{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:14:43Z","timestamp":1750220083786,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,14]],"date-time":"2022-06-14T00:00:00Z","timestamp":1655164800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,14]]},"DOI":"10.1145\/3520313.3534660","type":"proceedings-article","created":{"date-parts":[[2022,6,9]],"date-time":"2022-06-09T20:46:24Z","timestamp":1654807584000},"page":"36-43","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Abstract interpretation of Michelson smart-contracts"],"prefix":"10.1145","author":[{"given":"Guillaume","family":"Bau","sequence":"first","affiliation":[{"name":"Sorbonne University, France \/ CNRS, France \/ LIP6, France \/ Nomadic Labs, France"}]},{"given":"Antoine","family":"Min\u00e9","sequence":"additional","affiliation":[{"name":"Sorbonne University, France \/ CNRS, France \/ LIP6, France"}]},{"given":"Vincent","family":"Botbol","sequence":"additional","affiliation":[{"name":"Nomadic Labs, France"}]},{"given":"Mehdi","family":"Bouaziz","sequence":"additional","affiliation":[{"name":"Nomadic Labs, France"}]}],"member":"320","published-online":{"date-parts":[[2022,6,14]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Comparison of Ethereum Smart Contract Vulnerability Detection Tools. Master\u2019s thesis","author":"Aryal Binod","year":"2021","unstructured":"Binod Aryal . 2021. Comparison of Ethereum Smart Contract Vulnerability Detection Tools. Master\u2019s thesis . University of Turku . https:\/\/urn.fi\/URN:NBN:fi-fe 2021 110453759 Binod Aryal. 2021. Comparison of Ethereum Smart Contract Vulnerability Detection Tools. Master\u2019s thesis. University of Turku. https:\/\/urn.fi\/URN:NBN:fi-fe2021110453759"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/11823230_15"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3427762.3430178"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-54994-7_28"},{"key":"e_1_3_2_2_5_1","unstructured":"Bitburner. 2018. Proof of Weak Hands (PoWH) Coin hacked 866 eth stolen. https:\/\/steemit.com\/cryptocurrency\/@bitburner\/proof-of-weak-hands-powh-coin-hacked-866-eth-stolen  Bitburner. 2018. Proof of Weak Hands (PoWH) Coin hacked 866 eth stolen. https:\/\/steemit.com\/cryptocurrency\/@bitburner\/proof-of-weak-hands-powh-coin-hacked-866-eth-stolen"},{"key":"e_1_3_2_2_6_1","unstructured":"Jisuk Byun and Heewoong Jang. 2020. MicSE: The Michelson Symbolic vErifier. https:\/\/github.com\/kupl\/MicSE  Jisuk Byun and Heewoong Jang. 2020. MicSE: The Michelson Symbolic vErifier. https:\/\/github.com\/kupl\/MicSE"},{"volume-title":"Dexter: A decentralized exchange for Tezos, on Gitlab. https:\/\/gitlab.com\/camlcase-dev\/dexter\/","year":"2020","key":"e_1_3_2_2_7_1","unstructured":"CamlCase. 2020 . Dexter: A decentralized exchange for Tezos, on Gitlab. https:\/\/gitlab.com\/camlcase-dev\/dexter\/ CamlCase. 2020. Dexter: A decentralized exchange for Tezos, on Gitlab. https:\/\/gitlab.com\/camlcase-dev\/dexter\/"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/512950.512973"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/512760.512770"},{"key":"e_1_3_2_2_10_1","volume-title":"The DAO Attacked: Code Issue Leads to $60 Million Ether Theft. Saatavissa (viitattu 13.2","author":"del Castillo Michael","year":"2017","unstructured":"Michael del Castillo . 2016. The DAO Attacked: Code Issue Leads to $60 Million Ether Theft. Saatavissa (viitattu 13.2 . 2017 ), 3 (2016), https:\/\/www.coindesk.com\/markets\/2016\/06\/17\/the-dao-attacked-code-issue-leads-to-60-million-ether-theft\/ Michael del Castillo. 2016. The DAO Attacked: Code Issue Leads to $60 Million Ether Theft. Saatavissa (viitattu 13.2. 2017), 3 (2016), https:\/\/www.coindesk.com\/markets\/2016\/06\/17\/the-dao-attacked-code-issue-leads-to-60-million-ether-theft\/"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC53464.2021.00013"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380364"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion.2019.00029"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397385"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-18070-5_7"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02658-4_52"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-41600-3_1"},{"key":"e_1_3_2_2_18_1","volume-title":"ZEUS: Analyzing Safety of Smart Contracts. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018","author":"Kalra Sukrit","year":"2018","unstructured":"Sukrit Kalra , Seep Goel , Mohan Dhawan , and Subodh Sharma . 2018 . ZEUS: Analyzing Safety of Smart Contracts. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018 , San Diego, California, USA , February 18-21, 2018. The Internet Society. http:\/\/wp.internetsociety.org\/ndss\/wp-content\/uploads\/sites\/25\/2018\/02\/ndss2018_09-1_Kalra_paper.pdf Sukrit Kalra, Seep Goel, Mohan Dhawan, and Subodh Sharma. 2018. ZEUS: Analyzing Safety of Smart Contracts. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 18-21, 2018. The Internet Society. http:\/\/wp.internetsociety.org\/ndss\/wp-content\/uploads\/sites\/25\/2018\/02\/ndss2018_09-1_Kalra_paper.pdf"},{"key":"e_1_3_2_2_19_1","unstructured":"La Trobe University. 