{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T02:09:44Z","timestamp":1777342184762,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":68,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,7,18]]},"DOI":"10.1145\/3533767.3534218","type":"proceedings-article","created":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T14:28:50Z","timestamp":1657895330000},"page":"703-715","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":39,"title":["WASAI: uncovering vulnerabilities in Wasm smart contracts"],"prefix":"10.1145","author":[{"given":"Weimin","family":"Chen","sequence":"first","affiliation":[{"name":"Hong Kong Polytechnic University, China"}]},{"given":"Zihan","family":"Sun","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, China"}]},{"given":"Haoyu","family":"Wang","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, China"}]},{"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"Hong Kong Polytechnic University, China"}]},{"given":"Haipeng","family":"Cai","sequence":"additional","affiliation":[{"name":"Washington State University, USA"}]},{"given":"Lei","family":"Wu","sequence":"additional","affiliation":[{"name":"Zhejiang University, China"}]}],"member":"320","published-online":{"date-parts":[[2022,7,18]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"J. Bergbom. 202"},{"key":"e_1_3_2_1_2_1","volume-title":"Proc. ACM SIGSAC Conference on Computer and Communications Security.","author":"Bian W.","unstructured":"W. Bian , W. Meng , and Y. Wang . 2019. Poster: Detecting WebAssembly-Based Cryptocurrency Mining . In Proc. ACM SIGSAC Conference on Computer and Communications Security. W. Bian, W. Meng, and Y. Wang. 2019. Poster: Detecting WebAssembly-Based Cryptocurrency Mining. In Proc. ACM SIGSAC Conference on Computer and Communications Security."},{"key":"e_1_3_2_1_3_1","unstructured":"Block.one. 2021. A blockchain protocol with industry-leading transaction speed and flexible utility. [Online]. Available: https:\/\/eos.io\/.  \t\t\t\t\t  Block.one. 2021. A blockchain protocol with industry-leading transaction speed and flexible utility. [Online]. Available: https:\/\/eos.io\/."},{"key":"e_1_3_2_1_4_1","volume-title":"Proc. USENIX Security Symposium.","author":"Breidenbach L.","unstructured":"L. Breidenbach , P. Daian , F. Tram\u00e8r , and A. Juels . 2018. Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts . In Proc. USENIX Security Symposium. L. Breidenbach, P. Daian, F. Tram\u00e8r, and A. Juels. 2018. Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts. In Proc. USENIX Security Symposium."},{"key":"e_1_3_2_1_5_1","volume-title":"DEFECTCHECKER: Automated Smart Contract Defect Detection by Analyzing EVM Bytecode","author":"Chen J.","year":"2022","unstructured":"J. Chen , X. Xia , D. Lo , J. Grundy , X. Luo , and T. Chen . 2022 . DEFECTCHECKER: Automated Smart Contract Defect Detection by Analyzing EVM Bytecode . IEEE Transactions on Software Engineering ( 2022 ). J. Chen, X. Xia, D. Lo, J. Grundy, X. Luo, and T. Chen. 2022. DEFECTCHECKER: Automated Smart Contract Defect Detection by Analyzing EVM Bytecode. IEEE Transactions on Software Engineering ( 2022 )."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"J. Chen X. Xia D. Lo J. Grundy X. Luo and T. Chen. 2022. Defining Smart Contract Defects on Ethereum. IEEE Transactions on Software Engineering 48 1 ( 2022 ).  \t\t\t\t\t  J. Chen X. Xia D. Lo J. Grundy X. Luo and T. Chen. 2022. Defining Smart Contract Defects on Ethereum. IEEE Transactions on Software Engineering 48 1 ( 2022 ).","DOI":"10.1109\/TSE.2020.2989002"},{"key":"e_1_3_2_1_7_1","volume-title":"Proc. Network and Distributed System Security Symposium.","author":"Chen T.","unstructured":"T. Chen , R. Cao , T. Li , X. Luo , G. Gu , Y. Zhang , Z. Liao , H. Zhu , G. Chen , Z. He , Y. Tang , X. Lin , and X. Zhang . 2020. SODA: A Generic Online Detection Framework for Smart Contracts . In Proc. Network and Distributed System Security Symposium. T. Chen, R. Cao, T. Li, X. Luo, G. Gu, Y. Zhang, Z. Liao, H. Zhu, G. Chen, Z. He, Y. Tang, X. Lin, and X. Zhang. 