{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T15:46:33Z","timestamp":1777131993532,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T00:00:00Z","timestamp":1688947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,10]]},"DOI":"10.1145\/3594556.3594618","type":"proceedings-article","created":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T21:34:46Z","timestamp":1694554486000},"page":"132-139","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Smart Contract Symbol Execution Vulnerability Detection Method Based on CFG Path Pruning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6575-1954","authenticated-orcid":false,"given":"Yichuan","family":"Wang","sequence":"first","affiliation":[{"name":"Xi'an University of technology, School of Computer Science and Engineering, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-5323-9519","authenticated-orcid":false,"given":"Jingjing","family":"Zhao","sequence":"additional","affiliation":[{"name":"Xi'an University of technology, School of Computer Science and Engineering, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1759-6678","authenticated-orcid":false,"given":"Yaling","family":"Zhang","sequence":"additional","affiliation":[{"name":"Xi'an University of technology, School of Computer Science and Engineering, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6394-0492","authenticated-orcid":false,"given":"Xinhong","family":"Hei","sequence":"additional","affiliation":[{"name":"Xi'an University of technology, School of Computer Science and Engineering, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5925-5743","authenticated-orcid":false,"given":"Lei","family":"Zhu","sequence":"additional","affiliation":[{"name":"Xi'an University of technology, School of Computer Science and Engineering, China"}]}],"member":"320","published-online":{"date-parts":[[2023,9,12]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Szabo N. 2018. Smart Contracts : Building Blocks for Digital Markets. Szabo N. 2018. Smart Contracts : Building Blocks for Digital Markets."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243780"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering (ASE '18)","author":"Bo Jiang Ye Liu","unstructured":"Bo Jiang , Ye Liu , and W. K. Chan . 2018. ContractFuzzer: fuzzing smart contracts for vulnerability detection . In Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering (ASE '18) . ACM Press, New York, NY, USA, 259\u2013269. https:\/\/doi.org\/10.1145\/3238147.3238177 10.1145\/3238147.3238177 Bo Jiang, Ye Liu, and W. K. Chan. 2018. ContractFuzzer: fuzzing smart contracts for vulnerability detection. In Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering (ASE '18). ACM Press, New York, NY, USA, 259\u2013269. https:\/\/doi.org\/10.1145\/3238147.3238177"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC\/FSE","author":"Maria Christakis","year":"2020","unstructured":"Valentin W\u00fcstholz and Maria Christakis . 2020 . Harvey: a greybox fuzzer for smart contracts . In Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC\/FSE 2020). ACM Press, New York, NY, USA, 1398\u20131409. https:\/\/doi.org\/10.1145\/3368089.3417064 10.1145\/3368089.3417064 Valentin W\u00fcstholz and Maria Christakis. 2020. Harvey: a greybox fuzzer for smart contracts. In Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC\/FSE 2020). ACM Press, New York, NY, USA, 1398\u20131409. https:\/\/doi.org\/10.1145\/3368089.3417064"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380334"},{"key":"e_1_3_2_1_6_1","volume-title":"Runtime Verification: 16th International Conference, RV 2016, Madrid, Spain, September 23\u201330, 2016, Proceedings 7. 46-67","author":"Daian P.","unstructured":"Daian , P. , Guth , D., Hathhorn , C. , Li , Y. , Pek , E. , Saxena , M. , ... and Ro\u015fu , G . 2016. Runtime verification at work: A tutorial . In Runtime Verification: 16th International Conference, RV 2016, Madrid, Spain, September 23\u201330, 2016, Proceedings 7. 46-67 . https:\/\/doi.org\/10.1007\/978-3-319-46982-9_5 10.1007\/978-3-319-46982-9_5 Daian, P., Guth, D., Hathhorn, C., Li, Y., Pek, E., Saxena, M., ... and Ro\u015fu, G. 2016. Runtime verification at work: A tutorial. In Runtime Verification: 16th International Conference, RV 2016, Madrid, Spain, September 23\u201330, 2016, Proceedings 7. 46-67. https:\/\/doi.org\/10.1007\/978-3-319-46982-9_5"},{"key":"e_1_3_2_1_7_1","volume-title":"2018 IEEE 31st Computer Security Foundations Symposium (CSF). IEEE","author":"Hildenbrandt E.","unstructured":"Hildenbrandt , E. , Saxena , M., Rodrigues , N. , Zhu , X. , Daian , P. , Guth , D. , ... and Rosu , G . 2018. Kevm: A complete formal semantics of the ethereum virtual machine . In 2018 IEEE 31st Computer Security Foundations Symposium (CSF). IEEE , 2018: 204-217. https:\/\/doi.org\/10.1109\/csf.2018.00022 10.1109\/csf.2018.00022 Hildenbrandt, E., Saxena, M., Rodrigues, N., Zhu, X., Daian, P., Guth, D., ... and Rosu, G. 2018. Kevm: A complete formal semantics of the ethereum virtual machine. In 2018 IEEE 31st Computer Security Foundations Symposium (CSF). IEEE, 2018: 204-217. https:\/\/doi.org\/10.1109\/csf.2018.00022"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering (ASE '18)","author":"Han Liu Chao Liu","year":"2018","unstructured":"Han Liu , Chao Liu , Wenqi Zhao , Yu Jiang , and Jiaguang Sun . 