{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T11:06:59Z","timestamp":1777892819986,"version":"3.51.4"},"reference-count":56,"publisher":"Association for Computing Machinery (ACM)","issue":"OOPSLA1","license":[{"start":{"date-parts":[[2022,4,29]],"date-time":"2022-04-29T00:00:00Z","timestamp":1651190400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100013209","name":"Hellenic Foundation for Research and Innovation","doi-asserted-by":"publisher","award":["DEAN-BLOCK"],"award-info":[{"award-number":["DEAN-BLOCK"]}],"id":[{"id":"10.13039\/501100013209","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Program. Lang."],"published-print":{"date-parts":[[2022,4,29]]},"abstract":"<jats:p>Smart contracts on the Ethereum blockchain greatly benefit from cutting-edge analysis techniques and pose significant challenges. A primary challenge is the extremely low-level representation of deployed contracts. We present Elipmoc, a decompiler for the next generation of smart contract analyses. Elipmoc is an evolution of Gigahorse, the top research decompiler, dramatically improving over it and over other state-of-the-art tools, by employing several high-precision techniques and making them scalable. Among these techniques are a new kind of context sensitivity (termed \u201ctransactional sensitivity\u201d) that provides a more effective static abstraction of distinct dynamic executions; a path-sensitive (yet scalable, through path merging) algorithm for inference of function arguments and returns; and a fully context sensitive private function reconstruction process. As a result, smart contract security analyses and reverse-engineering tools built on top of Elipmoc achieve high scalability, precision and completeness.<\/jats:p>\n          <jats:p>Elipmoc improves over all notable past decompilers, including its predecessor, Gigahorse, and the state-of-the-art industrial tool, Panoramix, integrated into the primary Ethereum blockchain explorer, Etherscan. Elipmoc produces decompiled contracts with fully resolved operands at a rate of 99.5% (compared to 62.8% for Gigahorse), and achieves much higher completeness in code decompilation than Panoramix\u2014e.g., up to 67% more coverage of external call statements\u2014while being over 5x faster. Elipmoc has been the enabler for recent (independent) discoveries of several exploitable vulnerabilities on popular protocols, over funds in the many millions of dollars.<\/jats:p>","DOI":"10.1145\/3527321","type":"journal-article","created":{"date-parts":[[2022,4,29]],"date-time":"2022-04-29T15:42:03Z","timestamp":1651246923000},"page":"1-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["Elipmoc: advanced decompilation of Ethereum smart contracts"],"prefix":"10.1145","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6790-2872","authenticated-orcid":false,"given":"Neville","family":"Grech","sequence":"first","affiliation":[{"name":"University of Malta, Malta"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6233-1548","authenticated-orcid":false,"given":"Sifis","family":"Lagouvardos","sequence":"additional","affiliation":[{"name":"University of Athens, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1788-053X","authenticated-orcid":false,"given":"Ilias","family":"Tsatiris","sequence":"additional","affiliation":[{"name":"University of Athens, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0499-0182","authenticated-orcid":false,"given":"Yannis","family":"Smaragdakis","sequence":"additional","affiliation":[{"name":"University of Athens, Greece"}]}],"member":"320","published-online":{"date-parts":[[2022,4,29]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"2018. Online Solidity Decompiler. http:\/\/ethervm.io\/decompile  2018. Online Solidity Decompiler. http:\/\/ethervm.io\/decompile"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2968455.2968505"},{"key":"e_1_2_1_3_1","unstructured":"Lee Benfield. 