{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T21:00:02Z","timestamp":1771621202068,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,6]],"date-time":"2021-12-06T00:00:00Z","timestamp":1638748800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"HK RGC GRF"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,12,6]]},"DOI":"10.1145\/3485832.3488015","type":"proceedings-article","created":{"date-parts":[[2021,12,6]],"date-time":"2021-12-06T13:42:32Z","timestamp":1638798152000},"page":"748-760","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["SolSaviour: A Defending Framework for Deployed Defective Smart Contracts"],"prefix":"10.1145","author":[{"given":"Zecheng","family":"Li","sequence":"first","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong"}]},{"given":"Yu","family":"Zhou","sequence":"additional","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong"}]},{"given":"Songtao","family":"Guo","sequence":"additional","affiliation":[{"name":"College of Computer Science, Chongqing University, China"}]},{"given":"Bin","family":"Xiao","sequence":"additional","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong"}]}],"member":"320","published-online":{"date-parts":[[2021,12,6]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Anthony Akentiev. 2017. Parity Multisig Hacked. Again. https:\/\/medium.com\/chain-cloud-company-blog\/parity-multisig-hack-again-b46771eaa838"},{"key":"e_1_3_2_1_2_1","unstructured":"Eric Banisadr. 2018. How $800k Evaporated from the PoWH Coin Ponzi Scheme Overnight. https:\/\/medium.com\/@ebanisadr\/how-800k-evaporated-from-the-powh-coin-ponzi-scheme-overnight-1b025c33b530"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2993600.2993611"},{"key":"e_1_3_2_1_4_1","unstructured":"Ivan Bogatyy. 2017. Implementing Ethereum trading front-runs on the Bancor exchange in Python. https:\/\/hackernoon.com\/front-running-bancor-in-150-lines-of-python-with-ethereum-api-d5e2bfd0d798"},{"key":"e_1_3_2_1_5_1","unstructured":"Mic Bowman Andrea Miele Michael Steiner and Bruno Vavala. 2018. Private Data Objects: An Overview. arXiv preprint arXiv:1807.05686(2018)."},{"key":"e_1_3_2_1_6_1","unstructured":"Lorenz Breidenbach Phil Daian Ari Juels and Emin\u00a0G\u00fcn Sirer. 2017. An In-Depth Look at the Parity Multisig Bug. https:\/\/hackingdistributed.com\/2017\/07\/22\/deep-dive-parity-bug\/"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385990"},{"key":"e_1_3_2_1_8_1","unstructured":"Vitalik Buterin. 2016. CRITICAL UPDATE Re: DAO Vulnerability. https:\/\/blog.ethereum.org\/2016\/06\/17\/critical-update-re-dao-vulnerability\/"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.2989002"},{"key":"e_1_3_2_1_10_1","volume-title":"Defectchecker: Automated smart contract defect detection by analyzing EVM bytecode","author":"Chen Jiachi","year":"2021","unstructured":"Jiachi Chen, Xin Xia, David Lo, John Grundy, Xiapu Luo, and Ting Chen. 2021. Defectchecker: Automated smart contract defect detection by analyzing EVM bytecode. IEEE Transactions on Software Engineering(2021), 1\u201320."},{"key":"e_1_3_2_1_11_1","volume-title":"SODA: A generic online detection framework for smart contracts. In NDSS. 1\u201317.","author":"Chen Ting","year":"2020","unstructured":"Ting Chen, Rong Cao, Ting Li, Xiapu Luo, Guofei Gu, Yufei Zhang, Zhou Liao, Hang Zhu, Gang Chen, Zheyuan He, 2020. SODA: A generic online detection framework for smart contracts. In NDSS. 1\u201317."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00023"},{"key":"e_1_3_2_1_13_1","volume-title":"Fastkitten: Practical Smart Contracts on Bitcoin. In 28th USENIX Security Symposium. 801\u2013818","author":"Das Poulami","year":"2019","unstructured":"Poulami Das, Lisa Eckey, Tommaso Frassetto, David Gens, Kristina Host\u00e1kov\u00e1, Patrick Jauernig, Sebastian Faust, and Ahmad-Reza Sadeghi. 2019. Fastkitten: Practical Smart Contracts on Bitcoin. In 28th USENIX Security Symposium. 801\u2013818."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC.2018.00036"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/WETSEB.2019.00008"},{"key":"e_1_3_2_1_16_1","volume-title":"2021 IEEE Symposium on Security and Privacy (SP). IEEE, 1\u201315","author":"Feist Josselin","year":"2021","unstructured":"Josselin Feist, Gustavo Grieco, and Alex Groce. 2021. sGUARD: Towards fixing vulnerable smart contracts automatically. In 2021 IEEE Symposium on Security and Privacy (SP). IEEE, 1\u201315."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384756"},{"key":"e_1_3_2_1_18_1","volume-title":"29th USENIX Security Symposium. 2757\u20132774","author":"Frank Joel","year":"2020","unstructured":"Joel Frank, Cornelius Aschermann, and Thorsten Holz. 2020. ETHBMC: A bounded model checker for smart contracts. In 29th USENIX Security Symposium. 2757\u20132774."