{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T23:55:13Z","timestamp":1775346913647,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,1,5]],"date-time":"2023-01-05T00:00:00Z","timestamp":1672876800000},"content-version":"vor","delay-in-days":87,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100006785","name":"Google","doi-asserted-by":"publisher","award":["Faculty Research Award"],"award-info":[{"award-number":["Faculty Research Award"]}],"id":[{"id":"10.13039\/100006785","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NSF","award":["1908494"],"award-info":[{"award-number":["1908494"]}]},{"name":"DARPA","award":["N66001-22-C-4028"],"award-info":[{"award-number":["N66001-22-C-4028"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,10]]},"DOI":"10.1145\/3551349.3556962","type":"proceedings-article","created":{"date-parts":[[2023,1,5]],"date-time":"2023-01-05T20:43:54Z","timestamp":1672951434000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Learning Contract Invariants Using Reinforcement Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9656-7073","authenticated-orcid":false,"given":"Junrui","family":"Liu","sequence":"first","affiliation":[{"name":"University of California, Santa Barbara, USA and Veridise Inc., USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6494-3126","authenticated-orcid":false,"given":"Yanju","family":"Chen","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, United States and Veridise Inc., USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4008-3846","authenticated-orcid":false,"given":"Bryan","family":"Tan","sequence":"additional","affiliation":[{"name":"Veridise Inc., USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8006-1230","authenticated-orcid":false,"given":"Isil","family":"Dillig","sequence":"additional","affiliation":[{"name":"University of Texas at Austin, United States and Veridise Inc., USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1000-1229","authenticated-orcid":false,"given":"Yu","family":"Feng","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, United States of America and Veridise Inc., USA"}]}],"member":"320","published-online":{"date-parts":[[2023,1,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23534-9_2"},{"key":"e_1_3_2_1_2_1","volume-title":"SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds. In 43rd IEEE Symposium on Security and Privacy, S&P 2022","author":"Bose Priyanka","year":"2022","unstructured":"Priyanka Bose, Dipanjan Das, Yanju Chen, Yu Feng, Christopher Kruegel, and Giovanni Vigna. 2022. SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds. In 43rd IEEE Symposium on Security and Privacy, S&P 2022, San Francisco, US, May 22-26, 2022. IEEE. https:\/\/arxiv.org\/abs\/2104.08638"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3360567"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/512950.512973"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509511"},{"key":"e_1_3_2_1_6_1","volume-title":"Fast Graph Representation Learning with PyTorch Geometric. In ICLR Workshop on Representation Learning on Graphs and Manifolds.","author":"Fey Matthias","year":"2019","unstructured":"Matthias Fey and Jan\u00a0E. Lenssen. 2019. Fast Graph Representation Learning with PyTorch Geometric. In ICLR Workshop on Representation Learning on Graphs and Manifolds."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/647540.730008"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08867-9_5"},{"key":"e_1_3_2_1_9_1","volume-title":"21st International Conference, CAV 2009, Grenoble, France, June 26 - July 2, 2009. Proceedings(Lecture Notes in Computer Science, Vol.\u00a05643)","author":"Ghorbal Khalil","year":"2009","unstructured":"Khalil Ghorbal, Eric Goubault, and Sylvie Putot. 2009. The Zonotope Abstract Domain Taylor1+. In Computer Aided Verification, 21st International Conference, CAV 2009, Grenoble, France, June 26 - July 2, 2009. Proceedings(Lecture Notes in Computer Science, Vol.\u00a05643), Ahmed Bouajjani and Oded Maler (Eds.). Springer, 627\u2013633."},{"key":"e_1_3_2_1_10_1","volume-title":"Construction of abstract state graphs with PVS","author":"Graf Susanne","unstructured":"Susanne Graf and Hassen Saidi. 1997. Construction of abstract state graphs with PVS. In Computer Aided Verification, Orna Grumberg (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 72\u201383."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SYNASC49474.2019.00010"},{"key":"e_1_3_2_1_12_1","volume-title":"VSTTE 2019","author":"Hajdu \u00c1kos","year":"2019","unstructured":"\u00c1kos Hajdu and Dejan Jovanovic. 2019. solc-verify: A Modular Verifier for Solidity Smart Contracts. In Verified Software. Theories, Tools, and Experiments - 11th International Conference, VSTTE 2019, New York City, NY, USA, July 13-14, 2019, Revised Selected Papers(Lecture Notes in Computer Science, Vol.\u00a012031), Supratik Chakraborty and Jorge\u00a0A. Navas (Eds.). Springer, 161\u2013179."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39799-8_59"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the 35th International Conference on Machine Learning(Proceedings of Machine Learning Research, Vol.\u00a080)","author":"Liang Eric","year":"2018","unstructured":"Eric Liang, Richard Liaw, Robert Nishihara, Philipp Moritz, Roy Fox, Ken Goldberg, Joseph Gonzalez, Michael Jordan, and Ion Stoica. 2018. RLlib: Abstractions for Distributed Reinforcement Learning. In Proceedings of the 35th International Conference on Machine Learning(Proceedings of Machine Learning Research, Vol.