{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T14:48:13Z","timestamp":1776782893809,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":73,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,7,18]]},"DOI":"10.1145\/3533767.3534372","type":"proceedings-article","created":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T14:28:50Z","timestamp":1657895330000},"page":"716-727","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":51,"title":["Finding permission bugs in smart contracts with role mining"],"prefix":"10.1145","author":[{"given":"Ye","family":"Liu","sequence":"first","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"given":"Yi","family":"Li","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"given":"Shang-Wei","family":"Lin","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"given":"Cyrille","family":"Artho","sequence":"additional","affiliation":[{"name":"KTH, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2022,7,18]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2017. Maian. https:\/\/github.com\/ivicanikolicsg\/MAIAN A Tool for Automatic Detection of Buggy Ethereum Smart Contracts of Three Different Types: Prodigal Suicidal and Greedy \t\t\t\t\t  2017. Maian. https:\/\/github.com\/ivicanikolicsg\/MAIAN A Tool for Automatic Detection of Buggy Ethereum Smart Contracts of Three Different Types: Prodigal Suicidal and Greedy"},{"key":"e_1_3_2_1_2_1","unstructured":"2019. Manticore. https:\/\/github.com\/trailofbits\/manticore Symbolic Execution Tool for Smart Contracts \t\t\t\t\t  2019. Manticore. https:\/\/github.com\/trailofbits\/manticore Symbolic Execution Tool for Smart Contracts"},{"key":"e_1_3_2_1_3_1","unstructured":"2019. Mythril. https:\/\/github.com\/ConsenSys\/mythril A Security Analysis Tool for EVM Bytecode \t\t\t\t\t  2019. Mythril. https:\/\/github.com\/ConsenSys\/mythril A Security Analysis Tool for EVM Bytecode"},{"key":"e_1_3_2_1_4_1","unstructured":"2019. Oyente. https:\/\/github.com\/melonproject\/oyente An Analysis Tool for Smart Contracts \t\t\t\t\t  2019. Oyente. https:\/\/github.com\/melonproject\/oyente An Analysis Tool for Smart Contracts"},{"key":"e_1_3_2_1_5_1","unstructured":"2020. Etherscan. https:\/\/etherscan.io \t\t\t\t\t  2020. Etherscan. https:\/\/etherscan.io"},{"key":"e_1_3_2_1_6_1","unstructured":"2020. OpenZeppelin. https:\/\/openzeppelin.com\/ \t\t\t\t\t  2020. OpenZeppelin. https:\/\/openzeppelin.com\/"},{"key":"e_1_3_2_1_7_1","unstructured":"2021. Ethereum Attacks. https:\/\/gist.github.com\/ethanbennett\/7396bf3f61dd985d3426f2ee184d8822 \t\t\t\t\t  2021. Ethereum Attacks. https:\/\/gist.github.com\/ethanbennett\/7396bf3f61dd985d3426f2ee184d8822"},{"key":"e_1_3_2_1_8_1","unstructured":"2021. Slither. https:\/\/github.com\/crytic\/slither The Solidity Source Analyzer \t\t\t\t\t  2021. Slither. https:\/\/github.com\/crytic\/slither The Solidity Source Analyzer"},{"key":"e_1_3_2_1_9_1","unstructured":"2021. Smart Contract Search. https:\/\/etherscan.io\/searchcontract Search Smart Contract source codes on Etherscan with keywords addresses txhash date block number and more \t\t\t\t\t  2021. Smart Contract Search. https:\/\/etherscan.io\/searchcontract Search Smart Contract source codes on Etherscan with keywords addresses txhash date block number and more"},{"key":"e_1_3_2_1_10_1","unstructured":"2021. State of The DApps. https:\/\/www.stateofthedapps.com\/zh\/platforms\/ethereum \t\t\t\t\t  2021. State of The DApps. https:\/\/www.stateofthedapps.com\/zh\/platforms\/ethereum"},{"key":"e_1_3_2_1_11_1","unstructured":"2021. VALUE DEFI - REKT 2. https:\/\/rekt.news\/value-rekt2\/ \t\t\t\t\t  2021. VALUE DEFI - REKT 2. https:\/\/rekt.news\/value-rekt2\/"},{"key":"e_1_3_2_1_12_1","unstructured":"2022. Ethainter. https:\/\/contract-library.com\/ Contract Library Watchdog Service \t\t\t\t\t  2022. Ethainter. https:\/\/contract-library.com\/ Contract Library Watchdog Service"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54455-6_8"},{"key":"e_1_3_2_1_14_1","volume-title":"The oracle problem in software testing: A survey","author":"Barr Earl T","year":"2014","unstructured":"Earl T Barr , Mark Harman , Phil McMinn , Muzammil Shahbaz , and Shin Yoo . 