{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:23:27Z","timestamp":1774542207977,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":79,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,12]],"date-time":"2024-04-12T00:00:00Z","timestamp":1712880000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,12]]},"DOI":"10.1145\/3597503.3639128","type":"proceedings-article","created":{"date-parts":[[2024,4,12]],"date-time":"2024-04-12T16:43:26Z","timestamp":1712940206000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Towards Finding Accounting Errors in Smart Contracts"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-1047-2247","authenticated-orcid":false,"given":"Brian","family":"Zhang","sequence":"first","affiliation":[{"name":"Purdue University, West Lafayette, Indiana, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,4,12]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. Blockchain Technology Solutions. https:\/\/consensys.net\/"},{"key":"e_1_3_2_1_2_1","unstructured":"[n. d.]. Code4rena. https:\/\/code4rena.com"},{"key":"e_1_3_2_1_3_1","unstructured":"[n. d.]. DefiLlama. https:\/\/defillama.com\/"},{"key":"e_1_3_2_1_4_1","unstructured":"2022. ConsenSys\/mythril. https:\/\/github.com\/ConsenSys\/mythril"},{"key":"e_1_3_2_1_5_1","unstructured":"2023. Biconomy Project. https:\/\/github.com\/ZhangZhuoSJTU\/Web3Bugs\/tree\/main\/contracts\/97"},{"key":"e_1_3_2_1_6_1","unstructured":"2023. Coinmarketcap. https:\/\/coinmarketcap.com\/"},{"key":"e_1_3_2_1_7_1","unstructured":"2023. defillama\/categories. https:\/\/defillama.com\/categories"},{"key":"e_1_3_2_1_8_1","unstructured":"2023. Funding Fee. https:\/\/www.binance.com\/en\/blog\/futures\/what-are-funding-fees-in-binance-futures-6595842576313788144"},{"key":"e_1_3_2_1_9_1","unstructured":"2023. Perpetual Markets. https:\/\/milkroad.com\/funding\/perpetual-contracts\/"},{"key":"e_1_3_2_1_10_1","unstructured":"2023. Q2. https:\/\/cointelegraph.com\/news\/crypto-hacks-and-exploits-snatch-over-300m-in-q2-2023-report"},{"key":"e_1_3_2_1_11_1","unstructured":"2023. Supplementary Material. https:\/\/github.com\/NioTheFirst\/ScType\/blob\/main\/icse2024-paper1049-supplementary_material_upload.pdf"},{"key":"e_1_3_2_1_12_1","unstructured":"2023. Tigris Trade Project. https:\/\/github.com\/ZhangZhuoSJTU\/Web3Bugs\/tree\/main\/contracts\/192"},{"key":"e_1_3_2_1_13_1","unstructured":"2023. Tracer Project. https:\/\/github.com\/ZhangZhuoSJTU\/Web3Bugs\/tree\/main\/contracts\/16"},{"key":"e_1_3_2_1_14_1","unstructured":"2023. uranium. https:\/\/www.coindesk.com\/markets\/2021\/04\/28\/binance-chain-defi-exchange-uranium-finance-loses-50m-in-exploit\/"},{"key":"e_1_3_2_1_15_1","unstructured":"2023. Vader Protocol P1 Project. https:\/\/github.com\/ZhangZhuoSJTU\/Web3Bugs\/tree\/main\/contracts\/5\/vader-protocol"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385997"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833721"},{"key":"e_1_3_2_1_18_1","volume-title":"Vandal: A scalable security analysis framework for smart contracts. arXiv preprint arXiv:1809.03981","author":"Brent Lexi","year":"2018","unstructured":"Lexi Brent, Anton Jurisevic, Michael Kong, Eric Liu, Francois Gauthier, Vincent Gramoli, Ralph Holz, and Bernhard Scholz. 2018. Vandal: A scalable security analysis framework for smart contracts. arXiv preprint arXiv:1809.03981 (2018)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32409-4_18"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3488245","article-title":"Why Do Smart Contracts Self-Destruct? Investigating the Selfdestruct Function on Ethereum","volume":"31","author":"Chen Jiachi","year":"2020","unstructured":"Jiachi Chen, Xin Xia, David Lo, and John C. Grundy. 