2020. CFR - another java decompiler. https:\/\/www.benf.org\/other\/cfr\/  Lee Benfield. 2020. CFR - another java decompiler. https:\/\/www.benf.org\/other\/cfr\/"},{"key":"e_1_2_1_4_1","volume-title":"Ethainter: A Smart Contract Security Analyzer for Composite Vulnerabilities. In Conf. on Programming Language Design and Implementation (PLDI). ACM.","author":"Brent Lexi","year":"2020","unstructured":"Lexi Brent , Neville Grech , Sifis Lagouvardos , Bernhard Scholz , and Yannis Smaragdakis . 2020 . Ethainter: A Smart Contract Security Analyzer for Composite Vulnerabilities. In Conf. on Programming Language Design and Implementation (PLDI). ACM. Lexi Brent, Neville Grech, Sifis Lagouvardos, Bernhard Scholz, and Yannis Smaragdakis. 2020. Ethainter: A Smart Contract Security Analyzer for Composite Vulnerabilities. In Conf. on Programming Language Design and Implementation (PLDI). ACM."},{"key":"e_1_2_1_5_1","volume-title":"Vandal: A Scalable Security Analysis Framework for Smart Contracts. arxiv:1809.03981 [cs.PL]","author":"Brent Lexi","year":"2018","unstructured":"Lexi Brent , Anton Jurisevic , Michael Kong , Eric Liu , Francois Gauthier , Vincent Gramoli , Ralph Holz , and Bernhard Scholz . 2018 . Vandal: A Scalable Security Analysis Framework for Smart Contracts. arxiv:1809.03981 [cs.PL] Lexi Brent, Anton Jurisevic, Michael Kong, Eric Liu, Francois Gauthier, Vincent Gramoli, Ralph Holz, and Bernhard Scholz. 2018. Vandal: A Scalable Security Analysis Framework for Smart Contracts. arxiv:1809.03981 [cs.PL]"},{"key":"e_1_2_1_6_1","volume-title":"22nd USENIX Security Symposium (USENIX Security 13)","author":"Brumley David","year":"2013","unstructured":"David Brumley , JongHyup Lee , Edward J. Schwartz , and Maverick Woo . 2013 . Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring . In 22nd USENIX Security Symposium (USENIX Security 13) . USENIX Association, Washington, D.C., 353\u2013368. isbn:978-1-93 1971-03-4 https:\/\/www.usenix.org\/conference\/usenixsecurity13\/technical-sessions\/presentation\/schwartz David Brumley, JongHyup Lee, Edward J. Schwartz, and Maverick Woo. 2013. Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring. In 22nd USENIX Security Symposium (USENIX Security 13). USENIX Association, Washington, D.C., 353\u2013368. isbn:978-1-931971-03-4 https:\/\/www.usenix.org\/conference\/usenixsecurity13\/technical-sessions\/presentation\/schwartz"},{"key":"e_1_2_1_7_1","volume-title":"Quorum: A permissioned implementation of Ethereum supporting data privacy. https:\/\/github.com\/jpmorganchase\/quorum","author":"Morgan Chase JP","year":"2020","unstructured":"JP Morgan Chase . 2020 . Quorum: A permissioned implementation of Ethereum supporting data privacy. https:\/\/github.com\/jpmorganchase\/quorum JP Morgan Chase. 2020. Quorum: A permissioned implementation of Ethereum supporting data privacy. https:\/\/github.com\/jpmorganchase\/quorum"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3078342"},{"key":"e_1_2_1_9_1","volume-title":"Reverse compilation techniques. Ph. D. Dissertation","author":"Cifuentes Cristina","unstructured":"Cristina Cifuentes . 1994. Reverse compilation techniques. Ph. D. Dissertation . Queensland University of Technology . https:\/\/eprints.qut.edu.au\/36820\/ Presented to the School of Computing Science, Queensland University of Technology.. Cristina Cifuentes. 1994. Reverse compilation techniques. Ph. D. Dissertation. Queensland University of Technology. https:\/\/eprints.qut.edu.au\/36820\/ Presented to the School of Computing Science, Queensland University of Technology.."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC52881.2021.00021"},{"key":"e_1_2_1_11_1","unstructured":"Dedaub. 2019. Rising Gas Prices are Threatening our Security (no it\u2019s not the Saudi attack). https:\/\/medium.com\/dedaub\/rising-gas-prices-are-threatening-our-security-no-its-not-the-saudi-attack-4b7aa4878e83  Dedaub. 