{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T16:50:31Z","timestamp":1776444631938,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":90,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T00:00:00Z","timestamp":1715558400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-2054657,CNS-2317830,CNS-2139801,CNS-1815814,DGE2104532"],"award-info":[{"award-number":["CNS-2054657,CNS-2317830,CNS-2139801,CNS-1815814,DGE2104532"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,13]]},"DOI":"10.1145\/3589334.3645640","type":"proceedings-article","created":{"date-parts":[[2024,5,8]],"date-time":"2024-05-08T07:08:13Z","timestamp":1715152093000},"page":"1847-1858","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Characterizing Ethereum Upgradable Smart Contracts and Their Security Implications"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-5951-1948","authenticated-orcid":false,"given":"Xiaofan","family":"Li","sequence":"first","affiliation":[{"name":"University of Delaware, Newark, Delaware, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-1706-1444","authenticated-orcid":false,"given":"Jin","family":"Yang","sequence":"additional","affiliation":[{"name":"Syracuse University, Syracuse, New York, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6368-6164","authenticated-orcid":false,"given":"Jiaqi","family":"Chen","sequence":"additional","affiliation":[{"name":"Syracuse University, Syracuse, New York, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8911-106X","authenticated-orcid":false,"given":"Yuzhe","family":"Tang","sequence":"additional","affiliation":[{"name":"Syracuse University, Syracuse, New York, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-2574-029X","authenticated-orcid":false,"given":"Xing","family":"Gao","sequence":"additional","affiliation":[{"name":"University of Delaware, Newark, Delaware, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2024,5,13]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2022. A Real-World UUPS USC Was Destroyed by Delegating a Call to a Pre-defined Destroy Function. https:\/\/etherscan.io\/address\/0xa0e377d9cb4fcc014b634d74de07a428d3896eff"},{"key":"e_1_3_2_2_2_1","unstructured":"Abi-decoder. 2018. Abi-decode-functions. https:\/\/www.npmjs.com\/package\/abidecode-functions"},{"key":"e_1_3_2_2_3_1","unstructured":"Solidity Academy. 2023. Demystifying the Factory Pattern in Solidity: Efficient Contract Deployment with Factory Pattern. https:\/\/medium.com\/@solidity101\/demystifying-the-factory-pattern-in-solidityefficient- contract-deployment-with-factory-pattern-e233ea6d1ec0"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-17108-6_14"},{"key":"e_1_3_2_2_5_1","volume-title":"Proceedings of the European Conference on Pattern Languages of Programs","author":"Dilum Bandara HMN","year":"2020","unstructured":"HMN Dilum Bandara, Xiwei Xu, and Ingo Weber. 2020. Patterns for Blockchain Data Migration. In Proceedings of the European Conference on Pattern Languages of Programs 2020."},{"key":"e_1_3_2_2_6_1","unstructured":"Gabriel Barros. 2019. Universal Upgradeable Proxy Standard (UUPS). https:\/\/eips.ethereum.org\/EIPS\/eip-1822"},{"key":"e_1_3_2_2_7_1","unstructured":"Michael Blau. 2022. A Tool for Detecting Metamorphic Smart Contracts. https:\/\/a16zcrypto.com\/posts\/article\/metamorphic-smart-contract-detector-tool\/"},{"key":"e_1_3_2_2_8_1","volume-title":"Proxy Hunting: Understanding and Characterizing Proxy-Based Upgradeable Smart Contracts in Blockchains. In 32nd USENIX Security Symposium.","author":"William E","year":"2023","unstructured":"William E Bodell III, Sajad Meisami, and Yue Duan. 2023. Proxy Hunting: Understanding and Characterizing Proxy-Based Upgradeable Smart Contracts in Blockchains. In 32nd USENIX Security Symposium."