2020. SODA: A Generic Online Detection Framework for Smart Contracts. In Proc. Network and Distributed System Security Symposium."},{"key":"e_1_3_2_1_8_1","volume-title":"Proc. ACM Conference on Computer and Communications Security.","author":"Chen T.","unstructured":"T. Chen , Y. Zhang , Z. Li , X. Luo , T. Wang , R. Cao , X. Xiao , and X. Zhang . 2019. TokenScope: Automatically Detecting Inconsistent Behaviors of Cryptocurrency Tokens in Ethereum . In Proc. ACM Conference on Computer and Communications Security. T. Chen, Y. Zhang, Z. Li, X. Luo, T. Wang, R. Cao, X. Xiao, and X. Zhang. 2019. TokenScope: Automatically Detecting Inconsistent Behaviors of Cryptocurrency Tokens in Ethereum. In Proc. ACM Conference on Computer and Communications Security."},{"key":"e_1_3_2_1_9_1","volume":"202","author":"Chen Z.","unstructured":"Z. Chen , C. Wang , J. Yan , Y. Sui , and J. Xue. 202 1. Runtime Detection of Memory Errors with Smart Status. In Proc.ACM SIGSOFT International Symposium on Software Testing and Analysis. Z. Chen, C. Wang, J. Yan, Y. Sui, and J. Xue. 2021. Runtime Detection of Memory Errors with Smart Status. In Proc.ACM SIGSOFT International Symposium on Software Testing and Analysis.","journal-title":"J. Xue."},{"key":"e_1_3_2_1_10_1","unstructured":"Cointelegraph. 2021. EOS DApps Lose Almost $1 Million to Hackers Over the Last Five Months. [Online]. Available: https:\/\/cointelegraph.com\/news\/eosdapps-lose-almost-1-million-to-hackers-over-the-last-five-months.  \t\t\t\t\t  Cointelegraph. 2021. EOS DApps Lose Almost $1 Million to Hackers Over the Last Five Months. [Online]. Available: https:\/\/cointelegraph.com\/news\/eosdapps-lose-almost-1-million-to-hackers-over-the-last-five-months."},{"key":"e_1_3_2_1_11_1","unstructured":"ConsenSys. 2021. Mythril security analysis tool for EVM bytecode. [Online]. Available: https:\/\/github.com\/ConsenSys\/mythril.  \t\t\t\t\t  ConsenSys. 2021. Mythril security analysis tool for EVM bytecode. [Online]. Available: https:\/\/github.com\/ConsenSys\/mythril."},{"key":"e_1_3_2_1_12_1","volume-title":"Proc. IEEE Symposium on Security and Privacy.","author":"Dolan-Gavitt B.","unstructured":"B. Dolan-Gavitt , P. Hulin , E. Kirda , T. Leek , A. Mambretti , WK. Robertson , F. Ulrich , and R. Whelan . 2016. LAVA: Large-Scale Automated Vulnerability Addition . In Proc. IEEE Symposium on Security and Privacy. B. Dolan-Gavitt, P. Hulin, E. Kirda, T. Leek, A. Mambretti, WK. Robertson, F. Ulrich, and R. Whelan. 2016. LAVA: Large-Scale Automated Vulnerability Addition. In Proc. IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_1_13_1","volume-title":"Proc. ACM\/IEEE 42nd International Conference on Software Engineering.","author":"Durieux T.","unstructured":"T. Durieux , JF. Ferreira ., R. Abreu , and P. Cruz . 2020. Empirical Review of Automated Analysis Tools on 47 ,587 Ethereum Smart Contracts . In Proc. ACM\/IEEE 42nd International Conference on Software Engineering. T. Durieux, JF. Ferreira., R. Abreu, and P. Cruz. 2020. Empirical Review of Automated Analysis Tools on 47 ,587 Ethereum Smart Contracts. In Proc. ACM\/IEEE 42nd International Conference on Software Engineering."},{"key":"e_1_3_2_1_14_1","unstructured":"Niguez Randomity Engine. 2019. [Online]. Available: https:\/\/ niguezrandomityengine.github.io\/.  \t\t\t\t\t  Niguez Randomity Engine. 2019. [Online]. Available: https:\/\/ niguezrandomityengine.github.io\/."},{"key":"e_1_3_2_1_15_1","unstructured":"EOSIO. 2021. C++ API. [Online]. Available: https:\/\/developers.eos.io\/manuals\/ eosio.cdt\/v1.5\/group__cpp__api.  \t\t\t\t\t  EOSIO. 2021. C++ API. [Online]. Available: https:\/\/developers.eos.io\/manuals\/ eosio.cdt\/v1.5\/group__cpp__api."},{"key":"e_1_3_2_1_16_1","unstructured":"EOSIO. 2021. Nodeos RPC API Reference. [Online]. Available: https:\/\/developers. eos.io\/welcome\/v2. 2\/reference\/nodeos-rpc-api-reference.  \t\t\t\t\t  EOSIO. 