{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T20:37:40Z","timestamp":1776890260393,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,7,18]]},"DOI":"10.1145\/3533767.3534222","type":"proceedings-article","created":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T14:28:50Z","timestamp":1657895330000},"page":"752-764","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":60,"title":["SmartDagger: a bytecode-based static analysis approach for detecting cross-contract vulnerability"],"prefix":"10.1145","author":[{"given":"Zeqin","family":"Liao","sequence":"first","affiliation":[{"name":"Sun Yat-sen University, China"}]},{"given":"Zibin","family":"Zheng","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, China"}]},{"given":"Xiao","family":"Chen","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, China"}]},{"given":"Yuhong","family":"Nan","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, China"}]}],"member":"320","published-online":{"date-parts":[[2022,7,18]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"\u201cEthereum: Blockchain app platform \u201d Web: https:\/\/www.ethereum.org\/ [Accessed: 28-January-2021].  \t\t\t\t\t  \u201cEthereum: Blockchain app platform \u201d Web: https:\/\/www.ethereum.org\/ [Accessed: 28-January-2021]."},{"key":"e_1_3_2_1_2_1","unstructured":"\u201cEthereum: A secure decentralised generalised transaction ledger \u201d Web: : http:\/\/solidity.readthedocs.io\/. [Accessed: 28-January-2022].  \t\t\t\t\t  \u201cEthereum: A secure decentralised generalised transaction ledger \u201d Web: : http:\/\/solidity.readthedocs.io\/. [Accessed: 28-January-2022]."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54455-6_8"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3457977.3460301"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/WETSEB.2019.00008"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23082"},{"key":"e_1_3_2_1_8_1","unstructured":"\u201c Consensys. 2019. mythril \u201d Web: https:\/\/github.com\/ConsenSys\/mythril-classic. [Accessed: 28-January-2022].  \t\t\t\t\t  \u201c Consensys. 2019. mythril \u201d Web: https:\/\/github.com\/ConsenSys\/mythril-classic. [Accessed: 28-January-2022]."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00133"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238177"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380364"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3194113.3194115"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416553"},{"key":"e_1_3_2_1_14_1","volume-title":"Machine learning guided cross-contract fuzzing","author":"Xue Y.","year":"2021","unstructured":"Y. Xue , J. Ye , W. Zhang , J. Sun , L. Ma , H. Wang , and J. Zhao , \u201c Machine learning guided cross-contract fuzzing , \u201d arXiv preprint arXiv:2111.12423, 2021 . Y. Xue, J. Ye, W. Zhang, J. Sun, L. Ma, H. Wang, and J. Zhao, \u201c Machine learning guided cross-contract fuzzing, \u201d arXiv preprint arXiv:2111.12423, 2021."},{"key":"e_1_3_2_1_15_1","unstructured":"\u201cSolidity documentation \u201d Web: https:\/\/docs.soliditylang. org\/en\/v0.8.10\/. [Accessed: 28-January-2022].  \t\t\t\t\t  \u201cSolidity documentation \u201d Web: https:\/\/docs.soliditylang. org\/en\/v0.8.10\/. [Accessed: 28-January-2022]."},{"key":"e_1_3_2_1_16_1","volume-title":"Sereum: Protecting existing smart contracts against re-entrancy attacks","author":"Rodler M.","year":"1812","unstructured":"M. Rodler , W. Li , G. O. Karame , and L. Davi , \u201c Sereum: Protecting existing smart contracts against re-entrancy attacks ,\u201d arXiv preprint arXiv: 1812 .05934, 2018. M. Rodler, W. Li, G. O. Karame, and L. Davi, \u201cSereum: Protecting existing smart contracts against re-entrancy attacks ,\u201d arXiv preprint arXiv: 1812.05934, 2018."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3415298"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274737"},{"key":"e_1_3_2_1_19_1","unstructured":"\u201cSmart contract statistic \u201d Web: https:\/\/github.com\/tintinweb\/smart-contractsanctuary. [Accessed: 28-January-2022].  \t\t\t\t\t  \u201cSmart contract statistic \u201d Web: https:\/\/github.com\/tintinweb\/smart-contractsanctuary. [Accessed: 28-January-2022]."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3469076"},{"key":"e_1_3_2_1_21_1","volume-title":"Security analysis methods on ethereum smart contract vulnerabilities: a survey","author":"Praitheeshan P.","year":"1908","unstructured":"P. Praitheeshan , L. Pan , J. Yu , J. Liu , and R. Doss , \u201c Security analysis methods on ethereum smart contract vulnerabilities: a survey ,\u201d arXiv preprint arXiv: 1908 .08605, 2019. P. Praitheeshan, L. Pan, J. Yu, J. Liu, and R. Doss, \u201c Security analysis methods on ethereum smart contract vulnerabilities: a survey,\u201d arXiv preprint arXiv: 1908.08605, 2019."