},{"key":"e_1_3_2_2_9_1","volume-title":"Sailfish: Vetting Smart Contract State-Inconsistency Bugs in Seconds. In 2022 IEEE Symposium on Security and Privacy.","author":"Bose Priyanka","year":"2022","unstructured":"Priyanka Bose, Dipanjan Das, Yanju Chen, Yu Feng, Christopher Kruegel, and Giovanni Vigna. 2022. Sailfish: Vetting Smart Contract State-Inconsistency Bugs in Seconds. In 2022 IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_2_10_1","unstructured":"Vitalik Buterin. 2018. Skinny CREATE2. https:\/\/eips.ethereum.org\/EIPS\/eip-1014"},{"key":"e_1_3_2_2_11_1","unstructured":"Etherscan Information Center. 2023. Token Migration. https:\/\/info.etherscan.com\/token-migration\/"},{"key":"e_1_3_2_2_12_1","unstructured":"ChainList. 2023. Ethereum Mainnet RPC and Chain Settings | Chainlist. https:\/\/chainlist.org\/chain\/1"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3418923"},{"key":"e_1_3_2_2_14_1","volume-title":"Defectchecker: Automated Smart Contract Defect Detection by Analyzing EVM Bytecode","author":"Chen Jiachi","year":"2021","unstructured":"Jiachi Chen, Xin Xia, David Lo, John Grundy, Xiapu Luo, and Ting Chen. 2021. Defectchecker: Automated Smart Contract Defect Detection by Analyzing EVM Bytecode. IEEE Transactions on Software Engineering (2021)."},{"key":"e_1_3_2_2_15_1","unstructured":"Ting Chen Zihao Li Xiapu Luo XiaofengWang TingWang Zheyuan He Kezhao Fang Yufei Zhang Hang Zhu Hongwei Li et al. 2021. SigRec: Automatic Recovery of Function Signatures in Smart Contracts. IEEE Transactions on Software Engineering (2021)."},{"key":"e_1_3_2_2_16_1","volume-title":"Smartian: Enhancing Smart Contract Fuzzing with Static and Dynamic Data-Flow Analyses. In 2021 36th IEEE\/ACM International Conference on Automated Software Engineering.","author":"Choi Jaeseung","year":"2021","unstructured":"Jaeseung Choi, Doyeon Kim, Soomin Kim, Gustavo Grieco, Alex Groce, and Sang Kil Cha. 2021. Smartian: Enhancing Smart Contract Fuzzing with Static and Dynamic Data-Flow Analyses. In 2021 36th IEEE\/ACM International Conference on Automated Software Engineering."},{"key":"e_1_3_2_2_17_1","unstructured":"Google Cloud. 2018. Ethereum in BigQuery: A Public Dataset for Smart Contract Analytics. https:\/\/cloud.google.com\/blog\/products\/data-analytics\/ethereumbigquery-public-dataset-smart-contract-analytics"},{"key":"e_1_3_2_2_18_1","unstructured":"Google Cloud. 2023. Bigquery. https:\/\/console.cloud.google.com\/bigquery?ws=!1m4!1m3!3m2!1sbigquery-public-data!2scrypto_ethereum"},{"key":"e_1_3_2_2_19_1","unstructured":"CoinMarketCap. 2023. Cryptocurrency Prices Charts and Market Capitalizations. https:\/\/coinmarketcap.com\/"},{"key":"e_1_3_2_2_20_1","volume-title":"Mythril: Security analysis tool for EVM bytecode. https:\/\/github.com\/ConsenSys\/mythril\/","year":"2023","unstructured":"ConsenSys. 2023. Mythril: Security analysis tool for EVM bytecode. https:\/\/github.com\/ConsenSys\/mythril\/"},{"key":"e_1_3_2_2_21_1","unstructured":"CoreLibrary. 2021. CoreLibrary. https:\/\/etherscan.io\/address\/0x57ff2cbf0d1dfd79b497795b2edd3b56f1a30397"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559342"},{"key":"e_1_3_2_2_23_1","unstructured":"Ethereum Signature Database. 2023. Ethereum Signature Database. https:\/\/www.4byte.directory\/"},{"key":"e_1_3_2_2_24_1","unstructured":"Decentraland. 2023. Decentraland. https:\/\/decentraland.org\/"},{"key":"e_1_3_2_2_25_1","unstructured":"Panoramix decompiler. 