{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:48:09Z","timestamp":1762508889436,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF OAC","award":["2115167"],"award-info":[{"award-number":["2115167"]}]},{"name":"NSF DGE","award":["2041960"],"award-info":[{"award-number":["2041960"]}]},{"name":"DARPA","award":["HR00112120009"],"award-info":[{"award-number":["HR00112120009"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3548606.3563545","type":"proceedings-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T11:41:28Z","timestamp":1667821288000},"page":"3391-3393","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Poster"],"prefix":"10.1145","author":[{"given":"Levi Taiji","family":"Li","sequence":"first","affiliation":[{"name":"University of Utah, Salt Lake City, UT, USA"}]},{"given":"Mu","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Utah, Salt Lake City, UT, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534218"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/115372.115320"},{"volume-title":"https:\/\/github.com\/danleh\/wasabi Retrieved","year":"2022","key":"e_1_3_2_1_3_1","unstructured":"danleh. 2019. Wasabi. https:\/\/github.com\/danleh\/wasabi Retrieved August 16, 2022 from danleh. 2019. Wasabi. https:\/\/github.com\/danleh\/wasabi Retrieved August 16, 2022 from"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/773473.178264"},{"key":"e_1_3_2_1_5_1","volume-title":"TaintAssembly: Taint-Based Information Flow Control Tracking for WebAssembly. CoRR","author":"Fu William","year":"2018","unstructured":"William Fu , Raymond Lin , and Daniel Inge . 2018. TaintAssembly: Taint-Based Information Flow Control Tracking for WebAssembly. CoRR , Vol. abs\/ 1802 .01050 ( 2018 ). showeprint[arXiv]1802.01050 http:\/\/arxiv.org\/abs\/1802.01050 William Fu, Raymond Lin, and Daniel Inge. 2018. TaintAssembly: Taint-Based Information Flow Control Tracking for WebAssembly. CoRR , Vol. abs\/1802.01050 (2018). showeprint[arXiv]1802.01050 http:\/\/arxiv.org\/abs\/1802.01050"},{"key":"e_1_3_2_1_6_1","volume-title":"https:\/\/webassembly.github.io\/spec\/core\/syntax\/modules.html Retrieved","author":"WebAssembly Community Group","year":"2022","unstructured":"WebAssembly Community Group . 2022. Modules. https:\/\/webassembly.github.io\/spec\/core\/syntax\/modules.html Retrieved August 16, 2022 from WebAssembly Community Group. 2022. Modules. https:\/\/webassembly.github.io\/spec\/core\/syntax\/modules.html Retrieved August 16, 2022 from"},{"key":"#cr-split#-e_1_3_2_1_7_1.1","unstructured":"Ningyu He Haoyu Wang Lei Wu Xiapu Luo Yao Guo and Xiangqun Chen. 2022. A Survey on EOSIO Systems Security: Vulnerability Attack and Mitigation. https:\/\/doi.org\/10.48550\/ARXIV.2207.09227 10.48550\/ARXIV.2207.09227"},{"key":"#cr-split#-e_1_3_2_1_7_1.2","unstructured":"Ningyu He Haoyu Wang Lei Wu Xiapu Luo Yao Guo and Xiangqun Chen. 2022. A Survey on EOSIO Systems Security: Vulnerability Attack and Mitigation. https:\/\/doi.org\/10.48550\/ARXIV.2207.09227"},{"key":"e_1_3_2_1_8_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"He Ningyu","year":"2021","unstructured":"Ningyu He , Ruiyi Zhang , Haoyu Wang , Lei Wu , Xiapu Luo , Yao Guo , Ting Yu , and Xuxian Jiang . 2021 . $$EOSAFE$$: Security Analysis of $$EOSIO$$ Smart Contracts . In 30th USENIX Security Symposium (USENIX Security 21) . 1271--1288. Ningyu He, Ruiyi Zhang, Haoyu Wang, Lei Wu, Xiapu Luo, Yao Guo, Ting Yu, and Xuxian Jiang. 2021. $$EOSAFE$$: Security Analysis of $$EOSIO$$ Smart Contracts. In 30th USENIX Security Symposium (USENIX Security 21). 1271--1288."},{"volume-title":"EOSFuzzer: Fuzzing EOSIO Smart Contracts for Vulnerability Detection. In 12th Asia-Pacific Symposium on Internetware","author":"Huang Yuhe","key":"e_1_3_2_1_9_1","unstructured":"Yuhe Huang , Bo Jiang , and W. K. Chan . 