2019. Rising Gas Prices are Threatening our Security (no it\u2019s not the Saudi attack). https:\/\/medium.com\/dedaub\/rising-gas-prices-are-threatening-our-security-no-its-not-the-saudi-attack-4b7aa4878e83"},{"key":"e_1_2_1_12_1","unstructured":"Dedaub. 2021. EIP-3074 Impact Study. https:\/\/docs.google.com\/document\/d\/1itvPn7BhZ9N8h27d1Ig5C86_FZpyG5_cdpsuPJYmb-o\/edit?usp=sharing  Dedaub. 2021. EIP-3074 Impact Study. https:\/\/docs.google.com\/document\/d\/1itvPn7BhZ9N8h27d1Ig5C86_FZpyG5_cdpsuPJYmb-o\/edit?usp=sharing"},{"key":"e_1_2_1_13_1","unstructured":"Dedaub. 2021. Ethereum Pawn Stars: \u2019$5.7M in hard assets? Best I can do is $2.3M\u2019. https:\/\/medium.com\/dedaub\/ethereum-pawn-stars-5-7m-in-hard-assets-best-i-can-do-is-2-3m-b93604be503e  Dedaub. 2021. Ethereum Pawn Stars: \u2019$5.7M in hard assets? Best I can do is $2.3M\u2019. https:\/\/medium.com\/dedaub\/ethereum-pawn-stars-5-7m-in-hard-assets-best-i-can-do-is-2-3m-b93604be503e"},{"key":"e_1_2_1_14_1","unstructured":"Dedaub. 2021. Killing a Bad (Arbitrage) Bot ... to Save its Owners. https:\/\/medium.com\/dedaub\/killing-a-bad-arbitrage-bot-f29e7e808c7d  Dedaub. 2021. Killing a Bad (Arbitrage) Bot ... to Save its Owners. https:\/\/medium.com\/dedaub\/killing-a-bad-arbitrage-bot-f29e7e808c7d"},{"key":"e_1_2_1_15_1","unstructured":"Dedaub. 2021. Look Ma\u2019 no source! Hacking a DeFi Service with No Source Code Available. https:\/\/medium.com\/dedaub\/look-ma-no-source-hacking-a-defi-service-with-no-source-code-available-c40a6583f28f  Dedaub. 2021. Look Ma\u2019 no source! Hacking a DeFi Service with No Source Code Available. https:\/\/medium.com\/dedaub\/look-ma-no-source-hacking-a-defi-service-with-no-source-code-available-c40a6583f28f"},{"key":"e_1_2_1_16_1","unstructured":"Dedaub. 2021. Verkle Gas Cost Changes Insights. https:\/\/docs.google.com\/document\/d\/1s3qqzbkQFPcNvhzKPdnxg3MlFbv0YjK1z02SxRtdMs8\/edit#heading=h.slduooqtgkoq  Dedaub. 2021. Verkle Gas Cost Changes Insights. https:\/\/docs.google.com\/document\/d\/1s3qqzbkQFPcNvhzKPdnxg3MlFbv0YjK1z02SxRtdMs8\/edit#heading=h.slduooqtgkoq"},{"key":"e_1_2_1_17_1","volume-title":"Yield Skimming: Forcing Bad Swaps on Yield Farming. https:\/\/medium.com\/dedaub\/yield-skimming-forcing-bad-swaps-on-yield-farming-397361fd7c72?source=friends_link&sk=d146b3640321f0a3ccc80540b54368ff","year":"2021","unstructured":"Dedaub. 2021 . Yield Skimming: Forcing Bad Swaps on Yield Farming. https:\/\/medium.com\/dedaub\/yield-skimming-forcing-bad-swaps-on-yield-farming-397361fd7c72?source=friends_link&sk=d146b3640321f0a3ccc80540b54368ff Dedaub. 2021. Yield Skimming: Forcing Bad Swaps on Yield Farming. https:\/\/medium.com\/dedaub\/yield-skimming-forcing-bad-swaps-on-yield-farming-397361fd7c72?source=friends_link&sk=d146b3640321f0a3ccc80540b54368ff"},{"key":"e_1_2_1_18_1","unstructured":"E. Dupuy. 2020. Java Decompiler. http:\/\/java-decompiler.github.io\/  E. Dupuy. 2020. Java Decompiler. http:\/\/java-decompiler.github.io\/"},{"key":"e_1_2_1_19_1","unstructured":"Nicolas Falliere. 2019. Ethereum Smart Contract Decompiler. https:\/\/www.pnfsoftware.com\/blog\/ethereum-smart-contract-decompiler\/  Nicolas Falliere. 2019. Ethereum Smart Contract Decompiler. https:\/\/www.pnfsoftware.com\/blog\/ethereum-smart-contract-decompiler\/"},{"key":"e_1_2_1_20_1","unstructured":"Antonio Flores-Montoya and Eric Schulte. 2019. Datalog Disassembly. arxiv:1906.03969 [cs.PL]  Antonio Flores-Montoya and Eric Schulte. 2019. Datalog Disassembly. arxiv:1906.03969 [cs.PL]"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2009.04.010"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00120"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.2578692"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3276486"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2009.24"},{"key":"e_1_2_1_26_1","volume-title":"The Strengths and Behavioral Quirks of Java Bytecode Decompilers. In 2019 19th International Working Conference on Source Code Analysis and Manipulation (SCAM). IEEE, 92\u2013102","author":"Harrand Nicolas","year":"2019","unstructured":"Nicolas Harrand , C\u2019esar Soto-Valero , Martin Monperrus , and Benoit Baudry . 