{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T14:49:28Z","timestamp":1776782968004,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":63,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,11]],"date-time":"2020-06-11T00:00:00Z","timestamp":1591833600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100010663","name":"H2020 European Research Council","doi-asserted-by":"publisher","award":["790340"],"award-info":[{"award-number":["790340"]}],"id":[{"id":"10.13039\/100010663","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006105","name":"Australian Research Council","doi-asserted-by":"publisher","award":["DP180104030"],"award-info":[{"award-number":["DP180104030"]}],"id":[{"id":"10.13039\/501100006105","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,11]]},"DOI":"10.1145\/3385412.3385990","type":"proceedings-article","created":{"date-parts":[[2020,6,7]],"date-time":"2020-06-07T01:40:10Z","timestamp":1591494010000},"page":"454-469","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":130,"title":["Ethainter: a smart contract security analyzer for composite vulnerabilities"],"prefix":"10.1145","author":[{"given":"Lexi","family":"Brent","sequence":"first","affiliation":[{"name":"International Computer Science Institute, USA \/ University of Sydney, Australia"}]},{"given":"Neville","family":"Grech","sequence":"additional","affiliation":[{"name":"University of Athens, Greece"}]},{"given":"Sifis","family":"Lagouvardos","sequence":"additional","affiliation":[{"name":"University of Athens, Greece"}]},{"given":"Bernhard","family":"Scholz","sequence":"additional","affiliation":[{"name":"University of Sydney, Australia"}]},{"given":"Yannis","family":"Smaragdakis","sequence":"additional","affiliation":[{"name":"University of Athens, Greece"}]}],"member":"320","published-online":{"date-parts":[[2020,6,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. 0x: Powering the decentralized exchange of tokens on Ethereum. https:\/\/0x.org."},{"key":"e_1_3_2_1_2_1","volume-title":"Damien Octeau, and Patrick McDaniel.","author":"Arzt Steven","year":"2014","unstructured":"Steven Arzt, Siegfried Rasthofer, Christian Fritz, Eric Bodden, Alexandre Bartel, Jacques Klein, Yves Le Traon, Damien Octeau, and Patrick McDaniel. 2014."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54455-6_8"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.08.014"},{"key":"e_1_3_2_1_6_1","volume-title":"Vandal: A Scalable Security Analysis Framework for Smart Contracts. CoRR abs\/1809.03981","author":"Brent Lexi","year":"2018","unstructured":"Lexi Brent, Anton Jurisevic, Michael Kong, Eric Liu, Fran\u00e7ois Gauthier, Vincent Gramoli, Ralph Holz, and Bernhard Scholz. 2018. Vandal: A Scalable Security Analysis Framework for Smart Contracts. CoRR abs\/1809.03981 (2018)."},{"key":"e_1_3_2_1_7_1","unstructured":"arXiv: 1809.03981 http:\/\/arxiv.org\/abs\/1809."},{"key":"e_1_3_2_1_8_1","unstructured":"03981"},{"key":"e_1_3_2_1_9_1","unstructured":"Vitalik Buterin. 2013. A Next-Generation Smart Contract and Decentralized Application Platform. https:\/\/github.com\/ethereum\/wiki\/wiki\/ White-Paper."},{"key":"e_1_3_2_1_10_1","unstructured":"ChainSecurity. [n. d.]. Securify2. https:\/\/github.com\/eth-sri\/securify2"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2017.7884650"},{"key":"e_1_3_2_1_12_1","unstructured":"cnbc.com. 2018."},{"key":"e_1_3_2_1_13_1","unstructured":"\u2019Accidental\u2019 bug froze $280 million worth of ether in Parity wallet. https:\/\/www.cnbc.com\/2017\/11\/08\/accidental-bugmay-have-frozen-280-worth-of-ether-on-parity-wallet.html"},{"key":"e_1_3_2_1_14_1","unstructured":"Consensys. 2018."},{"key":"e_1_3_2_1_15_1","unstructured":"Ethereum Smart Contract Best Practices. https: \/\/consensys.github.io\/smart-contract-best-practices\/ Accessed: 2019- 11-19."},{"key":"e_1_3_2_1_16_1","unstructured":"Kevin Delmolino Mitchell Arnett Ahmed E. Kosba Andrew Miller and Elaine Shi. 2015."},{"key":"e_1_3_2_1_17_1","volume-title":"Lessons and Insights from a Cryptocurrency Lab. IACR Cryptology ePrint Archive 2015","author":"Step Towards Step","year":"2015","unstructured":"Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab. IACR Cryptology ePrint Archive 2015 (2015), 460."