2021. Nodeos RPC API Reference. [Online]. Available: https:\/\/developers. eos.io\/welcome\/v2. 2\/reference\/nodeos-rpc-api-reference."},{"key":"e_1_3_2_1_17_1","unstructured":"EOSIO. 2021. The repository of the EOS VM. [Online]. Available: https: \/\/github.com\/EOSIO\/eos-vm.  \t\t\t\t\t  EOSIO. 2021. The repository of the EOS VM. [Online]. Available: https: \/\/github.com\/EOSIO\/eos-vm."},{"key":"e_1_3_2_1_18_1","unstructured":"Ethereum. 2021. Ethereum Oficial Site. [Online]. Available: https:\/\/ethereum. org\/.  \t\t\t\t\t  Ethereum. 2021. Ethereum Oficial Site. [Online]. Available: https:\/\/ethereum. org\/."},{"key":"e_1_3_2_1_19_1","unstructured":"Ethereum. 2021. A smart contract is simply a program that runs on the Ethereum blockchain. [Online]. Available: https:\/\/ethereum.org\/en\/developers\/docs\/smartcontracts\/.  \t\t\t\t\t  Ethereum. 2021. A smart contract is simply a program that runs on the Ethereum blockchain. [Online]. Available: https:\/\/ethereum.org\/en\/developers\/docs\/smartcontracts\/."},{"key":"e_1_3_2_1_20_1","unstructured":"Ethereum. 2021. A virtual machine to run Ethereum smart contracts. [Online]. Available: https:\/\/ethereum.org\/en\/developers\/docs\/evm\/.  \t\t\t\t\t  Ethereum. 2021. A virtual machine to run Ethereum smart contracts. [Online]. Available: https:\/\/ethereum.org\/en\/developers\/docs\/evm\/."},{"key":"e_1_3_2_1_21_1","volume-title":"Proc. IEEE\/ACM International Conference on Automated Software Engineering.","author":"Feng Y.","unstructured":"Y. Feng , E. Torlak , and R. Bodik . 2020. Summary-Based Symbolic Evaluation for Smart Contracts . In Proc. IEEE\/ACM International Conference on Automated Software Engineering. Y. Feng, E. Torlak, and R. Bodik. 2020. Summary-Based Symbolic Evaluation for Smart Contracts. In Proc. IEEE\/ACM International Conference on Automated Software Engineering."},{"key":"e_1_3_2_1_22_1","volume-title":"Proc. USENIX Security Symposium.","author":"Frank J.","unstructured":"J. Frank , C. Aschermann , and T. Holz . 2020. ETHBMC: A Bounded Model Checker for Smart Contracts . In Proc. USENIX Security Symposium. J. Frank, C. Aschermann, and T. Holz. 2020. ETHBMC: A Bounded Model Checker for Smart Contracts. In Proc. USENIX Security Symposium."},{"key":"e_1_3_2_1_23_1","unstructured":"Jake Frankenfield. 2021. EOS ICO. [Online.] Avaliable: https:\/\/www.investopedia. com\/terms\/i\/initial-coin-ofering-ico.asp.  \t\t\t\t\t  Jake Frankenfield. 2021. EOS ICO. [Online.] Avaliable: https:\/\/www.investopedia. com\/terms\/i\/initial-coin-ofering-ico.asp."},{"key":"e_1_3_2_1_24_1","volume-title":"Proc. ACM SIGSOFT International Symposium on Software Testing and Analysis.","author":"Ghaleb A.","unstructured":"A. Ghaleb and K. Pattabiraman . 2020. How Efective Are Smart Contract Analysis Tools? Evaluating Smart Contract Static Analysis Tools Using Bug Injection . In Proc. ACM SIGSOFT International Symposium on Software Testing and Analysis. A. Ghaleb and K. Pattabiraman. 2020. How Efective Are Smart Contract Analysis Tools? Evaluating Smart Contract Static Analysis Tools Using Bug Injection. In Proc. ACM SIGSOFT International Symposium on Software Testing and Analysis."},{"key":"e_1_3_2_1_25_1","volume-title":"Proc. International Conference on Software Engineering.","author":"Grech N.","unstructured":"N. Grech , L. Brent , B. Scholz , and Y. Smaragdakis . 2019. Gigahorse: thorough, declarative decompilation of smart contracts . In Proc. International Conference on Software Engineering. N. Grech, L. Brent, B. Scholz, and Y. Smaragdakis. 2019. Gigahorse: thorough, declarative decompilation of smart contracts. In Proc. International Conference on Software Engineering."},{"key":"e_1_3_2_1_26_1","unstructured":"HackersDelight. 2021. Hakmem Popcnt Algorithm. [Online]. Available: http:\/\/www.hackersdelight.org\/.  \t\t\t\t\t  HackersDelight. 2021. Hakmem Popcnt Algorithm. [Online]. Available: http:\/\/www.hackersdelight.org\/."