2018 . S-gram: towards semantic-aware security auditing for Ethereum smart contracts . In Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering (ASE '18) . ACM Press, New York, NY, USA, 814\u2013819. https:\/\/doi.org\/10.1145\/3238147.3240728 10.1145\/3238147.3240728 Han Liu, Chao Liu, Wenqi Zhao, Yu Jiang, and Jiaguang Sun. 2018. S-gram: towards semantic-aware security auditing for Ethereum smart contracts. In Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering (ASE '18). ACM Press, New York, NY, USA, 814\u2013819. https:\/\/doi.org\/10.1145\/3238147.3240728"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"e_1_3_2_1_10_1","volume-title":"Mythril-Reversing and bug hunting framework for the Ethereum blockchain. https:\/\/github.com\/bmueller\/mythril\/","author":"Mueller","year":"2017","unstructured":"B. Mueller . Mythril-Reversing and bug hunting framework for the Ethereum blockchain. https:\/\/github.com\/bmueller\/mythril\/ , 2017 . B. Mueller. Mythril-Reversing and bug hunting framework for the Ethereum blockchain. https:\/\/github.com\/bmueller\/mythril\/, 2017."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","first-page":"1186","DOI":"10.1109\/ASE.2019.00133","volume-title":"2019 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE). IEEE","author":"Mossberg M.","year":"2019","unstructured":"Mossberg , M. , Manzano , F., Hennenfent , E. , Groce , A. , Grieco , G. , Feist , J. , ... and Dinaburg , A . 2019. Manticore: A user-friendly symbolic execution framework for binaries and smart contracts . In 2019 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE). IEEE , San Diego, CA, USA , 1186 - 1189 . https:\/\/doi.org\/10.1109\/ase. 2019 .00133 10.1109\/ase.2019.00133 Mossberg, M., Manzano, F., Hennenfent, E., Groce, A., Grieco, G., Feist, J., ... and Dinaburg, A. 2019. Manticore: A user-friendly symbolic execution framework for binaries and smart contracts. In 2019 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE). IEEE, San Diego, CA, USA, 1186-1189. https:\/\/doi.org\/10.1109\/ase.2019.00133"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274743"},{"key":"e_1_3_2_1_13_1","first-page":"1325","article-title":"Smart Contract Vulnerabilities: Vulnerable Does Not Imply Exploited","volume":"2021","author":"Perez Daniel","year":"2021","unstructured":"Perez , Daniel , and Benjamin Livshits . 2021 \" Smart Contract Vulnerabilities: Vulnerable Does Not Imply Exploited .\" USENIX Security Symposium. 2021 : 1325 - 1341 . https:\/\/doi.org\/10.48550\/arXiv.1902.06710 10.48550\/arXiv.1902.06710 Perez, Daniel, and Benjamin Livshits. 2021 \"Smart Contract Vulnerabilities: Vulnerable Does Not Imply Exploited.\" USENIX Security Symposium. 2021: 1325-1341. https:\/\/doi.org\/10.48550\/arXiv.1902.06710","journal-title":"USENIX Security Symposium."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00024"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering (ASE '20)","author":"Ferreira Pedro Cruz","year":"2021","unstructured":"Jo\u00e3o F. Ferreira , Pedro Cruz , Thomas Durieux , and Rui Abreu . 2021 . SmartBugs: a framework to analyze solidity smart contracts . In Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering (ASE '20) . ACM Press, New York, NY, USA, 1349\u20131352. https:\/\/doi.org\/10.1145\/3324884.3415298 10.1145\/3324884.3415298 Jo\u00e3o F. Ferreira, Pedro Cruz, Thomas Durieux, and Rui Abreu. 2021. SmartBugs: a framework to analyze solidity smart contracts. In Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering (ASE '20). ACM Press, New York, NY, USA, 1349\u20131352. https:\/\/doi.org\/10.1145\/3324884.3415298"},{"key":"e_1_3_2_1_16_1","first-page":"1","article-title":"Zeus: analyzing safety of smart contracts","volume":"2018","author":"Kalra S.","year":"2018","unstructured":"Kalra , S. , Goel , S., Dhawan , M. , and Sharma , S. 2018 . Zeus: analyzing safety of smart contracts . In Ndss. 2018 : 1 - 12 . https:\/\/doi.org\/10.14722\/ndss.2018.23082 10.14722\/ndss.2018.23082 Kalra, S., Goel, S., Dhawan, M., and Sharma, S. 2018. Zeus: analyzing safety of smart contracts. In Ndss. 2018: 1-12. https:\/\/doi.org\/10.14722\/ndss.2018.23082","journal-title":"Ndss."}],"event":{"name":"ASIA CCS '23: ACM Asia Conference on Computer and Communications Security","location":"Melbourne VIC Australia","acronym":"ASIA CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3594556.3594618","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3594556.3594618","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:07Z","timestamp":1750183747000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3594556.3594618"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,10]]},"references-count":16,"alternative-id":["10.1145\/3594556.3594618","10.1145\/3594556"],"URL":"https:\/\/doi.org\/10.1145\/3594556.3594618","relation":{},"subject":[],"published":{"date-parts":[[2023,7,10]]},"assertion":[{"value":"2023-09-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}