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00120"},{"key":"e_1_3_2_1_23_1","volume-title":"Vandal: A scalable security analysis framework for smart contracts","author":"Brent L.","year":"1809","unstructured":"L. Brent , A. Jurisevic , M. Kong , E. Liu , F. Gauthier , V. Gramoli , R. Holz , and B. Scholz , \u201c Vandal: A scalable security analysis framework for smart contracts ,\u201d arXiv preprint arXiv: 1809 .03981, 2018. L. Brent, A. Jurisevic, M. Kong, E. Liu, F. Gauthier, V. Gramoli, R. Holz, and B. Scholz, \u201c Vandal: A scalable security analysis framework for smart contracts ,\u201d arXiv preprint arXiv: 1809.03981, 2018."},{"key":"e_1_3_2_1_24_1","unstructured":"M. Suiche \u201c Porosity: A decompiler for blockchain-based smart contracts bytecode \u201d infocon.org.  \t\t\t\t\t  M. Suiche \u201c Porosity: A decompiler for blockchain-based smart contracts bytecode \u201d infocon.org."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00064"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196321.3196330"},{"key":"e_1_3_2_1_27_1","volume-title":"CoRR 2103.12801","author":"Banerjee P.","year":"2021","unstructured":"P. Banerjee , K. K. Pal , F. Wang , and C. Baral , \u201c Variable name recovery in decompiled binary code using constrained masked language modeling , \u201d CoRR 2103.12801 , 2021 . P. Banerjee, K. K. Pal, F. Wang, and C. Baral, \u201c Variable name recovery in decompiled binary code using constrained masked language modeling, \u201d CoRR 2103.12801, 2021."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568243"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274743"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243780"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3194113.3194115"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2019.00052"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3404366"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330560"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243780"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385990"},{"key":"e_1_3_2_1_37_1","first-page":"2757","volume-title":"29th USENIX Security Symposium USENIX Security)","author":"Frank J.","year":"2020","unstructured":"J. Frank , C. Aschermann , and T. Holz , \u201c Ethbmc: A bounded model checker for smart contracts , \u201d in 29th USENIX Security Symposium USENIX Security) , pp. 2757 - 2774 , 2020 . J. Frank, C. Aschermann, and T. Holz, \u201c Ethbmc: A bounded model checker for smart contracts, \u201d in 29th USENIX Security Symposium USENIX Security), pp. 2757-2774, 2020."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3418924"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416558"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678886"},{"key":"e_1_3_2_1_41_1","first-page":"880","volume-title":"European Symposium on Programming","author":"Tang H.","year":"2017","unstructured":"H. Tang , D. Wang , Y. Xiong , L. Zhang , X. Wang , and L. Zhang , \u201c Conditional dyck-cfl reachability analysis for complete and eficient library summarization , \u201d in European Symposium on Programming , pp. 880 - 908 , 2017 . H. Tang, D. Wang, Y. Xiong, L. Zhang, X. Wang, and L. Zhang, \u201c Conditional dyck-cfl reachability analysis for complete and eficient library summarization, \u201d in European Symposium on Programming, pp. 880-908, 2017."},{"key":"e_1_3_2_1_42_1","first-page":"1","volume-title":"35th European Conference on Object-Oriented Programming","author":"Schubert P. D.","year":"2021","unstructured":"P. D. Schubert , B. Hermann , and E. Bodden , \u201c Lossless, persisted summarization of static callgraph, points-to and data-flow analysis , \u201d in 35th European Conference on Object-Oriented Programming , pp. 1 - 31 , 2021 . P. D. Schubert, B. Hermann, and E. Bodden, \u201c Lossless, persisted summarization of static callgraph, points-to and data-flow analysis, \u201d in 35th European Conference on Object-Oriented Programming, pp. 1-31, 2021."}],"event":{"name":"ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Virtual South Korea","acronym":"ISSTA '22","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3533767.3534222","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3533767.3534222","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T18:43:40Z","timestamp":1750272220000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3533767.3534222"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,18]]},"references-count":42,"alternative-id":["10.1145\/3533767.3534222","10.1145\/3533767"],"URL":"https:\/\/doi.org\/10.1145\/3533767.3534222","relation":{},"subject":[],"published":{"date-parts":[[2022,7,18]]},"assertion":[{"value":"2022-07-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}