},{"key":"e_1_3_2_1_18_1","volume-title":"Denning","author":"Denning Dorothy E.","year":"1977","unstructured":"Dorothy E. Denning and Peter J. Denning. 1977."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","unstructured":"Certification of Programs for Secure Information Flow. Commun. ACM 20 7 (July 1977) 504\u2013513. 10.1145\/359636.359712","DOI":"10.1145\/359636.359712"},{"key":"e_1_3_2_1_20_1","volume-title":"Declarative Decompilation of Smart Contracts. In International Conference on Software Engineering (ICSE).","author":"Grech Neville","year":"2019","unstructured":"Neville Grech, Lexi Brent, Bernhard Scholz, and Yannis Smaragdakis. 2019. Gigahorse: Thorough, Declarative Decompilation of Smart Contracts. In International Conference on Software Engineering (ICSE)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3276486"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3416262"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133926"},{"key":"e_1_3_2_1_24_1","volume-title":"Foundations and Tools for the Static Analysis of Ethereum Smart Contracts","author":"Grishchenko Ilya","unstructured":"Ilya Grishchenko, Matteo Maffei, and Clara Schneidewind. 2018. Foundations and Tools for the Static Analysis of Ethereum Smart Contracts. In Computer Aided Verification, Hana Chockler and Georg Weissenbacher (Eds.). Springer International Publishing, Cham, 51\u201378."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3158136"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-009-0086-1"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363230"},{"key":"e_1_3_2_1_28_1","unstructured":"Bo Jiang Ye Liu and W. K. Chan. 2018."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238177"},{"key":"e_1_3_2_1_30_1","unstructured":"Herbert Jordan Bernhard Scholz and Pavle Suboti\u0107. 2016."},{"key":"e_1_3_2_1_31_1","volume-title":"On Synthesis of Program Analyzers","author":"Souffl\u00e9","unstructured":"Souffl\u00e9: On Synthesis of Program Analyzers. In Computer Aided Verification, Swarat Chaudhuri and Azadeh Farzan (Eds.). Springer International Publishing, Cham, 422\u2013430."},{"key":"e_1_3_2_1_32_1","volume-title":"ZEUS: Analyzing Safety of Smart Contracts. In 25th Annual Network and Distributed System Security Symposium (NDSS\u201918)","author":"Kalra Sukrit","year":"2018","unstructured":"Sukrit Kalra, Seep Goel, Seep Goel, and Subodh Sharma. 2018. ZEUS: Analyzing Safety of Smart Contracts. In 25th Annual Network and Distributed System Security Symposium (NDSS\u201918)."},{"key":"e_1_3_2_1_33_1","unstructured":"Tomasz Kolinko. 2018. Eveem\/Panoramix \u2013 Showing Contract Sources since 2018. http:\/\/eveem.com\/"},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the 27th USENIX Conference on Security Symposium (SEC\u201918)","author":"Krupp Johannes","year":"2018","unstructured":"Johannes Krupp and Christian Rossow. 2018. TEETHER: Gnawing at Ethereum to Automatically Exploit Smart Contracts. In Proceedings of the 27th USENIX Conference on Security Symposium (SEC\u201918). USENIX Association, Berkeley, CA, USA, 1317\u20131333. http:\/\/dl.acm.org\/citation. cfm?id=3277203.3277303"},{"key":"e_1_3_2_1_35_1","unstructured":"Benjamin Livshits. 2006."},{"key":"e_1_3_2_1_36_1","unstructured":"Improving Software Security with Precise Static and Runtime Analysis. Ph.D. Dissertation. Stanford University."},{"key":"e_1_3_2_1_37_1","unstructured":"LLVM. 2018."},{"key":"e_1_3_2_1_38_1","unstructured":"The LLVM Compiler Infrastructure Project. https: \/\/llvm.org\/"},{"key":"e_1_3_2_1_39_1","unstructured":"Loi Luu Duc-Hiep Chu Hrishi Olickel Prateek Saxena and Aquinas Hobor. 2016."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"e_1_3_2_1_41_1","unstructured":"Anastasia Mavridou and Aron Laszka. 2018."},{"key":"e_1_3_2_1_42_1","volume-title":"Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts. In Proceedings of the 7th International Conference on Principles of Security and Trust (POST).","author":"Tool","unstructured":"Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts. In Proceedings of the 7th International Conference on Principles of Security and Trust (POST)."},{"key":"e_1_3_2_1_43_1","unstructured":"Satoshi Nakamoto. 2009."},{"key":"e_1_3_2_1_44_1","unstructured":"Bitcoin: A Peer-to-Peer Electronic Cash System. https:\/\/www.bitcoin.org\/bitcoin.pdf."