2019 . The Strengths and Behavioral Quirks of Java Bytecode Decompilers. In 2019 19th International Working Conference on Source Code Analysis and Manipulation (SCAM). IEEE, 92\u2013102 . https:\/\/arxiv.org\/pdf\/1908.06895.pdf Nicolas Harrand, C\u2019esar Soto-Valero, Martin Monperrus, and Benoit Baudry. 2019. The Strengths and Behavioral Quirks of Java Bytecode Decompilers. In 2019 19th International Working Conference on Source Code Analysis and Manipulation (SCAM). IEEE, 92\u2013102. https:\/\/arxiv.org\/pdf\/1908.06895.pdf"},{"key":"e_1_2_1_27_1","unstructured":"Immunefi. 2021. Harvest Finance Uninitialized Proxies Bug Fix Postmortem. https:\/\/medium.com\/immunefi\/harvest-finance-uninitialized-proxies-bug-fix-postmortem-ea5c0f7af96b  Immunefi. 2021. Harvest Finance Uninitialized Proxies Bug Fix Postmortem. https:\/\/medium.com\/immunefi\/harvest-finance-uninitialized-proxies-bug-fix-postmortem-ea5c0f7af96b"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133924"},{"key":"e_1_2_1_29_1","volume-title":"2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER). 346\u2013356","author":"Katz D. S.","unstructured":"D. S. Katz , J. Ruchti , and E. Schulte . 2018. Using recurrent neural networks for decompilation . In 2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER). 346\u2013356 . D. S. Katz, J. Ruchti, and E. Schulte. 2018. Using recurrent neural networks for decompilation. In 2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER). 346\u2013356."},{"key":"e_1_2_1_30_1","unstructured":"Tomasz Kolinko and Palkeo. 2020. Panoramix \u2013 Decompiler at the heart of eveem.org. https:\/\/github.com\/palkeo\/panoramix  Tomasz Kolinko and Palkeo. 2020. Panoramix \u2013 Decompiler at the heart of eveem.org. https:\/\/github.com\/palkeo\/panoramix"},{"key":"e_1_2_1_31_1","volume-title":"Proceedings of the 13th Conference on USENIX Security Symposium -","volume":"13","author":"Kruegel Christopher","year":"2004","unstructured":"Christopher Kruegel , William Robertson , Fredrik Valeur , and Giovanni Vigna . 2004 . Static Disassembly of Obfuscated Binaries . In Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13 (San Diego, CA) (SSYM\u201904). USENIX Association, USA, 18. Christopher Kruegel, William Robertson, Fredrik Valeur, and Giovanni Vigna. 2004. Static Disassembly of Obfuscated Binaries. In Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13 (San Diego, CA) (SSYM\u201904). USENIX Association, USA, 18."},{"key":"e_1_2_1_32_1","volume-title":"Proceedings of the ACM in Programming Languages (OOPSLA) 4, OOPSLA","author":"Lagouvardos Sifis","year":"2020","unstructured":"Sifis Lagouvardos , Neville Grech , Ilias Tsatiris , and Yannis Smaragdakis . 2020 . Precise Static Modelling of Ethereum \u201cMemory \u201d. Proceedings of the ACM in Programming Languages (OOPSLA) 4, OOPSLA (2020). Sifis Lagouvardos, Neville Grech, Ilias Tsatiris, and Yannis Smaragdakis. 2020. Precise Static Modelling of Ethereum \u201cMemory\u201d. Proceedings of the ACM in Programming Languages (OOPSLA) 4, OOPSLA (2020)."},{"key":"e_1_2_1_33_1","unstructured":"Michales Jonah. 2021. Inside the War Room That Saved Primitive Finance. https:\/\/medium.com\/immunefi\/inside-the-war-room-that-saved-primitive-finance-6509e2188c86  Michales Jonah. 2021. Inside the War Room That Saved Primitive Finance. https:\/\/medium.com\/immunefi\/inside-the-war-room-that-saved-primitive-finance-6509e2188c86"},{"key":"e_1_2_1_34_1","volume-title":"Proceedings of the 11th International Conference on Compiler Construction (CC \u201902)","author":"Miecznikowski Jerome","unstructured":"Jerome Miecznikowski and Laurie J. Hendren . 