},{"key":"e_1_3_2_1_27_1","volume-title":"Proc. ACM SIGSAC Conference on Computer and Communications Security.","author":"He J.","unstructured":"J. He , B. Mislav , A. Nodar , T. Petar , and V. Martin . 2019. Learning to Fuzz from Symbolic Execution with Application to Smart Contracts . In Proc. ACM SIGSAC Conference on Computer and Communications Security. J. He, B. Mislav, A. Nodar, T. Petar, and V. Martin. 2019. Learning to Fuzz from Symbolic Execution with Application to Smart Contracts. In Proc. ACM SIGSAC Conference on Computer and Communications Security."},{"key":"e_1_3_2_1_28_1","volume-title":"Proc. USENIX Security Symposium.","author":"He N.","unstructured":"N. He , R. Zhang , H. Wang , L. Wu , X. Luo , Y. Guo , T. Yu , and X. Jiang . 2021. EOSAFE: Security Analysis of EOSIO Smart Contracts . In Proc. USENIX Security Symposium. N. He, R. Zhang, H. Wang, L. Wu, X. Luo, Y. Guo, T. Yu, and X. Jiang. 2021. EOSAFE: Security Analysis of EOSIO Smart Contracts. In Proc. USENIX Security Symposium."},{"key":"e_1_3_2_1_29_1","volume-title":"Proc. Asia-Pacific Symposium on Internetware.","author":"Huang Y.","unstructured":"Y. Huang , B. Jiang , and W.K. Chan . 2020. EOSFuzzer: Fuzzing EOSIO Smart Contracts for Vulnerability Detection . In Proc. Asia-Pacific Symposium on Internetware. Y. Huang, B. Jiang, and W.K. Chan. 2020. EOSFuzzer: Fuzzing EOSIO Smart Contracts for Vulnerability Detection. In Proc. Asia-Pacific Symposium on Internetware."},{"key":"e_1_3_2_1_30_1","unstructured":"Huobi Inc. 2021. Million EOS Disappears in a Hack Attack EOS Accounts Blocked by huobi. [Online]. Available: https:\/\/www.forexcrunch.com\/eos-news-update-2-09-million-eos-disappears-in-a-hack-attack-eos-accounts-blocked-by-houbi.  \t\t\t\t\t  Huobi Inc. 2021. Million EOS Disappears in a Hack Attack EOS Accounts Blocked by huobi. [Online]. Available: https:\/\/www.forexcrunch.com\/eos-news-update-2-09-million-eos-disappears-in-a-hack-attack-eos-accounts-blocked-by-houbi."},{"key":"e_1_3_2_1_31_1","unstructured":"PeckShield Inc. 2021. Blogs about blockchain security events. [Online]. Available: https:\/\/blog.peckshield.com\/blog.html.  \t\t\t\t\t  PeckShield Inc. 2021. Blogs about blockchain security events. [Online]. Available: https:\/\/blog.peckshield.com\/blog.html."},{"key":"e_1_3_2_1_32_1","unstructured":"SlowMist Inc. 2021. Blockchain security events. [Online]. Available: https: \/\/hacked.slowmist.io\/en\/.  \t\t\t\t\t  SlowMist Inc. 2021. Blockchain security events. [Online]. Available: https: \/\/hacked.slowmist.io\/en\/."},{"key":"e_1_3_2_1_33_1","volume-title":"Proc. International Conference on Automated Software Engineering.","author":"Jiang B.","unstructured":"B. Jiang , Y. Liu , and W.K. Chan . 2018. ContractFuzzer: Fuzzing Smart Contracts for Vulnerability Detection . In Proc. International Conference on Automated Software Engineering. B. Jiang, Y. Liu, and W.K. Chan. 2018. ContractFuzzer: Fuzzing Smart Contracts for Vulnerability Detection. In Proc. International Conference on Automated Software Engineering."},{"key":"e_1_3_2_1_34_1","volume-title":"Proc. Network and Distributed System Security Symposium.","author":"Johnson E.","unstructured":"E. Johnson , D. Thien , Y. Alhessi , S. Narayan , F. Brown , S. Lerner , T. McMullen , S. Savage , and D. Stefan . 2021. SFI safety for native-compiled Wasm . In Proc. Network and Distributed System Security Symposium. E. Johnson, D. Thien, Y. Alhessi, S. Narayan, F. Brown, S. Lerner, T. McMullen, S. Savage, and D. Stefan. 2021. SFI safety for native-compiled Wasm. In Proc. Network and Distributed System Security Symposium."},{"key":"e_1_3_2_1_35_1","volume-title":"Proc. USENIX Security Symposium.","author":"Krupp J.","unstructured":"J. Krupp and C. Rossow . 2018. teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts . In Proc. USENIX Security Symposium. J. Krupp and C. Rossow. 2018. teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts. In Proc. USENIX Security Symposium."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"S. Lagouvardos N. Grech I. Tsatiris and Y. Smaragdakis. 