2023. Panoramix Decompiler. https:\/\/oko.palkeo.com\/"},{"key":"e_1_3_2_2_26_1","unstructured":"Ethereum Docs. 2023. Anatomy of Smart Contracts. https:\/\/ethereum.org\/en\/ developers\/docs\/smart-contracts\/anatomy\/"},{"key":"e_1_3_2_2_27_1","unstructured":"Ethereum Docs. 2023. ERC-20 Token Standard. https:\/\/ethereum.org\/en\/ developers\/docs\/standards\/tokens\/erc-20\/"},{"key":"e_1_3_2_2_28_1","unstructured":"Ethereum Docs. 2023. Ethereum Accounts. https:\/\/ethereum.org\/en\/developers\/docs\/accounts\/"},{"key":"e_1_3_2_2_29_1","unstructured":"Ethereum Docs. 2023. Ethereum Virtual Machine. https:\/\/ethereum.org\/en\/developers\/docs\/evm\/"},{"key":"e_1_3_2_2_30_1","unstructured":"Ethereum Docs. 2023. Introduction to Dapps. https:\/\/ethereum.org\/en\/developers\/docs\/dapps\/"},{"key":"e_1_3_2_2_31_1","unstructured":"Ethereum Docs. 2023. Upgrading Smart Contracts. https:\/\/ethereum.org\/en\/developers\/docs\/smart-contracts\/upgrading\/"},{"key":"e_1_3_2_2_32_1","unstructured":"Solidity Docs. 2023. List of Known Bugs. https:\/\/docs.soliditylang.org\/en\/latest\/bugs.html"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559384"},{"key":"e_1_3_2_2_34_1","unstructured":"Ethereum. 2023. Decentralized Exchanges (DEXs). https:\/\/ethereum.org\/en\/geteth\/#dex"},{"key":"e_1_3_2_2_35_1","unstructured":"Etherscan. 2023. Etherscan Contracts API. https:\/\/docs.etherscan.io\/apiendpoints\/contracts"},{"key":"e_1_3_2_2_36_1","unstructured":"Etherscan. 2023. Etherscan (ETH) Blockchain Explorer. https:\/\/etherscan.io\/"},{"key":"e_1_3_2_2_37_1","unstructured":"ETHMail. 2023. Email Services for Ethereum Community. https:\/\/ethmail.cc\/"},{"key":"e_1_3_2_2_38_1","unstructured":"Blockchain ETL. 2023. Ethereum-Etl. https:\/\/github.com\/blockchain-etl\/ethereum-etl"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3545948.3545975"},{"key":"e_1_3_2_2_40_1","unstructured":"Safe Ecosystem Foundation. 2023. ModuleManager. https:\/\/github.com\/safeglobal\/safe-contracts\/blob\/v1.4.1\/contracts\/base\/ModuleManager.sol"},{"key":"e_1_3_2_2_41_1","volume-title":"ETHBMC: A Bounded Model Checker for Smart Contracts. In 29th USENIX Security Symposium.","author":"Frank Joel","year":"2020","unstructured":"Joel Frank, Cornelius Aschermann, and Thorsten Holz. 2020. ETHBMC: A Bounded Model Checker for Smart Contracts. In 29th USENIX Security Symposium."},{"key":"e_1_3_2_2_42_1","volume-title":"6th Workshop on Trusted Smart Contracts.","author":"Fr\u00f6wis Michael","year":"2022","unstructured":"Michael Fr\u00f6wis and Rainer B\u00f6hme. 2022. Not All Code Are Create2 Equal. In 6th Workshop on Trusted Smart Contracts."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3276486"},{"key":"e_1_3_2_2_44_1","volume-title":"Proceedings of the ACM on Programming Languages","author":"Grossman Shelly","year":"2017","unstructured":"Shelly Grossman, Ittai Abraham, Guy Golan-Gueta, Yan Michalevsky, Noam Rinetzky, Mooly Sagiv, and Yoni Zohar. 2017. Online Detection of Effectively Callback Free Objects with Applications to Smart Contracts. Proceedings of the ACM on Programming Languages (2017)."},{"key":"e_1_3_2_2_45_1","unstructured":"Ethereum History. 2019. Constantinople. https:\/\/ethereum.org\/en\/history\/#constantinople"},{"key":"e_1_3_2_2_46_1","unstructured":"Ethereum input-data decoder. 2022. Ethereum-input-data-decoder. https:\/\/www.npmjs.com\/package\/ethereum-input-data-decoder"},{"key":"e_1_3_2_2_47_1","unstructured":"Iosiro. 2021. Perma-Brick UUPS Proxies with This One Trick. https:\/\/www. iosiro.com\/blog\/openzeppelin-uups-proxy-vulnerability-disclosure"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238177"},{"key":"e_1_3_2_2_49_1","unstructured":"Josselinfeist. 2018. Contract Upgrade Anti-Patterns. https:\/\/blog.trailofbits.com\/2018\/09\/05\/contract-upgrade-anti-patterns"},{"key":"e_1_3_2_2_50_1","volume-title":"27th USENIX Security Symposium.","author":"Krupp Johannes","year":"2018","unstructured":"Johannes Krupp and Christian Rossow. 2018. TEEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts. In 27th USENIX Security Symposium."},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183440.3183495"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"e_1_3_2_2_53_1","volume-title":"A Comprehensive Survey of Upgradeable Smart Contract Patterns. arXiv preprint arXiv:2304.03405","author":"Meisami Sajad","year":"2023","unstructured":"Sajad Meisami and William Edward Bodell III. 2023. A Comprehensive Survey of Upgradeable Smart Contract Patterns. arXiv preprint arXiv:2304.03405 (2023)."