{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:06:41Z","timestamp":1775912801734,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,7,18]]},"DOI":"10.1145\/3533767.3534395","type":"proceedings-article","created":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T14:28:50Z","timestamp":1657895330000},"page":"740-751","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":46,"title":["Park: accelerating smart contract vulnerability detection via parallel-fork symbolic execution"],"prefix":"10.1145","author":[{"given":"Peilin","family":"Zheng","sequence":"first","affiliation":[{"name":"Sun Yat-sen University, China"}]},{"given":"Zibin","family":"Zheng","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, China"}]},{"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"Hong Kong Polytechnic University, China"}]}],"member":"320","published-online":{"date-parts":[[2022,7,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3182657"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966463"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Vitalik Buterin. 2013. Ethereum white paper. \t\t\t\t\t  Vitalik Buterin. 2013. Ethereum white paper.","DOI":"10.1186\/1687-2770-2013-180"},{"key":"e_1_3_2_1_4_1","volume-title":"USENIX Symposium on Operating Systems Design and Implementation.","author":"Cadar Cristian","year":"2008","unstructured":"Cristian Cadar , Daniel Dunbar , and Dawson R Engler . 2008 . Klee: unassisted and automatic generation of high-coverage tests for complex systems programs .. In USENIX Symposium on Operating Systems Design and Implementation. Cristian Cadar, Daniel Dunbar, and Dawson R Engler. 2008. Klee: unassisted and automatic generation of high-coverage tests for complex systems programs.. In USENIX Symposium on Operating Systems Design and Implementation."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.2989002"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2020.2979019"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2017.7884649"},{"key":"e_1_3_2_1_8_1","article-title":"SigRec: Automatic Recovery of Function Signatures in Smart Contracts","author":"Chen Ting","year":"2022","unstructured":"Ting Chen , Zihao Li , Xiapu Luo , Xiaofeng Wang , Ting Wang , Zheyuan He , Kezhao Fang , Yufei Zhang , Hang Zhu , Hongwei Li , Yan Cheng , and Xiaosong Zhang . 2022 . SigRec: Automatic Recovery of Function Signatures in Smart Contracts . IEEE Transactions on Emerging Topics in Computing. Ting Chen, Zihao Li, Xiapu Luo, Xiaofeng Wang, Ting Wang, Zheyuan He, Kezhao Fang, Yufei Zhang, Hang Zhu, Hongwei Li, Yan Cheng, and Xiaosong Zhang. 2022. SigRec: Automatic Recovery of Function Signatures in Smart Contracts. IEEE Transactions on Emerging Topics in Computing.","journal-title":"IEEE Transactions on Emerging Topics in Computing."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER50967.2021.00050"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1713254.1713257"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380364"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3415298"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397385"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 30th USENIX Security Symposium.","author":"He Ningyu","year":"2021","unstructured":"Ningyu He , Ruiyi Zhang , Haoyu Wang , Lei Wu , Xiapu Luo , Yao Guo , Ting Yu , and Xuxian Jiang . 2021 . EOSAFE: Security Analysis of EOSIO Smart Contracts . In Proceedings of the 30th USENIX Security Symposium. Ningyu He, Ruiyi Zhang, Haoyu Wang, Lei Wu, Xiapu Luo, Yao Guo, Ting Yu, and Xuxian Jiang. 2021. EOSAFE: Security Analysis of EOSIO Smart Contracts. In Proceedings of the 30th USENIX Security Symposium."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238177"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.114"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"key":"e_1_3_2_1_19_1","volume-title":"USENIX Security Symposium.","author":"Krupp Johannes","year":"2018","unstructured":"Johannes Krupp and Christian Rossow . 2018 . teether: Gnawing at ethereum to automatically exploit smart contracts . In USENIX Security Symposium. Johannes Krupp and Christian Rossow. 2018. teether: Gnawing at ethereum to automatically exploit smart contracts. In USENIX Security Symposium."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.020"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00133"},{"key":"e_1_3_2_1_23_1","volume-title":"9th Annual HITB Security Conference. 54","author":"Mueller Bernhard","year":"2018","unstructured":"Bernhard Mueller . 2018 . Smashing ethereum smart contracts for fun and real profit . In 9th Annual HITB Security Conference. 54 . Bernhard Mueller. 2018. Smashing ethereum smart contracts for fun and real profit. In 9th Annual HITB Security Conference. 54."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380334"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274743"},{"key":"e_1_3_2_1_26_1","volume-title":"30th USENIX Security Symposium.","author":"Perez Daniel","year":"2021","unstructured":"Daniel Perez and Ben Livshits . 2021 . Smart contract vulnerabilities: Vulnerable does not imply exploited . In 30th USENIX Security Symposium. Daniel Perez and Ben Livshits. 2021. Smart contract vulnerabilities: Vulnerable does not imply exploited. In 30th USENIX Security Symposium."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTE.2010.5608866"},{"key":"e_1_3_2_1_28_1","unstructured":"SlowMist. 2021. Hacked Event. https:\/\/hacked.slowmist.io\/en\/ \t\t\t\t\t  SlowMist. 2021. Hacked Event. https:\/\/hacked.slowmist.io\/en\/"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831732"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274737"},{"key":"e_1_3_2_1_31_1","volume-title":"USENIX Security Symposium.","author":"Torres Christof Ferreira","year":"2019","unstructured":"Christof Ferreira Torres and Mathis Steichen . 2019 . The art of the scam: Demystifying honeypots in ethereum smart contracts . In USENIX Security Symposium. Christof Ferreira Torres and Mathis Steichen. 2019. The art of the scam: Demystifying honeypots in ethereum smart contracts. In USENIX Security Symposium."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243780"},{"key":"e_1_3_2_1_33_1","unstructured":"Wikipedia. 2021. Copy-on-write. https:\/\/en.wikipedia.org\/wiki\/Copy-on-write \t\t\t\t\t  Wikipedia. 2021. Copy-on-write. https:\/\/en.wikipedia.org\/wiki\/Copy-on-write"},{"key":"e_1_3_2_1_34_1","volume-title":"Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper.","author":"Wood Gavin","year":"2014","unstructured":"Gavin Wood . 2014 . Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper. Gavin Wood. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2019.00052"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS.2020.2990458"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.12.019"}],"event":{"name":"ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Virtual South Korea","acronym":"ISSTA '22","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3533767.3534395","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3533767.3534395","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T18:43:41Z","timestamp":1750272221000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3533767.3534395"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,18]]},"references-count":37,"alternative-id":["10.1145\/3533767.3534395","10.1145\/3533767"],"URL":"https:\/\/doi.org\/10.1145\/3533767.3534395","relation":{},"subject":[],"published":{"date-parts":[[2022,7,18]]},"assertion":[{"value":"2022-07-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}