2020. Why Do Smart Contracts Self-Destruct? Investigating the Selfdestruct Function on Ethereum. ACM Transactions on Software Engineering and Methodology (TOSEM) 31 (2020), 1 -- 37.","journal-title":"ACM Transactions on Software Engineering and Methodology (TOSEM)"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.2989002"},{"key":"e_1_3_2_1_22_1","volume-title":"Maintenance-related concerns for post-deployed Ethereum smart contract development: issues, techniques, and future challenges. Empirical Software Engineering 26","author":"Chen Jiachi","year":"2021","unstructured":"Jiachi Chen, Xin Xia, D. Lo, John C. Grundy, and Xiaohu Yang. 2021. Maintenance-related concerns for post-deployed Ethereum smart contract development: issues, techniques, and future challenges. Empirical Software Engineering 26 (2021)."},{"key":"e_1_3_2_1_23_1","volume-title":"Under-optimized smart contracts devour your money","author":"Chen Ting","unstructured":"Ting Chen, Xiaoqi Li, Xiapu Luo, and Xiaosong Zhang. 2017. Under-optimized smart contracts devour your money. In SANER. IEEE Computer Society, 442--446."},{"key":"e_1_3_2_1_24_1","volume-title":"SMARTIAN: Enhancing smart contract fuzzing with static and dynamic data-flow analyses","author":"Choi Jaeseung","year":"2021","unstructured":"Jaeseung Choi, Doyeon Kim, Soomin Kim, Gustavo Grieco, Alex Groce, and Sang Kil Cha. 2021. SMARTIAN: Enhancing smart contract fuzzing with static and dynamic data-flow analyses. In ASE. IEEE."},{"key":"e_1_3_2_1_25_1","volume-title":"Classification of Smart Contract Bugs Using the NIST Bugs Framework","author":"Dingman Wesley","unstructured":"Wesley Dingman, Aviel Cohen, Nick Ferrara, Adam Lynch, Patrick Jasinski, Paul E. Black, and Lin Deng. 2019. Classification of Smart Contract Bugs Using the NIST Bugs Framework. In SERA. IEEE, 116--123."},{"key":"e_1_3_2_1_26_1","volume-title":"WETSEB@ICSE","author":"Feist Josselin","unstructured":"Josselin Feist, Gustavo Grieco, and Alex Groce. 2019. Slither: a static analysis framework for smart contracts. In WETSEB@ICSE. IEEE \/ ACM."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3276486"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Gustavo Grieco Will Song Artur Cygan Josselin Feist and Alex Groce. 2020. Echidna: effective usable and fast fuzzing for smart contracts. In ISSTA. ACM 557--560.","DOI":"10.1145\/3395363.3404366"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Alex Groce and Gustavo Grieco. 2021. echidna-parade: a tool for diverse multicore smart contract fuzzing. In ISSTA. ACM 658--661.","DOI":"10.1145\/3460319.3469076"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3158136"},{"key":"e_1_3_2_1_31_1","volume-title":"International Symposium on Software Testing and Analysis.","author":"Guo Philip J.","unstructured":"Philip J. Guo, Jeff H. Perkins, Stephen McCamant, and Michael D. Ernst. 2006. Dynamic inference of abstract types. In International Symposium on Software Testing and Analysis."},{"key":"e_1_3_2_1_32_1","volume-title":"VSTTE (Lecture Notes in Computer Science","volume":"179","author":"Hajdu \u00c1kos","year":"2019","unstructured":"\u00c1kos Hajdu and Dejan Jovanovic. 2019. solc-verify: A Modular Verifier for Solidity Smart Contracts. In VSTTE (Lecture Notes in Computer Science, Vol. 12031). Springer, 161--179."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070517"},{"key":"e_1_3_2_1_34_1","volume-title":"Vechev","author":"He Jingxuan","year":"2019","unstructured":"Jingxuan He, Mislav Balunovic, Nodar Ambroladze, Petar Tsankov, and Martin T. Vechev. 2019. Learning to Fuzz from Symbolic Execution with Application to Smart Contracts. In CCS. ACM, 531--548."},{"key":"e_1_3_2_1_35_1","volume-title":"Smart contract vulnerability detection model based on multi-task learning. Sensors","author":"Huang Jing","year":"2022","unstructured":"Jing Huang, Kuo Zhou, Ao Xiong, and Dongmeng Li. 2022. Smart contract vulnerability detection model based on multi-task learning. Sensors (2022)."