2002. Decompiling Java Bytecode: Problems, Traps and Pitfalls . In Proceedings of the 11th International Conference on Compiler Construction (CC \u201902) . Springer-Verlag, London, UK, UK, 111\u2013127. isbn:3-540-43369-4 http:\/\/dl.acm.org\/citation.cfm?id=647478.727938 Jerome Miecznikowski and Laurie J. Hendren. 2002. Decompiling Java Bytecode: Problems, Traps and Pitfalls. In Proceedings of the 11th International Conference on Compiler Construction (CC \u201902). Springer-Verlag, London, UK, UK, 111\u2013127. isbn:3-540-43369-4 http:\/\/dl.acm.org\/citation.cfm?id=647478.727938"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1044834.1044835"},{"key":"e_1_2_1_36_1","unstructured":"Primitive Finance. 2021. PrimitiveFi post-mortem analysis. https:\/\/primitivefinance.medium.com\/postmortem-on-the-primitive-finance-whitehack-of-february-21st-2021-17446c0f3122  Primitive Finance. 2021. PrimitiveFi post-mortem analysis. https:\/\/primitivefinance.medium.com\/postmortem-on-the-primitive-finance-whitehack-of-february-21st-2021-17446c0f3122"},{"key":"e_1_2_1_37_1","volume-title":"Proceedings of the 3rd Conference on USENIX Conference on Object-Oriented Technologies (COOTS) -","volume":"3","author":"Todd","unstructured":"Todd A. Proebsting and Scott A. Watterson. 1997. Krakatoa: Decompilation in Java (Does Bytecode Reveal Source?) . In Proceedings of the 3rd Conference on USENIX Conference on Object-Oriented Technologies (COOTS) - Volume 3 (Portland, Oregon) (COOTS\u201997). USENIX Association, Berkeley, CA, USA, 14\u201314. http:\/\/dl.acm.org\/citation.cfm?id=1268028.1268042 Todd A. Proebsting and Scott A. Watterson. 1997. Krakatoa: Decompilation in Java (Does Bytecode Reveal Source?). In Proceedings of the 3rd Conference on USENIX Conference on Object-Oriented Technologies (COOTS) - Volume 3 (Portland, Oregon) (COOTS\u201997). USENIX Association, Berkeley, CA, USA, 14\u201314. http:\/\/dl.acm.org\/citation.cfm?id=1268028.1268042"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243793"},{"key":"e_1_2_1_39_1","volume-title":"Control-flow analysis of higher-order languages. Ph. D. Dissertation","author":"Shivers Olin","unstructured":"Olin Shivers . 1991. Control-flow analysis of higher-order languages. Ph. D. Dissertation . Carnegie Mellon University . Olin Shivers. 1991. Control-flow analysis of higher-order languages. Ph. D. Dissertation. Carnegie Mellon University."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1925844.1926390"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485540"},{"key":"e_1_2_1_42_1","unstructured":"Mike Strobel. 2020. Procyon. https:\/\/bitbucket.org\/mstrobel\/procyon\/wiki\/Java  Mike Strobel. 2020. Procyon. https:\/\/bitbucket.org\/mstrobel\/procyon\/wiki\/Java"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062359"},{"key":"e_1_2_1_44_1","unstructured":"TrustLook. 2019. Smart Contract Guardian - Trustlook SECaaS. https:\/\/www.trustlook.com\/services\/smart.html  TrustLook. 2019. Smart Contract Guardian - Trustlook SECaaS. https:\/\/www.trustlook.com\/services\/smart.html"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243780"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.5555\/781995.782008"},{"key":"e_1_2_1_47_1","unstructured":"Michael Van Emmerik. 2007. Static Single Assignment for Decompilation. Ph. D. Dissertation.  Michael Van Emmerik. 2007. Static Single Assignment for Decompilation. Ph. D. Dissertation."},{"key":"e_1_2_1_48_1","unstructured":"Various. 2017. GitHub - vyperlang\/vyper: Pythonic Smart Contract Language for the EVM. https:\/\/github.com\/ethereum\/solidity  Various. 2017. GitHub - vyperlang\/vyper: Pythonic Smart Contract Language for the EVM. https:\/\/github.com\/ethereum\/solidity"},{"key":"e_1_2_1_49_1","unstructured":"Various. 2018. GitHub - ethereum\/solidity: The Solidity Contract-Oriented Programming Language. https:\/\/github.com\/ethereum\/solidity  Various. 