv","author":"Feng Yu","year":"1902"},{"key":"e_1_3_2_2_23_1","volume-title":"Data Privacy Management, Cryptocurrencies and Blockchain Technology","author":"Galal Hisham S"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3276486"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-89722-6_10"},{"key":"e_1_3_2_2_26_1","volume-title":"Smart Contract-Based Campus Demonstration of Decentralized Transactive Energy Auctions. In 2017 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). IEEE, 1-5.","author":"Hahn Adam","year":"2017"},{"key":"e_1_3_2_2_27_1","volume-title":"KEVM: A Complete Semantics of the Ethereum Virtual Machine. Technical Report.","author":"Hildenbrandt Everett","year":"2017"},{"key":"e_1_3_2_2_28_1","volume-title":"IO Technical White Paper. EOS. IO (accessed","author":"EOS IO.","year":"2017"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"crossref","unstructured":"Matthew O Jackson. 2014. Mechanism Theory. Available at SSRN 2542983 ( 2014 ).  Matthew O Jackson. 2014. Mechanism Theory. Available at SSRN 2542983 ( 2014 ).","DOI":"10.2139\/ssrn.2542983"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"crossref","unstructured":"Mamata Jenamani Yuhui Zhong and Bharat Bhargava. 2007. Cheating in Online Auction-Towards Explaining the Popularity of English Auction. Electronic Commerce Research and Applications 6 1 ( 2007 ) 53-62.  Mamata Jenamani Yuhui Zhong and Bharat Bhargava. 2007. Cheating in Online Auction-Towards Explaining the Popularity of English Auction. Electronic Commerce Research and Applications 6 1 ( 2007 ) 53-62.","DOI":"10.1016\/j.elerap.2005.12.002"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238177"},{"key":"e_1_3_2_2_32_1","volume-title":"Semantic Understanding of Smart Contracts: Executable Operational Semantics of Solidity. In 2020 IEEE Symposium on Security and Privacy (SP). IEEE, 1695-1712","author":"Jiao Jiao","year":"2020"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45234-6_4"},{"key":"e_1_3_2_2_34_1","volume-title":"ZEUS: Analyzing Safety of Smart Contracts. In The Network and Distributed System Security Symposium.","author":"Kalra Sukrit","year":"2018"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"crossref","unstructured":"James C King. 1976. Symbolic Execution and Program Testing. Commun. ACM 19 7 ( 1976 ) 385-394.  James C King. 1976. Symbolic Execution and Program Testing. Commun. ACM 19 7 ( 1976 ) 385-394.","DOI":"10.1145\/360248.360252"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467-6419.00083"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/585265.585266"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/1939141.1939161"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1257\/aer.98.3.567"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70972-7_20"},{"key":"e_1_3_2_2_42_1","volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System. ( 2008 ).","author":"Satoshi Nakamoto","year":"2008"},{"key":"e_1_3_2_2_43_1","first-page":"980","article-title":"Model-Checking of Smart Contracts. In 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)","author":"Nehai Zeinab","year":"2018","journal-title":"IEEE"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274743"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"crossref","unstructured":"Noam Nisan and Amir Ronen. 2001. Algorithmic Mechanism Design. Games and Economic behavior 35 1-2 ( 2001 ) 166-196.  Noam Nisan and Amir Ronen. 2001. Algorithmic Mechanism Design. Games and Economic behavior 35 1-2 ( 2001 ) 166-196.","DOI":"10.1006\/game.1999.0790"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3264591"},{"key":"e_1_3_2_2_47_1","volume-title":"EOS: Transaction Congestion Attack. https: \/\/medium.com\/@peckshield\/eos-transaction-congestion-attack-attackerscould-paralyze-eos-network-with-minimal-cost-9adfb4d16c82","year":"2019"},{"key":"e_1_3_2_2_48_1","volume-title":"Smart Contract Vulnerabilities: Does Anyone Care? (feb 2019 ). arXiv","author":"Perez Daniel","year":"1902"},{"key":"e_1_3_2_2_49_1","unstructured":"David Siegel. 2016. Understanding the DAO Attack. https:\/\/www.coindesk. com\/ understanding-dao-hack-journalists  David Siegel. 2016. Understanding the DAO Attack. https:\/\/www.coindesk. com\/ understanding-dao-hack-journalists"},{"key":"e_1_3_2_2_50_1","unstructured":"SmartDec 2019. SmartCheck. SmartDec. https:\/\/tool.smartdec.net  SmartDec 2019. SmartCheck. SmartDec. https:\/\/tool.smartdec.net"},{"key":"e_1_3_2_2_51_1","volume-title":"VeriSmart: A Highly Precise Safety Verifier for Ethereum Smart Contracts. In 2020 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 825-841","author":"So Sunbeom","year":"2020"},{"key":"e_1_3_2_2_52_1","unstructured":"Sofware Reliability Lab 2019. Securify. Sofware Reliability Lab. https:\/\/securify. ch\/  Sofware Reliability Lab 2019. Securify. Sofware Reliability Lab. https:\/\/securify. ch\/"},{"key":"e_1_3_2_2_53_1","unstructured":"Solidity 2018. Solidity. https:\/\/solidity.readthedocs. io\/en\/v0.5.1\/.  Solidity 2018. Solidity. https:\/\/solidity.readthedocs. io\/en\/v0.5.1\/."},{"key":"e_1_3_2_2_54_1","volume-title":"A Survey of Smart Contract Formal Specification and Verification. arXiv","author":"Tolmach Palina","year":"2008"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243780"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3194770.3194776"},{"key":"e_1_3_2_2_57_1","volume-title":"Oracle-Supported Dynamic Exploit Generation for Smart Contracts. arXiv","author":"Wang Haijun","year":"1909"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-NIER.2019.00009"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3360615"},{"key":"e_1_3_2_2_60_1","first-page":"1","volume-title":"Ethereum: A Secure Decentralised Generalised Transaction Ledger. Ethereum Project Yellow Paper 151 ( 2014 )","author":"Wood Gavin","year":"2014"},{"key":"e_1_3_2_2_61_1","article-title":"CReam: A Smart Contract Enabled Collusion-Resistant E-auction","volume":"14","author":"Wu Shuangke","year":"2018","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.5555\/3042817.3042973"}],"event":{"name":"ESEC\/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Virtual Event USA","acronym":"ESEC\/FSE '20","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368089.3409740","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3368089.3409740","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:57Z","timestamp":1750197717000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368089.3409740"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,7]]},"references-count":62,"alternative-id":["10.1145\/3368089.3409740","10.1145\/3368089"],"URL":"https:\/\/doi.org\/10.1145\/3368089.3409740","relation":{},"subject":[],"published":{"date-parts":[[2020,11,7]]}}}