},{"key":"e_1_3_2_2_54_1","unstructured":"Nick Mudge. 2018. Transparent Contract Standard. https:\/\/eips.ethereum.org\/EIPS\/eip-1538"},{"key":"e_1_3_2_2_55_1","unstructured":"Nick Mudge. 2020. Diamonds Multi-Facet Proxy. https:\/\/eips.ethereum.org\/EIPS\/eip-2535"},{"key":"e_1_3_2_2_56_1","unstructured":"Nick Mudge. 2020. Proxy Storage Slots. https:\/\/eips.ethereum.org\/EIPS\/eip-1967"},{"key":"e_1_3_2_2_57_1","unstructured":"MVHQ. 2022. A Proxy-Based USC Upgrades Four Times in a Row. https:\/\/etherscan.io\/txs?a=0x2809a8737477a534df65c4b4cae43d0365e52035&p=36"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380334"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274743"},{"key":"e_1_3_2_2_60_1","unstructured":"Openchain. 2023. Transaction Tracer. https:\/\/openchain.xyz\/trace"},{"key":"e_1_3_2_2_61_1","unstructured":"OpenSea. 2018. WyvernProxyRegistry. https:\/\/etherscan.io\/address\/0xa5409ec958c83c3f309868babaca7c86dcb077c1"},{"key":"e_1_3_2_2_62_1","unstructured":"OpenSea. 2023. OpenSea. https:\/\/opensea.io\/"},{"key":"e_1_3_2_2_63_1","unstructured":"OpenZeppelin. 2021. UUPSUpgradeable Vulnerability in OpenZeppelin Contracts. https:\/\/github.com\/OpenZeppelin\/openzeppelin-contracts-upgradeable\/security\/advisories\/GHSA-q4h9--46xg-m3x9"},{"key":"e_1_3_2_2_64_1","unstructured":"OpenZeppelin. 2023. Openzeppelin Contracts Upgradeable. https:\/\/github.com\/OpenZeppelin\/openzeppelin-contracts-upgradeable"},{"key":"e_1_3_2_2_65_1","unstructured":"OpenZeppelin. 2023. OwnableUpgradeable. https:\/\/github.com\/ OpenZeppelin\/openzeppelin-contracts-upgradeable\/blob\/master\/contracts\/access\/OwnableUpgradeable.sol"},{"key":"e_1_3_2_2_66_1","unstructured":"OpenZeppelin. 2023. UUPSUpgradeable. https:\/\/github.com\/OpenZeppelin\/openzeppelin-contracts-upgradeable\/blob\/master\/contracts\/proxy\/utils\/UUPSUpgradeable.sol"},{"key":"e_1_3_2_2_67_1","unstructured":"Martin Ortner and Shayan Eskandari. 2023. Smart Contract Sanctuary. (2023). https:\/\/github.com\/tintinweb\/smart-contract-sanctuary"},{"key":"e_1_3_2_2_68_1","unstructured":"OwnableDelegateProxy. 2018. OwnableDelegateProxy. https:\/\/etherscan.io\/address\/0x9b9c9daea6d5bf242fb1885b57d99a5a74433176"},{"key":"e_1_3_2_2_69_1","unstructured":"Santiago Palladino. 2020. The State of Smart Contract Upgrades. https:\/\/blog.openzeppelin.com\/the-state-of-smart-contract-upgrades"},{"key":"e_1_3_2_2_70_1","volume-title":"Verx: Safety Verification of Smart Contracts. In 2020 IEEE Symposium on Security and Privacy.","author":"Permenev Anton","year":"2020","unstructured":"Anton Permenev, Dimitar Dimitrov, Petar Tsankov, Dana Drachsler-Cohen, and Martin Vechev. 2020. Verx: Safety Verification of Smart Contracts. In 2020 IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833734"},{"key":"e_1_3_2_2_72_1","volume-title":"Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks. In 26th Annual Network and Distributed System Security Symposium.","author":"Rodler Michael","year":"2019","unstructured":"Michael Rodler, Wenting Li, Ghassan O Karame, and Lucas Davi. 2019. Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks. In 26th Annual Network and Distributed System Security Symposium."},{"key":"e_1_3_2_2_73_1","volume-title":"EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts. In 30th USENIX Security Symposium.","author":"Rodler Michael","year":"2021","unstructured":"Michael Rodler,Wenting Li, Ghassan O Karame, and Lucas Davi. 2021. EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts. In 30th USENIX Security Symposium."