2014. The oracle problem in software testing: A survey . IEEE transactions on software engineering, 41, 5 ( 2014 ), 507\u2013525. Earl T Barr, Mark Harman, Phil McMinn, Muzammil Shahbaz, and Shin Yoo. 2014. The oracle problem in software testing: A survey. IEEE transactions on software engineering, 41, 5 (2014), 507\u2013525."},{"key":"e_1_3_2_1_15_1","unstructured":"Blockchain-Projects. 2020. Overflow Attack in Ethereum Smart Contracts. https:\/\/blockchain-projects.readthedocs.io\/overflow.html. \t\t\t\t\t  Blockchain-Projects. 2020. Overflow Attack in Ethereum Smart Contracts. https:\/\/blockchain-projects.readthedocs.io\/overflow.html."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385990"},{"key":"e_1_3_2_1_17_1","volume-title":"Dynamic Role-Based Access Control for Decentralized Applications. In International Conference on Blockchain. 185\u2013197","author":"Chatterjee Arnab","year":"2020","unstructured":"Arnab Chatterjee , Yash Pitroda , and Manojkumar Parmar . 2020 . Dynamic Role-Based Access Control for Decentralized Applications. In International Conference on Blockchain. 185\u2013197 . Arnab Chatterjee, Yash Pitroda, and Manojkumar Parmar. 2020. Dynamic Role-Based Access Control for Decentralized Applications. In International Conference on Blockchain. 185\u2013197."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2017.7884650"},{"key":"e_1_3_2_1_19_1","unstructured":"Consensys.. 2021. Gas Limit DoS on The Network via Block Stuffing. https:\/\/consensys.github.io\/smart-contract-best-practices\/known_attacks\/##dos-with-block-gas-limit \t\t\t\t\t  Consensys.. 2021. Gas Limit DoS on The Network via Block Stuffing. https:\/\/consensys.github.io\/smart-contract-best-practices\/known_attacks\/##dos-with-block-gas-limit"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2812844"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380364"},{"key":"e_1_3_2_1_22_1","unstructured":"Thomas Durieux Jo\u00e3o F Ferreira Rui Abreu and Pedro Cruz. 2020. SmartBugs on Real World 47 587 Smart Contracts. https:\/\/github.com\/smartbugs\/smartbugs-results \t\t\t\t\t  Thomas Durieux Jo\u00e3o F Ferreira Rui Abreu and Pedro Cruz. 2020. SmartBugs on Real World 47 587 Smart Contracts. https:\/\/github.com\/smartbugs\/smartbugs-results"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1377836.1377838"},{"key":"e_1_3_2_1_24_1","volume-title":"Foundations of genetic algorithms. 1","author":"Eshelman Larry J","unstructured":"Larry J Eshelman . 1991. The CHC adaptive search algorithm: How to have safe search when engaging in nontraditional genetic recombination . In Foundations of genetic algorithms. 1 , Elsevier , 265\u2013283. Larry J Eshelman. 1991. The CHC adaptive search algorithm: How to have safe search when engaging in nontraditional genetic recombination. In Foundations of genetic algorithms. 1, Elsevier, 265\u2013283."},{"key":"e_1_3_2_1_25_1","volume-title":"Slither: A Static Analysis Framework for Smart Contracts. In 2019 IEEE\/ACM 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB). 8\u201315","author":"Feist Josselin","year":"2019","unstructured":"Josselin Feist , Gustavo Grieco , and Alex Groce . 2019 . Slither: A Static Analysis Framework for Smart Contracts. In 2019 IEEE\/ACM 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB). 8\u201315 . Josselin Feist, Gustavo Grieco, and Alex Groce. 2019. Slither: A Static Analysis Framework for Smart Contracts. In 2019 IEEE\/ACM 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB). 8\u201315."},{"key":"e_1_3_2_1_26_1","unstructured":"Yu Feng Emina Torlak and Rastislav Bodik. 