{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T14:26:48Z","timestamp":1771079208108,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,10]],"date-time":"2022-10-10T00:00:00Z","timestamp":1665360000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001321","name":"National Research Foundation","doi-asserted-by":"publisher","award":["NRF2018NCR-NSOE004-0001"],"award-info":[{"award-number":["NRF2018NCR-NSOE004-0001"]}],"id":[{"id":"10.13039\/501100001321","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,10]]},"DOI":"10.1145\/3551349.3559560","type":"proceedings-article","created":{"date-parts":[[2023,1,5]],"date-time":"2023-01-05T20:43:54Z","timestamp":1672951434000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Property-Based Automated Repair of DeFi Protocols"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1389-6814","authenticated-orcid":false,"given":"Palina","family":"Tolmach","sequence":"first","affiliation":[{"name":"Nanyang Technological University, Singapore and Institute of High Performance Computing, A*STAR, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4562-8208","authenticated-orcid":false,"given":"Yi","family":"Li","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9726-3434","authenticated-orcid":false,"given":"Shang-Wei","family":"Lin","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2023,1,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54455-6_8"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409757"},{"key":"e_1_3_2_1_3_1","volume-title":"Accessed","author":"Cevallos Alberto","year":"2021","unstructured":"Alberto Cevallos. 2021. xFORCE Exploit Post Mortem. https:\/\/blog.forcedao.com\/xforce-exploit-post-mortem-7fa9dcba2ac3\/. Accessed: May 26, 2022."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3391195"},{"key":"e_1_3_2_1_5_1","volume-title":"Accessed","author":"M.","year":"2022","unstructured":"C.R.E.A.M.2021. C.R.E.A.M. Finance Post Mortem: AMP Exploit. https:\/\/medium.com\/cream-finance\/c-r-e-a-m-finance-post-mortem-amp-exploit-6ceb20a630c5\/. Accessed: May 26, 2022."},{"key":"e_1_3_2_1_6_1","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"de Moura Leonardo","unstructured":"Leonardo de Moura and Nikolaj Bj\u00f8rner. 2008. Z3: An Efficient SMT Solver. In Tools and Algorithms for the Construction and Analysis of Systems. Springer Berlin Heidelberg, Berlin, Heidelberg, 337\u2013340."},{"key":"e_1_3_2_1_7_1","volume-title":"Accessed","author":"DeFi Value","year":"2021","unstructured":"Value DeFi. 2021. Value DeFi: ProfitSharingRewardPool Source Code \u2013 BSCScan. https:\/\/bscscan.com\/address\/0x7a8ac384d3a9086afcc13eb58e90916f17affc89#code. Accessed: May 26, 2022."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3415298"},{"key":"e_1_3_2_1_9_1","volume-title":"Accessed","author":"Finance Cream","year":"2021","unstructured":"Cream Finance. 2021. CREAM Finance cToken smart contract. https:\/\/github.com\/CreamFi\/compound-protocol\/blob\/0e079dd9e1d6fdf974ab429a17b955dedf677315\/contracts\/CToken.sol#L442. Accessed: May 26, 2022."},{"key":"e_1_3_2_1_10_1","volume-title":"Accessed","author":"DAO.","year":"2021","unstructured":"ForceDAO. 2021. xForce: ForceProfitSharing Source Code \u2013 EtherScan. https:\/\/etherscan.io\/address\/0xe7f445b93eb9cdabfe76541cc43ff8de930a58e6#code. Accessed: May 26, 2022."},{"key":"e_1_3_2_1_11_1","unstructured":"Jens-Rene Giesen Sebastien Andreina Michael Rodler Ghassan\u00a0O. Karame and Lucas Davi. 2022. Practical Mitigation of Smart Contract Bugs. arxiv:2203.00364\u00a0[cs.CR]"},{"key":"e_1_3_2_1_12_1","volume-title":"Accessed","author":"Gkritsi Eliza","year":"2022","unstructured":"Eliza Gkritsi. 2022. Funds Lost to DeFi Hacks More Than Doubled to $1.3B in 2021: Certik. https:\/\/www.coindesk.com\/business\/2022\/01\/13\/funds-lost-to-defi-hacks-more-than-doubled-to-13b-in-2021-certik\/. Accessed: May 26, 2022."},{"key":"e_1_3_2_1_13_1","volume-title":"Accessed","author":"Harper Colin","year":"2021","unstructured":"Colin Harper. 2021. Binance Chain DeFi Exchange Uranium Finance Loses $50M in Exploit. https:\/\/www.coindesk.com\/markets\/2021\/04\/28\/binance-chain-defi-exchange-uranium-finance-loses-50m-in-exploit\/. Accessed: May 26, 2022."},{"key":"e_1_3_2_1_14_1","volume-title":"Accessed","author":"Igamberdiev Igor","year":"2021","unstructured":"Igor Igamberdiev. 2021. Binance Chain DeFi Exchange Uranium Finance Loses $50M in Exploit. https:\/\/twitter.com\/FrankResearcher\/status\/1387347036916260869. Accessed: May 26, 2022."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3123170"},{"key":"e_1_3_2_1_16_1","volume-title":"Accessed","author":"Kistner J.","year":"2020","unstructured":"K.\u00a0J. Kistner. 