2020a . EOSFuzzer: Fuzzing EOSIO Smart Contracts for Vulnerability Detection. In 12th Asia-Pacific Symposium on Internetware ( Singapore, Singapore) (Internetware'20). Association for Computing Machinery, New York, NY, USA, 99--109. https:\/\/doi.org\/10.1145\/3457913.3457920 10.1145\/3457913.3457920 Yuhe Huang, Bo Jiang, and W. K. Chan. 2020a. EOSFuzzer: Fuzzing EOSIO Smart Contracts for Vulnerability Detection. In 12th Asia-Pacific Symposium on Internetware (Singapore, Singapore) (Internetware'20). Association for Computing Machinery, New York, NY, USA, 99--109. https:\/\/doi.org\/10.1145\/3457913.3457920"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3392155"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Sukrit Kalra Seep Goel Mohan Dhawan and Subodh Sharma. 2018. Zeus: analyzing safety of smart contracts.. In Ndss. 1--12.  Sukrit Kalra Seep Goel Mohan Dhawan and Subodh Sharma. 2018. Zeus: analyzing safety of smart contracts.. In Ndss. 1--12.","DOI":"10.14722\/ndss.2018.23082"},{"key":"e_1_3_2_1_12_1","volume-title":"How hackers attack EOS contracts and ways to prevent it. https:\/\/medium.com\/leclevietnam\/hacking-in-eos-contracts-and-how-to-prevent-it-b8663c8bffa6 Retrieved","author":"Quoc Le.","year":"2022","unstructured":"Quoc Le. 2018. How hackers attack EOS contracts and ways to prevent it. https:\/\/medium.com\/leclevietnam\/hacking-in-eos-contracts-and-how-to-prevent-it-b8663c8bffa6 Retrieved August 16, 2022 from Quoc Le. 2018. How hackers attack EOS contracts and ways to prevent it. https:\/\/medium.com\/leclevietnam\/hacking-in-eos-contracts-and-how-to-prevent-it-b8663c8bffa6 Retrieved August 16, 2022 from"},{"key":"e_1_3_2_1_13_1","volume-title":"On the (In)Security of Resource Management of EOS.IO. In 13th USENIX Workshop on Offensive Technologies (WOOT 19)","author":"Lee Sangsup","year":"2019","unstructured":"Sangsup Lee , Daejun Kim , Dongkwan Kim , Sooel Son , and Yongdae Kim . 2019 . Who Spent My EOS? On the (In)Security of Resource Management of EOS.IO. In 13th USENIX Workshop on Offensive Technologies (WOOT 19) . USENIX Association, Santa Clara, CA. https:\/\/www.usenix.org\/conference\/woot19\/presentation\/lee Sangsup Lee, Daejun Kim, Dongkwan Kim, Sooel Son, and Yongdae Kim. 2019. Who Spent My EOS? On the (In)Security of Resource Management of EOS.IO. In 13th USENIX Workshop on Offensive Technologies (WOOT 19). USENIX Association, Santa Clara, CA. https:\/\/www.usenix.org\/conference\/woot19\/presentation\/lee"},{"key":"e_1_3_2_1_14_1","volume-title":"Understanding the Decentralization of DPoS: Perspectives From Data-Driven Analysis on EOSIO. CoRR","author":"Liu Jieli","year":"2022","unstructured":"Jieli Liu , Weilin Zheng , Dingyuan Lu , Jiajing Wu , and Zibin Zheng . 2022. Understanding the Decentralization of DPoS: Perspectives From Data-Driven Analysis on EOSIO. CoRR , Vol. abs\/ 2201 .06187 ( 2022 ). showeprint[arXiv]2201.06187 https:\/\/arxiv.org\/abs\/2201.06187 Jieli Liu, Weilin Zheng, Dingyuan Lu, Jiajing Wu, and Zibin Zheng. 2022. Understanding the Decentralization of DPoS: Perspectives From Data-Driven Analysis on EOSIO. CoRR , Vol. abs\/2201.06187 (2022). showeprint[arXiv]2201.06187 https:\/\/arxiv.org\/abs\/2201.06187"},{"key":"e_1_3_2_1_15_1","volume-title":"What really happened during the EOSPlay hack. https:\/\/cmichel.io\/what-really-happened-with-the-eos-play-hack\/ Retrieved","author":"Michel Christoph","year":"2022","unstructured":"Christoph Michel . 2019. What really happened during the EOSPlay hack. https:\/\/cmichel.io\/what-really-happened-with-the-eos-play-hack\/ Retrieved August 16, 2022 from Christoph Michel. 