\u00a080), Jennifer Dy and Andreas Krause (Eds.). PMLR, 3053\u20133062. https:\/\/proceedings.mlr.press\/v80\/liang18b.html"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416626"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2001.957836"},{"key":"e_1_3_2_1_17_1","volume-title":"CAV 2020, Los Angeles, CA, USA, July 21-24, 2020, Proceedings, Part I(Lecture Notes in Computer Science, Vol.\u00a012224)","author":"Park Daejun","year":"2020","unstructured":"Daejun Park, Yi Zhang, and Grigore Rosu. 2020. End-to-End Formal Verification of Ethereum 2.0 Deposit Smart Contract. In Computer Aided Verification - 32nd International Conference, CAV 2020, Los Angeles, CA, USA, July 21-24, 2020, Proceedings, Part I(Lecture Notes in Computer Science, Vol.\u00a012224), Shuvendu\u00a0K. Lahiri and Chao Wang (Eds.). Springer, 151\u2013164."},{"key":"e_1_3_2_1_18_1","volume-title":"VerX: Safety Verification of Smart Contracts. In 2020 IEEE Symposium on Security and Privacy (SP).","author":"Permenev A.","unstructured":"A. Permenev, D. Dimitrov, P. Tsankov, D. Drachsler-Cohen, and M. Vechev. 2020. VerX: Safety Verification of Smart Contracts. In 2020 IEEE Symposium on Security and Privacy (SP)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10703-016-0248-5"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/214"},{"key":"e_1_3_2_1_21_1","volume-title":"Learning Loop Invariants for Program Verification. In Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018","author":"Si Xujie","year":"2018","unstructured":"Xujie Si, Hanjun Dai, Mukund Raghothaman, Mayur Naik, and Le Song. 2018. Learning Loop Invariants for Program Verification. In Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, NeurIPS 2018, December 3-8, 2018, Montr\u00e9al, Canada, Samy Bengio, Hanna\u00a0M. Wallach, Hugo Larochelle, Kristen Grauman, Nicol\u00f2 Cesa-Bianchi, and Roman Garnett (Eds.). 7762\u20137773. https:\/\/proceedings.neurips.cc\/paper\/2018\/hash\/65b1e92c585fd4c2159d5f33b5030ff2-Abstract.html"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-53291-8_9"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3009837.3009885"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00032"},{"key":"e_1_3_2_1_25_1","volume-title":"SmartPulse: Automated Checking of Temporal Properties in Smart Contracts. In 42nd IEEE Symposium on Security and Privacy, SP 2021","author":"Stephens Jon","year":"2021","unstructured":"Jon Stephens, Kostas Ferles, Benjamin Mariano, Shuvendu\u00a0K. Lahiri, and Isil Dillig. 2021. SmartPulse: Automated Checking of Temporal Properties in Smart Contracts. In 42nd IEEE Symposium on Security and Privacy, SP 2021, San Francisco, CA, USA, 24-27 May 2021. IEEE, 555\u2013571."},{"key":"e_1_3_2_1_26_1","volume-title":"Advances in Neural Information Processing Systems, S.\u00a0Solla, T.\u00a0Leen, and K.\u00a0M\u00fcller (Eds.). Vol.\u00a012","author":"Sutton S","year":"1999","unstructured":"Richard\u00a0S Sutton, David McAllester, Satinder Singh, and Yishay Mansour. 2000. Policy Gradient Methods for Reinforcement Learning with Function Approximation. In Advances in Neural Information Processing Systems, S.\u00a0Solla, T.\u00a0Leen, and K.\u00a0M\u00fcller (Eds.). Vol.\u00a012. MIT Press. https:\/\/proceedings.neurips.cc\/paper\/1999\/file\/464d828b85b0bed98e80ade0a5c43b0f-Paper.pdf"},{"key":"e_1_3_2_1_27_1","unstructured":"Bryan Tan Benjamin Mariano Shuvendu Lahiri Isil Dillig and Yu Feng. 2021. SolType: Refinement Types for Solidity. arXiv preprint arXiv:2110.00677(2021)."},{"key":"e_1_3_2_1_28_1","volume-title":"Advances in Neural Information Processing Systems, C.\u00a0Cortes, N.\u00a0Lawrence, D.\u00a0Lee, M.\u00a0Sugiyama, and R.\u00a0Garnett (Eds.). Vol.\u00a028. Curran Associates","author":"Vinyals Oriol","year":"2015","unstructured":"Oriol Vinyals, Meire Fortunato, and Navdeep Jaitly. 2015. Pointer Networks. In Advances in Neural Information Processing Systems, C.\u00a0Cortes, N.\u00a0Lawrence, D.\u00a0Lee, M.\u00a0Sugiyama, and R.\u00a0Garnett (Eds.). Vol.\u00a028. Curran Associates, Inc.https:\/\/proceedings.neurips.cc\/paper\/2015\/file\/29921001f2f04bd3baee84a12e98098f-Paper.pdf"},{"key":"e_1_3_2_1_29_1","volume-title":"Working Conference on Verified Software: Theories, Tools, and Experiments. Springer, 87\u2013106","author":"Wang Yuepeng","year":"2019","unstructured":"Yuepeng Wang, Shuvendu\u00a0K Lahiri, Shuo Chen, Rong Pan, Isil Dillig, Cody Born, Immad Naseer, and Kostas Ferles. 2019. Formal verification of workflow policies for smart contracts in azure blockchain. In Working Conference on Verified Software: Theories, Tools, and Experiments. Springer, 87\u2013106."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3192366.3192416"}],"event":{"name":"ASE '22: 37th IEEE\/ACM International Conference on Automated Software Engineering","location":"Rochester MI USA","acronym":"ASE '22"},"container-title":["Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3551349.3556962","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3551349.3556962","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3551349.3556962","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T07:55:35Z","timestamp":1755849335000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3551349.3556962"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,10]]},"references-count":30,"alternative-id":["10.1145\/3551349.3556962","10.1145\/3551349"],"URL":"https:\/\/doi.org\/10.1145\/3551349.3556962","relation":{},"subject":[],"published":{"date-parts":[[2022,10,10]]},"assertion":[{"value":"2023-01-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}