},{"key":"e_1_3_2_1_36_1","volume-title":"Contractfuzzer: Fuzzing smart contracts for vulnerability detection","author":"Jiang Bo","year":"2018","unstructured":"Bo Jiang, Ye Liu, and Wing Kwong Chan. 2018. Contractfuzzer: Fuzzing smart contracts for vulnerability detection. In ASE. IEEE."},{"key":"e_1_3_2_1_37_1","volume-title":"Semantic Understanding of Smart Contracts: Executable Operational Semantics of Solidity. 2020 IEEE Symposium on Security and Privacy (SP)","author":"Jiao Jiao","year":"2020","unstructured":"Jiao Jiao, Shuanglong Kan, Shang-Wei Lin, David San\u00e1n, Yang Liu, and Jun Sun. 2020. Semantic Understanding of Smart Contracts: Executable Operational Semantics of Solidity. 2020 IEEE Symposium on Security and Privacy (SP) (2020), 1695--1712."},{"key":"e_1_3_2_1_38_1","volume-title":"A Generalized Formal Semantic Framework for Smart Contracts. Fundamental Approaches to Software Engineering 12076","author":"Jiao Jiao","year":"2020","unstructured":"Jiao Jiao, Shang-Wei Lin, and Jun Sun. 2020. A Generalized Formal Semantic Framework for Smart Contracts. Fundamental Approaches to Software Engineering 12076 (2020), 75 -- 96."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Sukrit Kalra Seep Goel Mohan Dhawan and Subodh Sharma. 2018. Zeus: analyzing safety of smart contracts.. In NDSS.","DOI":"10.14722\/ndss.2018.23082"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/359488.359501"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236035"},{"key":"e_1_3_2_1_42_1","volume-title":"Dimension Types. In European Symposium on Programming.","author":"Kennedy Andrew J.","year":"1994","unstructured":"Andrew J. Kennedy. 1994. Dimension Types. In European Symposium on Programming."},{"key":"e_1_3_2_1_43_1","volume-title":"USENIX Security Symposium. USENIX Association, 1317--1333","author":"Krupp Johannes","year":"2018","unstructured":"Johannes Krupp and Christian Rossow. 2018. teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts. In USENIX Security Symposium. USENIX Association, 1317--1333."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/QRS57517.2022.00018"},{"key":"e_1_3_2_1_45_1","volume-title":"ICSE-Companion","author":"Liu Chao","unstructured":"Chao Liu, Han Liu, Zhao Cao, Zhong Chen, Bangdao Chen, and Bill Roscoe. 2018. Reguard: finding reentrancy bugs in smart contracts. In ICSE-Companion. IEEE."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3559512"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3559539"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534372"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409740"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542485"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"e_1_3_2_1_52_1","volume-title":"Manticore: A user-friendly symbolic execution framework for binaries and smart contracts","author":"Mossberg Mark","year":"2019","unstructured":"Mark Mossberg, Felipe Manzano, Eric Hennenfent, Alex Groce, Gustavo Grieco, Josselin Feist, Trent Brunson, and Artem Dinaburg. 2019. Manticore: A user-friendly symbolic execution framework for binaries and smart contracts. In ASE. IEEE."},{"key":"e_1_3_2_1_53_1","volume-title":"The derived demand curve for a productive factor and the industry supply curve. Oxford Economic Papers 16, 2","author":"Muth Richard F","year":"1964","unstructured":"Richard F Muth. 1964. The derived demand curve for a productive factor and the industry supply curve. Oxford Economic Papers 16, 2 (1964)."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"crossref","unstructured":"Tai D. Nguyen Long H. Pham Jun Sun Yun Lin and Quang Tran Minh. 2020. sFuzz: an efficient adaptive fuzzer for solidity smart contracts. In ICSE. ACM 778--788.","DOI":"10.1145\/3377811.3380334"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"crossref","unstructured":"Ivica Nikolic Aashish Kolluri Ilya Sergey Prateek Saxena and Aquinas Hobor. 