2020. Precise Static Modeling of Ethereum Memory. ACM Program. Lang. OOPSLA ( 2020 ).  \t\t\t\t\t  S. Lagouvardos N. Grech I. Tsatiris and Y. Smaragdakis. 2020. Precise Static Modeling of Ethereum Memory. ACM Program. Lang. OOPSLA ( 2020 ).","DOI":"10.1145\/3428258"},{"key":"e_1_3_2_1_37_1","volume-title":"Proc. USENIX Security Symposium.","author":"Lehmann D.","unstructured":"D. Lehmann , J. Kinder , and M. Pradel . 2020. Everything Old is New Again: Binary Security of WebAssembly . In Proc. USENIX Security Symposium. D. Lehmann, J. Kinder, and M. Pradel. 2020. Everything Old is New Again: Binary Security of WebAssembly. In Proc. USENIX Security Symposium."},{"key":"e_1_3_2_1_38_1","volume-title":"Proc. International Conference on Architectural Support for Programming Languages and Operating Systems.","author":"Lehmann D.","unstructured":"D. Lehmann and M. Pradel . 2019. Wasabi: A Framework for Dynamically Analyzing WebAssembly . In Proc. International Conference on Architectural Support for Programming Languages and Operating Systems. D. Lehmann and M. Pradel. 2019. Wasabi: A Framework for Dynamically Analyzing WebAssembly. In Proc. International Conference on Architectural Support for Programming Languages and Operating Systems."},{"key":"e_1_3_2_1_39_1","volume-title":"Making Smart Contracts Smarter. In Proc. ACM SIGSAC Conference on Computer and Communications Security","author":"Luu L.","year":"2016","unstructured":"L. Luu , D. Chu , H. Olickel , P. Saxena , and A. Hobor . 2016 . Making Smart Contracts Smarter. In Proc. ACM SIGSAC Conference on Computer and Communications Security , Vienna, Austria , October 24-28, 2016 . L. Luu, D. Chu, H. Olickel, P. Saxena, and A. Hobor. 2016. Making Smart Contracts Smarter. In Proc. ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016."},{"key":"e_1_3_2_1_40_1","volume-title":"Proc. IEEE\/ACM International Conference on Automated Software Engineering.","author":"Mariano B.","unstructured":"B. Mariano , Y. Chen , Y. Feng , S. Lahiri , and I. Dillig . 2020. Demystifying Loops in Smart Contracts . In Proc. IEEE\/ACM International Conference on Automated Software Engineering. B. Mariano, Y. Chen, Y. Feng, S. Lahiri, and I. Dillig. 2020. Demystifying Loops in Smart Contracts. In Proc. IEEE\/ACM International Conference on Automated Software Engineering."},{"key":"e_1_3_2_1_41_1","unstructured":"Brian McFadden Tyler Lukasiewicz Jef Dileo and Justin Engler. 2020. Security Chasms of WASM. (Oct. 2020 ). [Online]. Available: https:\/\/i.blackhat.com\/us-18\/Thu-August-9\/us-18-Lukasiewicz-WebAssemblyA-New-World-of-Native_Exploits-On-The-Web-wp.pdf.  \t\t\t\t\t  Brian McFadden Tyler Lukasiewicz Jef Dileo and Justin Engler. 2020. Security Chasms of WASM. (Oct. 2020 ). [Online]. Available: https:\/\/i.blackhat.com\/us-18\/Thu-August-9\/us-18-Lukasiewicz-WebAssemblyA-New-World-of-Native_Exploits-On-The-Web-wp.pdf."},{"key":"e_1_3_2_1_42_1","unstructured":"R. Mitra. 2021. EOS\/USD market drops by 4% following $7.7 million EOS hack attack. [Online]. Available: https:\/\/www.fxstreet.com\/cryptocurrencies\/news\/eosusd-market-drops-by-4-following-77-million-eos-hack-attack-201902262151.  \t\t\t\t\t  R. Mitra. 2021. EOS\/USD market drops by 4% following $7.7 million EOS hack attack. [Online]. Available: https:\/\/www.fxstreet.com\/cryptocurrencies\/news\/eosusd-market-drops-by-4-following-77-million-eos-hack-attack-201902262151."},{"key":"e_1_3_2_1_43_1","unstructured":"NEAR. 2021. A blockchain platform that accelerates the development of webAssembly smart contract. [Online]. Available: https:\/\/near.org\/.  \t\t\t\t\t  NEAR. 2021. A blockchain platform that accelerates the development of webAssembly smart contract. [Online]. Available: https:\/\/near.org\/."},{"key":"e_1_3_2_1_44_1","volume":"202","author":"Nguyen TD.","unstructured":"TD. Nguyen , LH. Pham , and J. Sun. 202 1. SGUARD: Towards Fixing Vulnerable Smart Contracts Automatically. In Proc. Symposium on Security and Privacy. TD. Nguyen, LH. Pham, and J. Sun. 2021. SGUARD: Towards Fixing Vulnerable Smart Contracts Automatically. In Proc. Symposium on Security and Privacy.","journal-title":"J. Sun."