},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the ACM on Programming Languages 2, POPL(2017)","author":"Grossman Shelly","year":"2017","unstructured":"Shelly Grossman, Ittai Abraham, Guy Golan-Gueta, Yan Michalevsky, Noam Rinetzky, Mooly Sagiv, and Yoni Zohar. 2017. Online detection of effectively callback free objects with applications to smart contracts. Proceedings of the ACM on Programming Languages 2, POPL(2017), 1\u201328."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00066"},{"key":"e_1_3_2_1_21_1","volume-title":"ZEUS: Analyzing safety of smart contracts.. In NDSS. 1\u201312.","author":"Kalra Sukrit","year":"2018","unstructured":"Sukrit Kalra, Seep Goel, Mohan Dhawan, and Subodh Sharma. 2018. ZEUS: Analyzing safety of smart contracts.. In NDSS. 1\u201312."},{"key":"e_1_3_2_1_22_1","volume-title":"Re: Hi! My name is Rubixi. I\u2019m a new Ethereum Doubler. Now my new home - Rubixi.tk. https:\/\/bitcointalk.org\/index.php?topic=1400536.60","year":"2016","unstructured":"Katatsuki. 2016. Re: Hi! My name is Rubixi. I\u2019m a new Ethereum Doubler. Now my new home - Rubixi.tk. https:\/\/bitcointalk.org\/index.php?topic=1400536.60"},{"key":"e_1_3_2_1_23_1","volume-title":"27th USENIX Security Symposium. 1317\u20131333","author":"Krupp Johannes","year":"2018","unstructured":"Johannes Krupp and Christian Rossow. 2018. teether: Gnawing at Ethereum to automatically exploit smart contracts. In 27th USENIX Security Symposium. 1317\u20131333."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385982"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359627"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"e_1_3_2_1_27_1","volume-title":"28th USENIX Security Symposium. 783\u2013800","author":"Matetic Sinisa","year":"2019","unstructured":"Sinisa Matetic, Karl W\u00fcst, Moritz Schneider, Kari Kostiainen, Ghassan Karame, and Srdjan Capkun. 2019. BITE: Bitcoin lightweight client privacy using trusted execution. In 28th USENIX Security Symposium. 783\u2013800."},{"key":"e_1_3_2_1_28_1","unstructured":"Brianna Montgomery. 2021. Fei Bonding Curve Bug Post Mortem. https:\/\/medium.com\/fei-protocol\/fei-bonding-curve-bug-post-mortem-98d2c6f271e9"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00133"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380334"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274743"},{"key":"e_1_3_2_1_32_1","volume-title":"Sereum: Protecting existing smart contracts against re-entrancy attacks. In NDSS. 1\u201315.","author":"Rodler Michael","year":"2019","unstructured":"Michael Rodler, Wenting Li, Ghassan\u00a0O Karame, and Lucas Davi. 2019. Sereum: Protecting existing smart contracts against re-entrancy attacks. In NDSS. 1\u201315."},{"key":"e_1_3_2_1_33_1","volume-title":"30th USENIX Security Symposium. 1\u201318","author":"Rodler Michael","year":"2021","unstructured":"Michael Rodler, Wenting Li, Ghassan\u00a0O Karame, and Lucas Davi. 2021. EVMPatch: timely and automated patching of Ethereum smart contracts. In 30th USENIX Security Symposium. 1\u201318."},{"key":"e_1_3_2_1_34_1","unstructured":"KoET Team. 2016. King of Ether Throne Post-Mortem Investigation. https:\/\/www.kingoftheether.com\/postmortem"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274737"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243780"},{"key":"e_1_3_2_1_37_1","unstructured":"u\/ethererik. 2016. GovernMental\u2019s 1100 ETH jackpot payout is stuck because it uses too much gas. https:\/\/www.reddit.com\/r\/ethereum\/comments\/4ghzhv\/governmentals_1100_eth_jackpot_payout_is_stuck\/"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3402450"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978326"},{"key":"e_1_3_2_1_40_1","volume-title":"REM: Resource-Efficient Mining for Blockchains. In 26th USENIX Security Symposium. 1427\u20131444","author":"Zhang Fan","year":"2017","unstructured":"Fan Zhang, Ittay Eyal, Robert Escriva, Ari Juels, and Robbert Van\u00a0Renesse. 2017. REM: Resource-Efficient Mining for Blockchains. In 26th USENIX Security Symposium. 1427\u20131444."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER48275.2020.9054825"}],"event":{"name":"ACSAC '21: Annual Computer Security Applications Conference","location":"Virtual Event USA","acronym":"ACSAC '21"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3485832.3488015","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3485832.3488015","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T19:18:33Z","timestamp":1755890313000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3485832.3488015"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,6]]},"references-count":41,"alternative-id":["10.1145\/3485832.3488015","10.1145\/3485832"],"URL":"https:\/\/doi.org\/10.1145\/3485832.3488015","relation":{},"subject":[],"published":{"date-parts":[[2021,12,6]]},"assertion":[{"value":"2021-12-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}