2018. Finding The Greedy Prodigal and Suicidal Contracts at Scale. In ACSAC. ACM 653--663.","DOI":"10.1145\/3274694.3274743"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3092703.3092722"},{"key":"e_1_3_2_1_57_1","volume-title":"USENIX Security Symposium.","author":"Perez Daniel","year":"2021","unstructured":"Daniel Perez and Benjamin Livshits. 2021. Smart Contract Vulnerabilities: Vulnerable Does Not Imply Exploited.. In USENIX Security Symposium."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.3156"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2775051.2677009"},{"key":"e_1_3_2_1_60_1","volume-title":"Sereum: Protecting existing smart contracts against re-entrancy attacks. arXiv preprint arXiv:1812.05934","author":"Rodler Michael","year":"2018","unstructured":"Michael Rodler, Wenting Li, Ghassan O Karame, and Lucas Davi. 2018. Sereum: Protecting existing smart contracts against re-entrancy attacks. arXiv preprint arXiv:1812.05934 (2018)."},{"key":"e_1_3_2_1_61_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"So Sunbeom","year":"2021","unstructured":"Sunbeom So, Seongjoon Hong, and Hakjoo Oh. 2021. SmarTest: Effectively Hunting Vulnerable Transaction Sequences in Smart Contracts through Language Model-Guided Symbolic Execution. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association."},{"key":"e_1_3_2_1_62_1","volume-title":"VERISMART: A Highly Precise Safety Verifier for Ethereum Smart Contracts. In IEEE Symposium on Security and Privacy. IEEE, 1678--1694","author":"So Sunbeom","year":"2020","unstructured":"Sunbeom So, Myungho Lee, Jisu Park, Heejo Lee, and Hakjoo Oh. 2020. VERISMART: A Highly Precise Safety Verifier for Ethereum Smart Contracts. In IEEE Symposium on Security and Privacy. IEEE, 1678--1694."},{"key":"e_1_3_2_1_63_1","volume-title":"SolType: Refinement Types for Solidity. arXiv preprint arXiv:2110.00677","author":"Tan Bryan","year":"2021","unstructured":"Bryan Tan, Benjamin Mariano, Shuvendu Lahiri, Isil Dillig, and Yu Feng. 2021. SolType: Refinement Types for Solidity. arXiv preprint arXiv:2110.00677 (2021)."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3498665"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"crossref","unstructured":"Sergei Tikhomirov Ekaterina Voskresenskaya Ivan Ivanitskiy Ramil Takhaviev Evgeny Marchenko and Yaroslav Alexandrov. 2018. SmartCheck: Static Analysis of Ethereum Smart Contracts. In WETSEB@ICSE. ACM 9--16.","DOI":"10.1145\/3194113.3194115"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3464421"},{"key":"e_1_3_2_1_67_1","volume-title":"Arthur Gervais, and Radu State.","author":"Torres Christof Ferreira","year":"2021","unstructured":"Christof Ferreira Torres, Antonio Ken Iannillo, Arthur Gervais, and Radu State. 2021. ConFuzzius: A Data Dependency-Aware Hybrid Fuzzer for Smart Contracts. In EuroS&P. IEEE, 103--119."},{"key":"e_1_3_2_1_68_1","volume-title":"Dana Drachsler-Cohen, Arthur Gervais, Florian B\u00fcnzli, and Martin T. Vechev.","author":"Tsankov Petar","year":"2018","unstructured":"Petar Tsankov, Andrei Marian Dan, Dana Drachsler-Cohen, Arthur Gervais, Florian B\u00fcnzli, and Martin T. Vechev. 2018. Securify: Practical Security Analysis of Smart Contracts. In CCS. ACM, 67--82."},{"key":"e_1_3_2_1_69_1","volume-title":"Vultron: catching vulnerable smart contracts once and for all","author":"Wang Haijun","unstructured":"Haijun Wang, Yi Li, Shang-Wei Lin, Lei Ma, and Yang Liu. 2019. Vultron: catching vulnerable smart contracts once and for all. In ICSE-NIER. IEEE."},{"key":"e_1_3_2_1_70_1","volume-title":"Oracle-supported dynamic exploit generation for smart contracts","author":"Wang Haijun","year":"2020","unstructured":"Haijun Wang, Ye Liu, Yi Li, Shang-Wei Lin, Cyrille Artho, Lei Ma, and Yang Liu. 2020. Oracle-supported dynamic exploit generation for smart contracts. IEEE Transactions on Dependable and Secure Computing (2020)."