},{"key":"e_1_3_2_1_45_1","volume-title":"Proc. ACM\/IEEE 42nd International Conference on Software Engineering.","author":"Nguyen TD.","unstructured":"TD. Nguyen , LH. Pham , J. Sun , Y. Lin , and QT. Minh . 2020. SFuzz: An Eficient Adaptive Fuzzer for Solidity Smart Contracts . In Proc. ACM\/IEEE 42nd International Conference on Software Engineering. TD. Nguyen, LH. Pham, J. Sun, Y. Lin, and QT. Minh. 2020. SFuzz: An Eficient Adaptive Fuzzer for Solidity Smart Contracts. In Proc. ACM\/IEEE 42nd International Conference on Software Engineering."},{"key":"e_1_3_2_1_46_1","unstructured":"Nodoes. 2019. The core service daemon that runs on every EOSIO node. [Online]. Available: https:\/\/developers.eos.io\/manuals\/eos\/v2.1\/nodeos\/index.  \t\t\t\t\t  Nodoes. 2019. The core service daemon that runs on every EOSIO node. [Online]. Available: https:\/\/developers.eos.io\/manuals\/eos\/v2.1\/nodeos\/index."},{"key":"e_1_3_2_1_47_1","volume-title":"Proc. USENIX Security Symposium.","author":"Perez D.","unstructured":"D. Perez and B. Livshits . 2021. Smart Contract Vulnerabilities: Vulnerable Does Not Imply Exploited . In Proc. USENIX Security Symposium. D. Perez and B. Livshits. 2021. Smart Contract Vulnerabilities: Vulnerable Does Not Imply Exploited. In Proc. USENIX Security Symposium."},{"key":"e_1_3_2_1_48_1","volume-title":"Proc. IEEE Symposium on Security and Privacy.","author":"Protzenko J.","unstructured":"J. Protzenko , B. Beurdouche , D. Merigoux , and K. Bhargavan . 2019. Formally Verified Cryptographic Web Applications in WebAssembly . In Proc. IEEE Symposium on Security and Privacy. J. Protzenko, B. Beurdouche, D. Merigoux, and K. Bhargavan. 2019. Formally Verified Cryptographic Web Applications in WebAssembly. In Proc. IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_1_49_1","unstructured":"L. Quan L. Wu and H. Wang. 2019. EVulHunter: Detecting Fake Transfer Vulnerabilities for EOSIO's Smart Contracts at Webassembly-level. ( 2019 ).  \t\t\t\t\t  L. Quan L. Wu and H. Wang. 2019. EVulHunter: Detecting Fake Transfer Vulnerabilities for EOSIO's Smart Contracts at Webassembly-level. ( 2019 )."},{"key":"e_1_3_2_1_50_1","volume-title":"Proc. ACM SIGSOFT International Symposium on Software Testing and Analysis.","author":"Ren M.","unstructured":"M. Ren , Z. Yin , F. Ma , Z. Xu , Y. Jiang , C. Sun , H. Li , and Y. Cai . 2021. Empirical Evaluation of Smart Contract Testing: What is the Best Choice? . In Proc. ACM SIGSOFT International Symposium on Software Testing and Analysis. M. Ren, Z. Yin, F. Ma, Z. Xu, Y. Jiang, C. Sun, H. Li, and Y. Cai. 2021. Empirical Evaluation of Smart Contract Testing: What is the Best Choice?. In Proc. ACM SIGSOFT International Symposium on Software Testing and Analysis."},{"key":"e_1_3_2_1_51_1","unstructured":"Microsoft Research. 2021. Z3 a theorem prover from Microsoft Research. [Online]. Available: https:\/\/github.com\/Z3Prover\/z3.  \t\t\t\t\t  Microsoft Research. 2021. Z3 a theorem prover from Microsoft Research. [Online]. Available: https:\/\/github.com\/Z3Prover\/z3."},{"key":"e_1_3_2_1_52_1","volume-title":"Proc. USENIX Security Symposium.","author":"Rodler M.","unstructured":"M. Rodler , W. Li , G. O. Karame , and L. Davi . 2021. EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts . In Proc. USENIX Security Symposium. M. Rodler, W. Li, G. O. Karame, and L. Davi. 2021. EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts. In Proc. USENIX Security Symposium."},{"key":"e_1_3_2_1_53_1","volume-title":"Proc. USENIX Security Symposium.","author":"So S.","unstructured":"S. So , S. Hong , and H. Oh . 2021. SmarTest: Efectively Hunting Vulnerable Transaction Sequences in Smart Contracts through Language Model-Guided Symbolic Execution . In Proc. USENIX Security Symposium. S. So, S. Hong, and H. Oh. 2021. SmarTest: Efectively Hunting Vulnerable Transaction Sequences in Smart Contracts through Language Model-Guided Symbolic Execution. In Proc. USENIX Security Symposium."