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274743"},{"key":"e_1_3_2_1_46_1","volume-title":"Smart Contract Vulnerabilities: Does Anyone Care? CoRR abs\/1902.06710","author":"P\u00e9rez Daniel","year":"2019","unstructured":"Daniel P\u00e9rez and Benjamin Livshits. 2019. Smart Contract Vulnerabilities: Does Anyone Care? CoRR abs\/1902.06710 (2019). arXiv: 1902.06710 http:\/\/arxiv.org\/abs\/1902.06710"},{"key":"e_1_3_2_1_47_1","unstructured":"Michael Rodler Wenting Li Ghassan O. Karame and Lucas Davi. 2019."},{"key":"e_1_3_2_1_48_1","volume-title":"26th Annual Network and Distributed System Security Symposium, NDSS 2019","author":"Sereum","year":"2019","unstructured":"Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks. In 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24-27, 2019. The Internet Society."},{"key":"e_1_3_2_1_49_1","volume-title":"Neville Grech, Sifis Lagouvardos","author":"PLDI","unstructured":"https:\/\/www.ndss-symposium.org\/ndss-paper\/sereum-protectingexisting-smart-contracts-against-re-entrancy-attacks\/ PLDI \u201920, June 15\u201320, 2020, London, UK Lexi Brent, Neville Grech, Sifis Lagouvardos, Bernhard Scholz, and Yannis Smaragdakis"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.806121"},{"key":"e_1_3_2_1_51_1","unstructured":"SeaHorn. 2018. SeaHorn | A Verification Framework. http:\/\/seahorn. github.io\/"},{"key":"e_1_3_2_1_52_1","volume-title":"A Concurrent Perspective on Smart Contracts","author":"Sergey Ilya","unstructured":"Ilya Sergey and Aquinas Hobor. 2017. A Concurrent Perspective on Smart Contracts. In Financial Cryptography and Data Security, Michael Brenner, Kurt Rohloff, Joseph Bonneau, Andrew Miller, Peter Y.A. Ryan, Vanessa Teague, Andrea Bracciali, Massimiliano Sala, Federico Pintore, and Markus Jakobsson (Eds.). Springer International Publishing, Cham, 478\u2013493."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243780"},{"key":"e_1_3_2_1_54_1","unstructured":"Various. [n. d.]. Echidna - Ethereum fuzz testing framework. https: \/\/github.com\/crytic\/echidna. Accessed: 2019-11-20."},{"key":"e_1_3_2_1_55_1","unstructured":"Various. [n. d.]. ETHSecurity Community on Telegram. Accessed: 2019-05-11."},{"key":"e_1_3_2_1_56_1","unstructured":"Various. 2018."},{"key":"e_1_3_2_1_57_1","unstructured":"GitHub - ethereum\/solidity: The Solidity Contract-Oriented Programming Language. https:\/\/github.com\/ethereum\/ solidity"},{"key":"e_1_3_2_1_58_1","unstructured":"wired.com. 2016. A $50 Million Hack Just Showed That the DAO Was All Too Human. https:\/\/www.wired.com\/2016\/06\/50-million-hackjust-showed-dao-human\/"},{"key":"e_1_3_2_1_59_1","unstructured":"Gavin Wood. 2014."},{"key":"e_1_3_2_1_60_1","unstructured":"Ethereum: A Secure Decentralised Generalised Transaction Ledger. http:\/\/gavwood.com\/Paper.pdf."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2018.8328743"},{"key":"e_1_3_2_1_62_1","unstructured":"Yi Zhou Deepak Kumar Surya Bakshi Joshua Mason Andrew Miller and Michael Bailey. 2018."},{"key":"e_1_3_2_1_63_1","volume-title":"Proceedings of the 27th USENIX Conference on Security Symposium (SEC\u201918)","author":"Erays","unstructured":"Erays: Reverse Engineering Ethereum\u2019s Opaque Smart Contracts. In Proceedings of the 27th USENIX Conference on Security Symposium (SEC\u201918). USENIX Association, USA, 1371\u20131385."}],"event":{"name":"PLDI '20: 41st ACM SIGPLAN International Conference on Programming Language Design and Implementation","location":"London UK","acronym":"PLDI '20","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 41st ACM SIGPLAN Conference on Programming Language Design and Implementation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3385412.3385990","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3385412.3385990","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:49Z","timestamp":1750199929000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3385412.3385990"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,11]]},"references-count":63,"alternative-id":["10.1145\/3385412.3385990","10.1145\/3385412"],"URL":"https:\/\/doi.org\/10.1145\/3385412.3385990","relation":{},"subject":[],"published":{"date-parts":[[2020,6,11]]},"assertion":[{"value":"2020-06-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}