2020. iToken Duplication Incident Report. https:\/\/bzx.network\/blog\/incident\/. Accessed: May 26, 2022."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385982"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3488015"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Tai\u00a0D. Nguyen Long\u00a0H. Pham and Jun Sun. 2021. sGUARD: Towards Fixing Vulnerable Smart Contracts Automatically. arxiv:2101.01917\u00a0[cs.CR]","DOI":"10.1109\/SP40001.2021.00057"},{"key":"e_1_3_2_1_20_1","volume-title":"Accessed","year":"2020","unstructured":"OokiTrade. 2020. iToken LoanTokenLogicStandard smart contract. https:\/\/github.com\/OokiTrade\/contractsV2\/blob\/bf95cbe373d4e972da5e93daf8ddb0f3886e78a1\/contracts\/connectors\/loantoken\/LoanTokenLogicStandard.sol#L279. Accessed: May 26, 2022."},{"key":"e_1_3_2_1_21_1","volume-title":"Accessed","author":"Pulse DeFi","year":"2022","unstructured":"DeFi Pulse. 2022. DeFi - The Decentralized Finance Leaderboard at DeFi Pulse. https:\/\/defipulse.com\/. Accessed: May 26, 2022."},{"key":"e_1_3_2_1_22_1","volume-title":"Accessed","author":"REKT.","year":"2021","unstructured":"REKT. 2021. VALUE DEFI - REKT 2. https:\/\/rekt.news\/value-rekt2\/. Accessed: May 26, 2022."},{"key":"e_1_3_2_1_23_1","unstructured":"Michael Rodler Wenting Li Ghassan\u00a0O. Karame and Lucas Davi. 2020. EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts. arxiv:2010.00341\u00a0[cs.CR]"},{"key":"e_1_3_2_1_24_1","volume-title":"Accessed","year":"2021","unstructured":"SmartBugs. 2021. SmartBugs Confused_Sign Wallet smart contract. https:\/\/github.com\/smartbugs\/smartbugs\/blob\/master\/dataset\/access_control\/wallet_04_confused_sign.sol. Accessed: May 26, 2022."},{"key":"e_1_3_2_1_25_1","volume-title":"Accessed","year":"2021","unstructured":"SmartBugs. 2021. SmartBugs EtherBank smart contract. https:\/\/github.com\/smartbugs\/smartbugs\/blob\/master\/dataset\/reentrancy\/etherbank.sol. Accessed: May 26, 2022."},{"key":"e_1_3_2_1_26_1","volume-title":"Accessed","year":"2021","unstructured":"SmartBugs. 2021. SmartBugs Refund_NoSub smart contract. https:\/\/github.com\/smartbugs\/smartbugs\/blob\/master\/dataset\/access_control\/wallet_02_refund_nosub.sol. Accessed: May 26, 2022."},{"key":"e_1_3_2_1_27_1","volume-title":"Accessed","year":"2021","unstructured":"SmartBugs. 2021. SmartBugs Unprotected smart contract. https:\/\/github.com\/smartbugs\/smartbugs\/blob\/master\/dataset\/access_control\/unprotected0.sol. Accessed: May 26, 2022."},{"key":"e_1_3_2_1_28_1","volume-title":"Accessed","author":"Tolmach Palina","year":"2022","unstructured":"Palina Tolmach, Yi Li, and Shang-Wei Lin. 2022. DeFinery: Online Supplementary Material. https:\/\/sites.google.com\/view\/ase2022-definery\/. Accessed: May 26, 2022."},{"key":"e_1_3_2_1_29_1","volume-title":"Formal Analysis of Composable DeFi Protocols. In Financial Cryptography and Data Security. FC 2021 International Workshops. Springer Berlin Heidelberg","author":"Tolmach Palina","year":"2021","unstructured":"Palina Tolmach, Yi Li, Shang-Wei Lin, and Yang Liu. 2021. Formal Analysis of Composable DeFi Protocols. In Financial Cryptography and Data Security. FC 2021 International Workshops. Springer Berlin Heidelberg, Berlin, Heidelberg, 149\u2013161."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3464421"},{"key":"e_1_3_2_1_31_1","volume-title":"Elysium: Automagically Healing Vulnerable Smart Contracts Using Context-Aware Patching. arxiv:2108.10071\u00a0[cs.CR]","author":"Torres Christof\u00a0Ferreira","year":"2021","unstructured":"Christof\u00a0Ferreira Torres, Hugo Jonker, and Radu State. 2021. Elysium: Automagically Healing Vulnerable Smart Contracts Using Context-Aware Patching. arxiv:2108.10071\u00a0[cs.CR]"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3402450"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER48275.2020.9054825"}],"event":{"name":"ASE '22: 37th IEEE\/ACM International Conference on Automated Software Engineering","location":"Rochester MI USA","acronym":"ASE '22"},"container-title":["Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3551349.3559560","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3551349.3559560","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T07:54:29Z","timestamp":1755849269000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3551349.3559560"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,10]]},"references-count":33,"alternative-id":["10.1145\/3551349.3559560","10.1145\/3551349"],"URL":"https:\/\/doi.org\/10.1145\/3551349.3559560","relation":{},"subject":[],"published":{"date-parts":[[2022,10,10]]},"assertion":[{"value":"2023-01-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}