2019. Precise Attack Synthesis for Smart Contracts. arXiv preprint arXiv:1902.06067. \t\t\t\t\t  Yu Feng Emina Torlak and Rastislav Bodik. 2019. Precise Attack Synthesis for Smart Contracts. arXiv preprint arXiv:1902.06067."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3276486"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-89722-6_10"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51280-4_34"},{"key":"e_1_3_2_1_30_1","volume-title":"Defining The Ethereum Virtual Machine for Interactive Theorem Provers. In International Conference on Financial Cryptography and Data Security. 520\u2013535","author":"Hirai Yoichi","year":"2017","unstructured":"Yoichi Hirai . 2017 . Defining The Ethereum Virtual Machine for Interactive Theorem Provers. In International Conference on Financial Cryptography and Data Security. 520\u2013535 . Yoichi Hirai. 2017. Defining The Ethereum Virtual Machine for Interactive Theorem Provers. In International Conference on Financial Cryptography and Data Security. 520\u2013535."},{"key":"e_1_3_2_1_31_1","volume-title":"IO Technical White Paper. EOS. IO (accessed","author":"EOS IO.","year":"2017","unstructured":"EOS IO. 2017. EOS. IO Technical White Paper. EOS. IO (accessed 18 December 2017 ) https:\/\/github. com\/EOSIO\/Documentation. EOS IO. 2017. EOS. IO Technical White Paper. EOS. IO (accessed 18 December 2017) https:\/\/github. com\/EOSIO\/Documentation."},{"key":"e_1_3_2_1_32_1","volume-title":"The distribution of the flora in the alpine zone. 1. New phytologist, 11, 2","author":"Jaccard Paul","year":"1912","unstructured":"Paul Jaccard . 1912. The distribution of the flora in the alpine zone. 1. New phytologist, 11, 2 ( 1912 ), 37\u201350. Paul Jaccard. 1912. The distribution of the flora in the alpine zone. 1. New phytologist, 11, 2 (1912), 37\u201350."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238177"},{"key":"e_1_3_2_1_34_1","volume-title":"ZEUS: Analyzing Safety of Smart Contracts. In Ndss. 1\u201312.","author":"Kalra Sukrit","year":"2018","unstructured":"Sukrit Kalra , Seep Goel , Mohan Dhawan , and Subodh Sharma . 2018 . ZEUS: Analyzing Safety of Smart Contracts. In Ndss. 1\u201312. Sukrit Kalra, Seep Goel, Mohan Dhawan, and Subodh Sharma. 2018. ZEUS: Analyzing Safety of Smart Contracts. In Ndss. 1\u201312."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3417939"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409740"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"e_1_3_2_1_38_1","volume-title":"Genetic algorithms, tournament selection, and the effects of noise. Complex systems, 9, 3","author":"Miller Brad L","year":"1995","unstructured":"Brad L Miller and David E Goldberg . 1995. Genetic algorithms, tournament selection, and the effects of noise. Complex systems, 9, 3 ( 1995 ), 193\u2013212. Brad L Miller and David E Goldberg. 1995. Genetic algorithms, tournament selection, and the effects of noise. Complex systems, 9, 3 (1995), 193\u2013212."},{"key":"e_1_3_2_1_39_1","volume-title":"An introduction to genetic algorithms","author":"Mitchell Melanie","unstructured":"Melanie Mitchell . 1998. An introduction to genetic algorithms . MIT press . Melanie Mitchell. 1998. An introduction to genetic algorithms. MIT press."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2871148"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1377836.1377840"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542207.1542224"},{"key":"e_1_3_2_1_43_1","unstructured":"Peshev Nikolay. 2017. The First Block Chain Based Academical Platform is on the Way. https:\/\/medium.com\/@nikolaypeshev\/the-first-block-chain-based-academical-platform-is-on-the-way-fe12d0a4e73d \t\t\t\t\t  Peshev Nikolay. 