2013. Joy Programming Language. https:\/\/www.latrobe.edu.au\/humanities\/research\/research-projects\/past-projects\/joy-programming-language  La Trobe University. 2013. Joy Programming Language. https:\/\/www.latrobe.edu.au\/humanities\/research\/research-projects\/past-projects\/joy-programming-language"},{"volume-title":"Dexter Flaw Discovered","author":"Labs Nomadic","key":"e_1_3_2_2_20_1","unstructured":"Nomadic Labs . 2021. Dexter Flaw Discovered ; Funds are Safe . https:\/\/research-development.nomadic-labs.com\/dexter-flaw-discovered-funds-are-safe.html Nomadic Labs. 2021. Dexter Flaw Discovered; Funds are Safe. https:\/\/research-development.nomadic-labs.com\/dexter-flaw-discovered-funds-are-safe.html"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183440.3183495"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10990-006-8609-1"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/11609773_23"},{"key":"e_1_3_2_2_25_1","volume-title":"Forth\u2013a language for interactive computing","author":"Moore Charles H","year":"1970","unstructured":"Charles H Moore and Geoffrey C Leach . 1970. Forth\u2013a language for interactive computing . Amsterdam : Mohasco Industries Inc , http:\/\/www.ultratechnology.com\/4th_ 1970 .html Charles H Moore and Geoffrey C Leach. 1970. Forth\u2013a language for interactive computing. Amsterdam: Mohasco Industries Inc, http:\/\/www.ultratechnology.com\/4th_1970.html"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00133"},{"key":"e_1_3_2_2_27_1","volume-title":"Introducing Mythril: A framework for bug hunting on the Ethereum blockchain. https:\/\/medium.com\/hackernoon\/introducing-mythril-a-framework-for-bug-hunting-on-the-ethereumblockchain-9dc5588f82f6","author":"Mueller Bernhard","year":"2017","unstructured":"Bernhard Mueller . 2017 . Introducing Mythril: A framework for bug hunting on the Ethereum blockchain. https:\/\/medium.com\/hackernoon\/introducing-mythril-a-framework-for-bug-hunting-on-the-ethereumblockchain-9dc5588f82f6 Bernhard Mueller. 2017. Introducing Mythril: A framework for bug hunting on the Ethereum blockchain. https:\/\/medium.com\/hackernoon\/introducing-mythril-a-framework-for-bug-hunting-on-the-ethereumblockchain-9dc5588f82f6"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274743"},{"key":"e_1_3_2_2_29_1","unstructured":"Santiago Palladino. 2017. The parity wallet hack explained. OpenZeppelin blog https:\/\/blog.openzeppelin.com\/on-the-parity-wallet-multisig-hack-405a8c12e8f7.  Santiago Palladino. 2017. The parity wallet hack explained. OpenZeppelin blog https:\/\/blog.openzeppelin.com\/on-the-parity-wallet-multisig-hack-405a8c12e8f7."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.4230\/OASIcs.FMBC.2020.4"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464837"},{"key":"e_1_3_2_2_32_1","volume-title":"Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks. CoRR, abs\/1812.05934","author":"Rodler Michael","year":"2018","unstructured":"Michael Rodler , Wenting Li , Ghassan O. Karame , and Lucas Davi . 2018 . Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks. CoRR, abs\/1812.05934 (2018), arXiv:1812.05934. arxiv:1812.05934 Michael Rodler, Wenting Li, Ghassan O. Karame, and Lucas Davi. 2018. Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks. CoRR, abs\/1812.05934 (2018), arXiv:1812.05934. arxiv:1812.05934"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417250"},{"key":"e_1_3_2_2_34_1","unstructured":"Tezos protocol developers. 2014\u20132022. Michelson: the language of Smart Contract in Tezos. https:\/\/tezos.gitlab.io\/active\/michelson.html  Tezos protocol developers. 2014\u20132022. Michelson: the language of Smart Contract in Tezos. https:\/\/tezos.gitlab.io\/active\/michelson.html"},{"key":"e_1_3_2_2_35_1","unstructured":"Tezos protocol developers. 2020\u20132022. Michelson Reference. https:\/\/tezos.gitlab.io\/michelson-reference\/  Tezos protocol developers. 2020\u20132022. Michelson Reference. https:\/\/tezos.gitlab.io\/michelson-reference\/"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243780"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377812.3390908"}],"event":{"name":"SOAP '22: 11th ACM SIGPLAN International Workshop on the State Of the Art in Program Analysis","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"],"location":"San Diego CA USA","acronym":"SOAP '22"},"container-title":["Proceedings of the 11th ACM SIGPLAN International Workshop on the State Of the Art in Program Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3520313.3534660","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3520313.3534660","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:31Z","timestamp":1750183771000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3520313.3534660"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,14]]},"references-count":37,"alternative-id":["10.1145\/3520313.3534660","10.1145\/3520313"],"URL":"https:\/\/doi.org\/10.1145\/3520313.3534660","relation":{},"subject":[],"published":{"date-parts":[[2022,6,14]]},"assertion":[{"value":"2022-06-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}