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3360615"},{"key":"e_1_3_2_1_72_1","volume-title":"VSTTE (Lecture Notes in Computer Science","volume":"106","author":"Wang Yuepeng","year":"2019","unstructured":"Yuepeng Wang, Shuvendu K. Lahiri, Shuo Chen, Rong Pan, Isil Dillig, Cody Born, Immad Naseer, and Kostas Ferles. 2019. Formal Verification of Workflow Policies for Smart Contracts in Azure Blockchain. In VSTTE (Lecture Notes in Computer Science, Vol. 12031). Springer, 87--106."},{"key":"e_1_3_2_1_73_1","volume-title":"MAR: A Dynamic Symbol Execution Detection Method for Smart Contract Reentry Vulnerability. In International Conference on Blockchain and Trustworthy Systems. Springer.","author":"Wang Zexu","year":"2021","unstructured":"Zexu Wang, Bin Wen, Ziqiang Luo, and Shaojie Liu. 2021. MAR: A Dynamic Symbol Execution Detection Method for Smart Contract Reentry Vulnerability. In International Conference on Blockchain and Trustworthy Systems. Springer."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"crossref","unstructured":"Valentin W\u00fcstholz and Maria Christakis. 2020. Harvey: a greybox fuzzer for smart contracts. In ESEC\/SIGSOFT FSE. ACM 1398--1409.","DOI":"10.1145\/3368089.3417064"},{"key":"e_1_3_2_1_75_1","volume-title":"xFuzz: Machine Learning Guided Cross-Contract Fuzzing","author":"Xue Yinxing","year":"2022","unstructured":"Yinxing Xue, Jiaming Ye, Wei Zhang, Jun Sun, Lei Ma, Haijun Wang, and Jianjun Zhao. 2022. xFuzz: Machine Learning Guided Cross-Contract Fuzzing. IEEE Transactions on Dependable and Secure Computing (2022)."},{"key":"e_1_3_2_1_76_1","volume-title":"A Framework and DataSet for Bugs in Ethereum Smart Contracts","author":"Zhang Pengcheng","unstructured":"Pengcheng Zhang, Feng Xiao, and Xiapu Luo. 2020. A Framework and DataSet for Bugs in Ethereum Smart Contracts. In ICSME. IEEE, 139--150."},{"key":"e_1_3_2_1_77_1","first-page":"3630","article-title":"Combatting Front-Running in Smart Contracts: Attack Mining, Benchmark Construction and Vulnerability Detector Evaluation","volume":"49","author":"Zhang Wuqi","year":"2022","unstructured":"Wuqi Zhang, Lili Wei, S. C. Cheung, Yepang Liu, Shuqing Li, Luanqi Liu, and Michael R. Lyu. 2022. Combatting Front-Running in Smart Contracts: Attack Mining, Benchmark Construction and Vulnerability Detector Evaluation. IEEE Transactions on Software Engineering 49 (2022), 3630--3646.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"e_1_3_2_1_78_1","volume-title":"Demystifying Exploitable Bugs in Smart Contracts. 2023 IEEE\/ACM 45th International Conference on Software Engineering (ICSE)","author":"Zhang Zhuo","year":"2023","unstructured":"Zhuo Zhang, Brian Zhang, Wen Xu, and Zhiqiang Lin. 2023. Demystifying Exploitable Bugs in Smart Contracts. 2023 IEEE\/ACM 45th International Conference on Software Engineering (ICSE) (2023), 615--627."},{"key":"e_1_3_2_1_79_1","volume-title":"Security assurance for smart contract","author":"Zhou Ence","unstructured":"Ence Zhou, Song Hua, Bingfeng Pi, Jun Sun, Yashihide Nomura, Kazuhiro Yamashita, and Hidetoshi Kurihara. 2018. Security assurance for smart contract. In NTMS. IEEE."}],"event":{"name":"ICSE '24: IEEE\/ACM 46th International Conference on Software Engineering","location":"Lisbon Portugal","acronym":"ICSE '24","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS","Faculty of Engineering of University of Porto"]},"container-title":["Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597503.3639128","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3597503.3639128","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:49:12Z","timestamp":1750286952000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597503.3639128"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,12]]},"references-count":79,"alternative-id":["10.1145\/3597503.3639128","10.1145\/3597503"],"URL":"https:\/\/doi.org\/10.1145\/3597503.3639128","relation":{},"subject":[],"published":{"date-parts":[[2024,4,12]]},"assertion":[{"value":"2024-04-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}