2017. The First Block Chain Based Academical Platform is on the Way. https:\/\/medium.com\/@nikolaypeshev\/the-first-block-chain-based-academical-platform-is-on-the-way-fe12d0a4e73d"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274743"},{"key":"e_1_3_2_1_45_1","volume-title":"Anas Abou Elkalam, and Abdellah Ait Ouahman","author":"Ouaddah Aafaf","year":"2017","unstructured":"Aafaf Ouaddah , Anas Abou Elkalam, and Abdellah Ait Ouahman . 2017 . Towards a Novel Privacy-Preserving Access Control Model Based on Blockchain Technology in IoT. In Europe and MENA cooperation advances in information and communication technologies. Springer , 523\u2013533. Aafaf Ouaddah, Anas Abou Elkalam, and Abdellah Ait Ouahman. 2017. Towards a Novel Privacy-Preserving Access Control Model Based on Blockchain Technology in IoT. In Europe and MENA cooperation advances in information and communication technologies. Springer, 523\u2013533."},{"key":"e_1_3_2_1_46_1","unstructured":"Daniel Perez and Benjamin Livshits. 2019. Smart Contract Vulnerabilities: Does Anyone Care? feb arxiv:1902.06710. arxiv:1902.06710 \t\t\t\t\t  Daniel Perez and Benjamin Livshits. 2019. Smart Contract Vulnerabilities: Does Anyone Care? feb arxiv:1902.06710. arxiv:1902.06710"},{"key":"e_1_3_2_1_47_1","volume-title":"Verx: Safety Verification of Smart Contracts. In 2020 IEEE Symposium on Security and Privacy (SP). 1661\u20131677","author":"Permenev Anton","year":"2020","unstructured":"Anton Permenev , Dimitar Dimitrov , Petar Tsankov , Dana Drachsler-Cohen , and Martin Vechev . 2020 . Verx: Safety Verification of Smart Contracts. In 2020 IEEE Symposium on Security and Privacy (SP). 1661\u20131677 . Anton Permenev, Dimitar Dimitrov, Petar Tsankov, Dana Drachsler-Cohen, and Martin Vechev. 2020. Verx: Safety Verification of Smart Contracts. In 2020 IEEE Symposium on Security and Privacy (SP). 1661\u20131677."},{"key":"e_1_3_2_1_48_1","volume-title":"Access Control: Policies, Models, and Mechanisms. In International School on Foundations of Security Analysis and Design. 137\u2013196.","author":"Samarati Pierangela","year":"2000","unstructured":"Pierangela Samarati and Sabrina Capitani de Vimercati . 2000 . Access Control: Policies, Models, and Mechanisms. In International School on Foundations of Security Analysis and Design. 137\u2013196. Pierangela Samarati and Sabrina Capitani de Vimercati. 2000. Access Control: Policies, Models, and Mechanisms. In International School on Foundations of Security Analysis and Design. 137\u2013196."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-61770-1_28"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/344287.344301"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.241422"},{"key":"e_1_3_2_1_52_1","volume-title":"Advances in computers. 46","author":"Sandhu Ravi S","unstructured":"Ravi S Sandhu . 1998. Role-Based Access Control . In Advances in computers. 46 , Elsevier , 237\u2013286. Ravi S Sandhu. 1998. Role-Based Access Control. In Advances in computers. 46, Elsevier, 237\u2013286."},{"key":"e_1_3_2_1_53_1","unstructured":"Palladino Santiago. 2017. The Parity Wallet Hack Explained. https:\/\/blog.openzeppelin.com\/on-the-parity-wallet-multisig-hack-405a8c12e8f7\/ \t\t\t\t\t  Palladino Santiago. 2017. The Parity Wallet Hack Explained. https:\/\/blog.openzeppelin.com\/on-the-parity-wallet-multisig-hack-405a8c12e8f7\/"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1063979.1064008"},{"key":"e_1_3_2_1_55_1","unstructured":"David Siegel. 2016. Understanding The DAO Attack. https:\/\/www.coindesk.com\/understanding-dao-hack-journalists \t\t\t\t\t  David Siegel. 