2018. GitHub - ethereum\/solidity: The Solidity Contract-Oriented Programming Language. https:\/\/github.com\/ethereum\/solidity"},{"key":"e_1_2_1_50_1","unstructured":"Various. 2018. GitHub - OpenZeppelin\/openzeppelin-contracts: OpenZeppelin Contracts is a library for secure smart contract development. https:\/\/github.com\/OpenZeppelin\/openzeppelin-contracts  Various. 2018. GitHub - OpenZeppelin\/openzeppelin-contracts: OpenZeppelin Contracts is a library for secure smart contract development. https:\/\/github.com\/OpenZeppelin\/openzeppelin-contracts"},{"key":"e_1_2_1_51_1","unstructured":"Various. 2018. Porosity \u2013 a decompiler for EVM bytecode into readable Solidity-syntax contracts. https:\/\/github.com\/comaeio\/porosity  Various. 2018. Porosity \u2013 a decompiler for EVM bytecode into readable Solidity-syntax contracts. https:\/\/github.com\/comaeio\/porosity"},{"key":"e_1_2_1_52_1","unstructured":"Various. 2020. Fernflower. https:\/\/github.com\/JetBrains\/intellij-community\/tree\/master\/plugins\/java-decompiler\/engine  Various. 2020. Fernflower. https:\/\/github.com\/JetBrains\/intellij-community\/tree\/master\/plugins\/java-decompiler\/engine"},{"key":"e_1_2_1_53_1","volume-title":"Ethereum: A secure decentralised generalised transaction ledger","author":"Wood Gavin","year":"2014","unstructured":"Gavin Wood . 2014 . Ethereum: A secure decentralised generalised transaction ledger . http:\/\/gavwood.com\/paper.pdf. Gavin Wood. 2014. Ethereum: A secure decentralised generalised transaction ledger. http:\/\/gavwood.com\/paper.pdf."},{"key":"e_1_2_1_54_1","volume-title":"2016 IEEE Symposium on Security and Privacy (SP). 158\u2013177","author":"Yakdan K.","unstructured":"K. Yakdan , S. Dechand , E. Gerhards-Padilla , and M. Smith . 2016. Helping Johnny to Analyze Malware: A Usability-Optimized Decompiler and Malware Analysis User Study . In 2016 IEEE Symposium on Security and Privacy (SP). 158\u2013177 . K. Yakdan, S. Dechand, E. Gerhards-Padilla, and M. Smith. 2016. Helping Johnny to Analyze Malware: A Usability-Optimized Decompiler and Malware Analysis User Study. In 2016 IEEE Symposium on Security and Privacy (SP). 158\u2013177."},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23185"},{"key":"e_1_2_1_56_1","volume-title":"Erays: Reverse Engineering Ethereums Opaque Smart Contracts. In 27th USENIX Security Symposium (USENIX Security 18)","author":"Zhou Yi","year":"2018","unstructured":"Yi Zhou , Deepak Kumar , Surya Bakshi , Joshua Mason , Andrew Miller , and Michael Bailey . 2018 . Erays: Reverse Engineering Ethereums Opaque Smart Contracts. In 27th USENIX Security Symposium (USENIX Security 18) . USENIX Association, Baltimore, MD, 1371\u20131385. isbn:978-1-939133-04-5 https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/zhou Yi Zhou, Deepak Kumar, Surya Bakshi, Joshua Mason, Andrew Miller, and Michael Bailey. 2018. Erays: Reverse Engineering Ethereums Opaque Smart Contracts. In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD, 1371\u20131385. isbn:978-1-939133-04-5 https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/zhou"}],"container-title":["Proceedings of the ACM on Programming Languages"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3527321","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3527321","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:53Z","timestamp":1750191533000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3527321"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,29]]},"references-count":56,"journal-issue":{"issue":"OOPSLA1","published-print":{"date-parts":[[2022,4,29]]}},"alternative-id":["10.1145\/3527321"],"URL":"https:\/\/doi.org\/10.1145\/3527321","relation":{},"ISSN":["2475-1421"],"issn-type":[{"value":"2475-1421","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,29]]},"assertion":[{"value":"2022-04-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}