2019. What really happened during the EOSPlay hack. https:\/\/cmichel.io\/what-really-happened-with-the-eos-play-hack\/ Retrieved August 16, 2022 from"},{"volume-title":"https:\/\/github.com\/FuzzingLabs\/octopus Retrieved","year":"2022","key":"e_1_3_2_1_16_1","unstructured":"pventuzelo. 2020. Octopus. https:\/\/github.com\/FuzzingLabs\/octopus Retrieved August 16, 2022 from pventuzelo. 2020. Octopus. https:\/\/github.com\/FuzzingLabs\/octopus Retrieved August 16, 2022 from"},{"key":"e_1_3_2_1_17_1","volume-title":"EVulHunter: Detecting Fake Transfer Vulnerabilities for EOSIO's Smart Contracts at Webassembly-level. CoRR","author":"Quan Lijin","year":"2019","unstructured":"Lijin Quan , Lei Wu , and Haoyu Wang . 2019. EVulHunter: Detecting Fake Transfer Vulnerabilities for EOSIO's Smart Contracts at Webassembly-level. CoRR , Vol. abs\/ 1906 .10362 ( 2019 ). showeprint[arXiv]1906.10362 http:\/\/arxiv.org\/abs\/1906.10362 Lijin Quan, Lei Wu, and Haoyu Wang. 2019. EVulHunter: Detecting Fake Transfer Vulnerabilities for EOSIO's Smart Contracts at Webassembly-level. CoRR , Vol. abs\/1906.10362 (2019). showeprint[arXiv]1906.10362 http:\/\/arxiv.org\/abs\/1906.10362"},{"key":"e_1_3_2_1_18_1","volume-title":"Taint Tracking for WebAssembly. CoRR","author":"Szanto Aron","year":"2018","unstructured":"Aron Szanto , Timothy Tamm , and Artidoro Pagnoni . 2018. Taint Tracking for WebAssembly. CoRR , Vol. abs\/ 1807 .08349 ( 2018 ). showeprint[arXiv]1807.08349 http:\/\/arxiv.org\/abs\/1807.08349 Aron Szanto, Timothy Tamm, and Artidoro Pagnoni. 2018. Taint Tracking for WebAssembly. CoRR , Vol. abs\/1807.08349 (2018). showeprint[arXiv]1807.08349 http:\/\/arxiv.org\/abs\/1807.08349"},{"key":"e_1_3_2_1_19_1","volume-title":"WANA: Symbolic Execution of Wasm Bytecode for Cross-Platform Smart Contract Vulnerability Detection. CoRR","author":"Wang Dong","year":"2020","unstructured":"Dong Wang , Bo Jiang , and W. K. Chan . 2020 . WANA: Symbolic Execution of Wasm Bytecode for Cross-Platform Smart Contract Vulnerability Detection. CoRR , Vol. abs\/ 2007 .15510 (2020). showeprint[arXiv]2007.15510 https:\/\/arxiv.org\/abs\/2007.15510 Dong Wang, Bo Jiang, and W. K. Chan. 2020. WANA: Symbolic Execution of Wasm Bytecode for Cross-Platform Smart Contract Vulnerability Detection. CoRR , Vol. abs\/2007.15510 (2020). showeprint[arXiv]2007.15510 https:\/\/arxiv.org\/abs\/2007.15510"},{"key":"#cr-split#-e_1_3_2_1_20_1.1","doi-asserted-by":"crossref","unstructured":"Weilin Zheng Bo Liu Hong-Ning Dai Zigui Jiang Zibin Zheng and Muhammad Imran. 2022. Unravelling Token Ecosystem of EOSIO Blockchain. https:\/\/doi.org\/10.48550\/ARXIV.2202.11201 io 10.48550\/ARXIV.2202.11201","DOI":"10.1109\/ACCESS.2022.3168842"},{"key":"#cr-split#-e_1_3_2_1_20_1.2","unstructured":"Weilin Zheng Bo Liu Hong-Ning Dai Zigui Jiang Zibin Zheng and Muhammad Imran. 2022. Unravelling Token Ecosystem of EOSIO Blockchain. https:\/\/doi.org\/10.48550\/ARXIV.2202.11201 io"}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Los Angeles CA USA","acronym":"CCS '22"},"container-title":["Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3563545","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3563545","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3563545","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:06Z","timestamp":1750182666000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3563545"}},"subtitle":["EOSDFA: Data Flow Analysis of EOSIO Smart Contracts"],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":22,"alternative-id":["10.1145\/3548606.3563545","10.1145\/3548606"],"URL":"https:\/\/doi.org\/10.1145\/3548606.3563545","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}