2016. Understanding The DAO Attack. https:\/\/www.coindesk.com\/understanding-dao-hack-journalists"},{"key":"e_1_3_2_1_56_1","unstructured":"2019. Securify. https:\/\/securify.ch\/ \t\t\t\t\t  2019. Securify. https:\/\/securify.ch\/"},{"key":"e_1_3_2_1_57_1","unstructured":"2018. Solidity. https:\/\/solidity.readthedocs.io\/en\/v0.5.1\/ \t\t\t\t\t  2018. Solidity. https:\/\/solidity.readthedocs.io\/en\/v0.5.1\/"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.3390\/app10020488"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/1809842.1809853"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3194113.3194115"},{"key":"e_1_3_2_1_61_1","unstructured":"2019. Echidna. https:\/\/github.com\/trailofbits\/echidna \t\t\t\t\t  2019. Echidna. https:\/\/github.com\/trailofbits\/echidna"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22348-8_8"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/1266840.1266870"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/1377836.1377839"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-NIER.2019.00009"},{"key":"e_1_3_2_1_66_1","article-title":"Oracle-Supported Dynamic Exploit Generation for Smart Contracts","author":"Wang Haijun","year":"2020","unstructured":"Haijun Wang , Ye Liu , Yi Li , Shang-Wei Lin , Cyrille Artho , Lei Ma , and Yang Liu . 2020 . Oracle-Supported Dynamic Exploit Generation for Smart Contracts . IEEE Transactions on Dependable and Secure Computing. Haijun Wang, Ye Liu, Yi Li, Shang-Wei Lin, Cyrille Artho, Lei Ma, and Yang Liu. 2020. Oracle-Supported Dynamic Exploit Generation for Smart Contracts. IEEE Transactions on Dependable and Secure Computing.","journal-title":"IEEE Transactions on Dependable and Secure Computing."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3360615"},{"key":"e_1_3_2_1_68_1","unstructured":"Yuepeng Wang Shuvendu K Lahiri Shuo Chen Rong Pan Isil Dillig Cody Born and Immad Naseer. 2018. Formal Specification and Verification of Smart Contracts for Azure Blockchain. arXiv preprint arXiv:1812.08829. \t\t\t\t\t  Yuepeng Wang Shuvendu K Lahiri Shuo Chen Rong Pan Isil Dillig Cody Born and Immad Naseer. 2018. Formal Specification and Verification of Smart Contracts for Azure Blockchain. arXiv preprint arXiv:1812.08829."},{"key":"e_1_3_2_1_69_1","volume-title":"Smart Contracts: Security Patterns in The Ethereum Ecosystem and Solidity. In 2018 International Workshop on Blockchain Oriented Software Engineering (IWBOSE). 2\u20138.","author":"Wohrer Maximilian","year":"2018","unstructured":"Maximilian Wohrer and Uwe Zdun . 2018 . Smart Contracts: Security Patterns in The Ethereum Ecosystem and Solidity. In 2018 International Workshop on Blockchain Oriented Software Engineering (IWBOSE). 2\u20138. Maximilian Wohrer and Uwe Zdun. 2018. Smart Contracts: Security Patterns in The Ethereum Ecosystem and Solidity. In 2018 International Workshop on Blockchain Oriented Software Engineering (IWBOSE). 2\u20138."},{"key":"e_1_3_2_1_70_1","volume-title":"Ethereum: A Secure Decentralised Generalised Transaction Ledger. Ethereum project yellow paper, 151","author":"Wood Gavin","year":"2014","unstructured":"Gavin Wood . 2014 . Ethereum: A Secure Decentralised Generalised Transaction Ledger. Ethereum project yellow paper, 151 (2014), 1\u201332. Gavin Wood. 2014. Ethereum: A Secure Decentralised Generalised Transaction Ledger. Ethereum project yellow paper, 151 (2014), 1\u201332."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3417064"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/1266840.1266862"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2847705"}],"event":{"name":"ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Virtual South Korea","acronym":"ISSTA '22","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3533767.3534372","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3533767.3534372","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T18:43:40Z","timestamp":1750272220000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3533767.3534372"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,18]]},"references-count":73,"alternative-id":["10.1145\/3533767.3534372","10.1145\/3533767"],"URL":"https:\/\/doi.org\/10.1145\/3533767.3534372","relation":{},"subject":[],"published":{"date-parts":[[2022,7,18]]},"assertion":[{"value":"2022-07-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}