},{"key":"e_1_3_2_1_54_1","volume-title":"Proc. Annual Network and Distributed System Security Symposium.","author":"Stephens N.","unstructured":"N. Stephens , J. Grosen , C. Salls , A. Dutcher , R. Wang , J. Corbetta , Y. Shoshitaishvili , C. Kruegel , and G. Vigna . 2016. Driller: Augmenting Fuzzing Through Selective Symbolic Execution . In Proc. Annual Network and Distributed System Security Symposium. N. Stephens, J. Grosen, C. Salls, A. Dutcher, R. Wang, J. Corbetta, Y. Shoshitaishvili, C. Kruegel, and G. Vigna. 2016. Driller: Augmenting Fuzzing Through Selective Symbolic Execution. In Proc. Annual Network and Distributed System Security Symposium."},{"key":"e_1_3_2_1_55_1","volume-title":"Proc. International Conference on Software Engineering.","author":"Avgerinos S.","unstructured":"S. Cha T. Avgerinos , A. Rebert and D. Brumley . 2014. Enhancing symbolic execution with veritesting . In Proc. International Conference on Software Engineering. S. Cha T. Avgerinos, A. Rebert and D. Brumley. 2014. Enhancing symbolic execution with veritesting. In Proc. International Conference on Software Engineering."},{"key":"e_1_3_2_1_56_1","volume-title":"Proc. ACM Asia Conference on Computer and Communications Security.","author":"Torres C.","unstructured":"C. Torres , M. Baden , R. Norvill , B. Fiz , H. Jonker , and S. Mauw . 2020. \u00c6GIS: Shielding Vulnerable Smart Contracts Against Attacks . In Proc. ACM Asia Conference on Computer and Communications Security. C. Torres, M. Baden, R. Norvill, B. Fiz, H. Jonker, and S. Mauw. 2020. \u00c6GIS: Shielding Vulnerable Smart Contracts Against Attacks. In Proc. ACM Asia Conference on Computer and Communications Security."},{"key":"e_1_3_2_1_57_1","volume-title":"Proc. USENIX Security Symposium.","author":"Torres C.","unstructured":"C. Torres , M. Steichen , and R. State . 2019. The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts . In Proc. USENIX Security Symposium. C. Torres, M. Steichen, and R. State. 2019. The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts. In Proc. USENIX Security Symposium."},{"key":"e_1_3_2_1_58_1","unstructured":"A. Turner. 2021. WebAssembly Linear Memory. [Online]. Available: https:\/\/wasmbyexample.dev\/examples\/webassembly-linear-memory\/ webassembly-linear-memory.rust.en-us.html.  \t\t\t\t\t  A. Turner. 2021. WebAssembly Linear Memory. [Online]. Available: https:\/\/wasmbyexample.dev\/examples\/webassembly-linear-memory\/ webassembly-linear-memory.rust.en-us.html."},{"key":"e_1_3_2_1_59_1","unstructured":"W3C. 2021. \"The main page of webassembly.org\". [Online]. Available: https: \/\/webassembly.org\/.  \t\t\t\t\t  W3C. 2021. \"The main page of webassembly.org\". [Online]. Available: https: \/\/webassembly.org\/."},{"key":"e_1_3_2_1_60_1","volume-title":"Proc. IEEE\/ACM International Conference on Software Engineering.","author":"Wan Z.","unstructured":"Z. Wan , X. Xia , D. Lo , J. Chen , X. Luo , and X. Yang . 2021. Smart Contract Security: a Practitioners' Perspective . In Proc. IEEE\/ACM International Conference on Software Engineering. Z. Wan, X. Xia, D. Lo, J. Chen, X. Luo, and X. Yang. 2021. Smart Contract Security: a Practitioners' Perspective. In Proc. IEEE\/ACM International Conference on Software Engineering."},{"key":"e_1_3_2_1_61_1","volume-title":"WANA: Symbolic Execution of Wasm Bytecode for Cross-Platform Smart Contract Vulnerability Detection. In arXiv preprint arXiv","author":"Wang D.","year":"2020","unstructured":"D. Wang , B. Jiang , and W.K. Chan . 2020 . WANA: Symbolic Execution of Wasm Bytecode for Cross-Platform Smart Contract Vulnerability Detection. In arXiv preprint arXiv : 2007.15510. D. Wang, B. Jiang, and W.K. Chan. 2020. WANA: Symbolic Execution of Wasm Bytecode for Cross-Platform Smart Contract Vulnerability Detection. In arXiv preprint arXiv: 2007.15510."},{"key":"e_1_3_2_1_62_1","volume":"201","author":"Watt C.","unstructured":"C. Watt , A. Rossberg , and J. Pichon-Pharabod. 