},{"key":"e_1_3_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER53432.2022.00122"},{"key":"e_1_3_2_2_75_1","volume-title":"VeriSmart: A Highly Precise Safety Verifier for Ethereum Smart Contracts. In 2020 IEEE Symposium on Security and Privacy.","author":"So Sunbeom","year":"2020","unstructured":"Sunbeom So, Myungho Lee, Jisu Park, Heejo Lee, and Hakjoo Oh. 2020. VeriSmart: A Highly Precise Safety Verifier for Ethereum Smart Contracts. In 2020 IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_2_76_1","unstructured":"Solidity. 2023. Solidity Programming Language. https:\/\/soliditylang.org\/"},{"key":"e_1_3_2_2_77_1","volume-title":"SmartPulse: Automated Checking of Temporal Properties in Smart Contracts. In 2021 IEEE Symposium on Security and Privacy.","author":"Stephens Jon","year":"2021","unstructured":"Jon Stephens, Kostas Ferles, Benjamin Mariano, Shuvendu Lahiri, and Isil Dillig. 2021. SmartPulse: Automated Checking of Temporal Properties in Smart Contracts. In 2021 IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_2_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3194113.3194115"},{"key":"e_1_3_2_2_79_1","volume-title":"Confuzzius: A Data Dependency-Aware Hybrid Fuzzer for Smart Contracts. In 2021 IEEE European Symposium on Security and Privacy.","author":"Torres Christof Ferreira","year":"2021","unstructured":"Christof Ferreira Torres, Antonio Ken Iannillo, Arthur Gervais, and Radu State. 2021. Confuzzius: A Data Dependency-Aware Hybrid Fuzzer for Smart Contracts. In 2021 IEEE European Symposium on Security and Privacy."},{"key":"e_1_3_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274737"},{"key":"e_1_3_2_2_81_1","unstructured":"Truffle. 2018. Truffle-code-utils. https:\/\/www.npmjs.com\/package\/truffle-codeutils"},{"key":"e_1_3_2_2_82_1","unstructured":"Uniswap. 2020. Introducing Token Lists. https:\/\/blog.uniswap.org\/token-lists"},{"key":"e_1_3_2_2_83_1","unstructured":"Uniswap. 2023. Uniswap. https:\/\/uniswap.org\/"},{"key":"e_1_3_2_2_84_1","unstructured":"Fabian Vogelsteller. 2015. Token Standard. https:\/\/eips.ethereum.org\/EIPS\/eip-20"},{"key":"e_1_3_2_2_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/3360615"},{"key":"e_1_3_2_2_86_1","unstructured":"Web3. 2023. getCode. https:\/\/web3js.readthedocs.io\/en\/v1.2.11\/web3-eth.html#getcode"},{"key":"e_1_3_2_2_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416553"},{"key":"e_1_3_2_2_88_1","volume-title":"xFuzz: Machine Learning Guided Cross-Contract Fuzzing","author":"Xue Yinxing","year":"2022","unstructured":"Yinxing Xue, Jiaming Ye, Wei Zhang, Jun Sun, Lei Ma, Haijun Wang, and Jianjun Zhao. 2022. xFuzz: Machine Learning Guided Cross-Contract Fuzzing. IEEE Transactions on Dependable and Secure Computing (2022)."},{"key":"e_1_3_2_2_89_1","unstructured":"YAcademy. 2022. Security Guide to Proxies. https:\/\/proxies.yacademy.dev\/pages\/security-guide\/"},{"key":"e_1_3_2_2_90_1","volume-title":"Smartshield: Automatic Smart Contract Protection Made Easy. In 2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering.","author":"Zhang Yuyao","year":"2020","unstructured":"Yuyao Zhang, Siqi Ma, Juanru Li, Kailai Li, Surya Nepal, and Dawu Gu. 2020. Smartshield: Automatic Smart Contract Protection Made Easy. In 2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering."}],"event":{"name":"WWW '24: The ACM Web Conference 2024","location":"Singapore Singapore","acronym":"WWW '24","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the ACM Web Conference 2024"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589334.3645640","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3589334.3645640","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T00:23:45Z","timestamp":1755822225000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589334.3645640"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,13]]},"references-count":90,"alternative-id":["10.1145\/3589334.3645640","10.1145\/3589334"],"URL":"https:\/\/doi.org\/10.1145\/3589334.3645640","relation":{},"subject":[],"published":{"date-parts":[[2024,5,13]]},"assertion":[{"value":"2024-05-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}