201 9. Weakening WebAssembly. ACM Program. Lang. OOPSLA ( 2019 ). C. Watt, A. Rossberg, and J. Pichon-Pharabod. 2019. Weakening WebAssembly. ACM Program. Lang. OOPSLA ( 2019 ).","journal-title":"J. Pichon-Pharabod."},{"key":"e_1_3_2_1_63_1","unstructured":"WebAssembly. 2021. Operation Semantic of WebAssembly. [Online]. Available: https:\/\/webassembly.github.io\/spec\/core\/text\/instructions.html.  \t\t\t\t\t  WebAssembly. 2021. Operation Semantic of WebAssembly. [Online]. Available: https:\/\/webassembly.github.io\/spec\/core\/text\/instructions.html."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"crossref","unstructured":"S. Wu L. Wu Y. Zhou R. Li Z. Wang X. Luo C. Wang and K. Ren. 2022. TimeTravel Investigation: Towards Building A Scalable Attack Detection Framework on Ethereum. ACM Transactions on Software Engineering and Methodology ( 2022 ).  \t\t\t\t\t  S. Wu L. Wu Y. Zhou R. Li Z. Wang X. Luo C. Wang and K. Ren. 2022. TimeTravel Investigation: Towards Building A Scalable Attack Detection Framework on Ethereum. ACM Transactions on Software Engineering and Methodology ( 2022 ).","DOI":"10.1145\/3505263"},{"key":"e_1_3_2_1_65_1","volume-title":"Proc. European Software Engineering Conference and Symposium on the Foundations of Software Engineering.","author":"W\u00fcstholz V.","unstructured":"V. W\u00fcstholz and M. Christakis . 2020. Harvey: A Greybox Fuzzer for Smart Contracts . In Proc. European Software Engineering Conference and Symposium on the Foundations of Software Engineering. V. W\u00fcstholz and M. Christakis. 2020. Harvey: A Greybox Fuzzer for Smart Contracts. In Proc. European Software Engineering Conference and Symposium on the Foundations of Software Engineering."},{"key":"e_1_3_2_1_66_1","volume-title":"Proc. IEEE\/ACM International Conference on Automated Software Engineering.","author":"Xue Y.","unstructured":"Y. Xue , M. Ma , Y. Lin , Y. Sui , J. Ye , and T. Peng . 2020. Cross-Contract Static Analysis for Detecting Practical Reentrancy Vulnerabilities in Smart Contracts . In Proc. IEEE\/ACM International Conference on Automated Software Engineering. Y. Xue, M. Ma, Y. Lin, Y. Sui, J. Ye, and T. Peng. 2020. Cross-Contract Static Analysis for Detecting Practical Reentrancy Vulnerabilities in Smart Contracts. In Proc. IEEE\/ACM International Conference on Automated Software Engineering."},{"key":"e_1_3_2_1_67_1","unstructured":"P. Zhang F. Xiao and X. Luo. 2019. SolidityCheck : Quickly Detecting Smart Contract Problems Through Regular Expressions. arXiv preprint arXiv: 1911. 09425 ( 2019 ).  \t\t\t\t\t  P. Zhang F. Xiao and X. Luo. 2019. SolidityCheck : Quickly Detecting Smart Contract Problems Through Regular Expressions. arXiv preprint arXiv: 1911. 09425 ( 2019 )."},{"key":"e_1_3_2_1_68_1","volume-title":"Proc. USENIX Security Symposium.","author":"Zhou Y.","unstructured":"Y. Zhou , D. Kumar , S. Bakshi , J. Mason , A. Miller , and M. Bailey . 2018. Erays: Reverse Engineering Ethereum's Opaque Smart Contracts . In Proc. USENIX Security Symposium. Y. Zhou, D. Kumar, S. Bakshi, J. Mason, A. Miller, and M. Bailey. 2018. Erays: Reverse Engineering Ethereum's Opaque Smart Contracts. In Proc. USENIX Security Symposium."}],"event":{"name":"ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Virtual South Korea","acronym":"ISSTA '22","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3533767.3534218","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3533767.3534218","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T18:43:40Z","timestamp":1750272220000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3533767.3534218"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,18]]},"references-count":68,"alternative-id":["10.1145\/3533767.3534218","10.1145\/3533767"],"URL":"https:\/\/doi.org\/10.1145\/3533767.3534218","relation":{},"subject":[],"published":{"date-parts":[[2022,7,18]]},"assertion":[{"value":"2022-07-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}