{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T05:20:08Z","timestamp":1774329608363,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":71,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,12]],"date-time":"2023-07-12T00:00:00Z","timestamp":1689120000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,12]]},"DOI":"10.1145\/3597926.3598064","type":"proceedings-article","created":{"date-parts":[[2023,7,13]],"date-time":"2023-07-13T20:12:53Z","timestamp":1689279173000},"page":"385-397","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Eunomia: Enabling User-Specified Fine-Grained Search in Symbolically Executing WebAssembly Binaries"],"prefix":"10.1145","author":[{"given":"Ningyu","family":"He","sequence":"first","affiliation":[{"name":"Peking University, China"}]},{"given":"Zhehao","family":"Zhao","sequence":"additional","affiliation":[{"name":"Peking University, China"}]},{"given":"Jikai","family":"Wang","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, China"}]},{"given":"Yubin","family":"Hu","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, China"}]},{"given":"Shengjian","family":"Guo","sequence":"additional","affiliation":[{"name":"Baidu Security, USA"}]},{"given":"Haoyu","family":"Wang","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, China"}]},{"given":"Guangtai","family":"Liang","sequence":"additional","affiliation":[{"name":"Huawei Cloud Computing Technologies, China"}]},{"given":"Ding","family":"Li","sequence":"additional","affiliation":[{"name":"Peking University, China"}]},{"given":"Xiangqun","family":"Chen","sequence":"additional","affiliation":[{"name":"Peking University, China"}]},{"given":"Yao","family":"Guo","sequence":"additional","affiliation":[{"name":"Peking University, China"}]}],"member":"320","published-online":{"date-parts":[[2023,7,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/390013.808479"},{"key":"e_1_3_2_1_2_1","unstructured":"altermarkive. 2022. Crypto miner on webpages. https:\/\/github.com\/altermarkive\/javascript-emscripten-bitcoin-miner \t\t\t\t  altermarkive. 2022. Crypto miner on webpages. https:\/\/github.com\/altermarkive\/javascript-emscripten-bitcoin-miner"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568293"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3182657"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7275"},{"key":"e_1_3_2_1_6_1","volume-title":"29th $USENIX$ Security Symposium ($USENIX$ Security 20). 199\u2013216.","author":"Brown Fraser","unstructured":"Fraser Brown , Deian Stefan , and Dawson Engler . 2020. Sys: a static\/symbolic tool for finding good bugs in good (browser) code . In 29th $USENIX$ Security Symposium ($USENIX$ Security 20). 199\u2013216. Fraser Brown, Deian Stefan, and Dawson Engler. 2020. Sys: a static\/symbolic tool for finding good bugs in good (browser) code. In 29th $USENIX$ Security Symposium ($USENIX$ Security 20). 199\u2013216."},{"key":"e_1_3_2_1_7_1","first-page":"209","article-title":"Klee: unassisted and automatic generation of high-coverage tests for complex systems programs","volume":"8","author":"Cadar Cristian","year":"2008","unstructured":"Cristian Cadar , Daniel Dunbar , and Dawson R Engler . 2008 . Klee: unassisted and automatic generation of high-coverage tests for complex systems programs .. In OSDI. 8 , 209 \u2013 224 . Cristian Cadar, Daniel Dunbar, and Dawson R Engler. 2008. Klee: unassisted and automatic generation of high-coverage tests for complex systems programs.. In OSDI. 8, 209\u2013224.","journal-title":"OSDI."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455518.1455522"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985995"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-72013-1_31"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00002"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 5th Workshop on Hot Topics in System Dependability (HotDep).","author":"Chipounov Vitaly","year":"2009","unstructured":"Vitaly Chipounov , Vlad Georgescu , Cristian Zamfir , and George Candea . 2009 . Selective symbolic execution . In Proceedings of the 5th Workshop on Hot Topics in System Dependability (HotDep). Vitaly Chipounov, Vlad Georgescu, Cristian Zamfir, and George Candea. 2009. Selective symbolic execution. In Proceedings of the 5th Workshop on Hot Topics in System Dependability (HotDep)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884843"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062533"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2499368.2451152"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48869-1_5"},{"key":"e_1_3_2_1_18_1","unstructured":"Dennis Dube and Jacques Camerini. 2002. MODBUS Application Protocol. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/draft-dube-modbus-applproto\/00\/ Work in Progress \t\t\t\t  Dennis Dube and Jacques Camerini. 2002. MODBUS Application Protocol. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/draft-dube-modbus-applproto\/00\/ Work in Progress"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572288"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273464"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390832.1390838"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3423211.3425680"},{"key":"e_1_3_2_1_23_1","unstructured":"golang. 2022. GitHub page of Snappy. https:\/\/github.com\/golang\/snappy \t\t\t\t  golang. 2022. GitHub page of Snappy. https:\/\/github.com\/golang\/snappy"},{"key":"e_1_3_2_1_24_1","unstructured":"golang. 2022. Home page of image package. https:\/\/pkg.go.dev\/image \t\t\t\t  golang. 2022. Home page of image package. https:\/\/pkg.go.dev\/image"},{"key":"e_1_3_2_1_25_1","unstructured":"golang. 2022. Implementation of sprintf in Go. https:\/\/github.com\/golang\/go\/blob\/master\/src\/fmt\/print.go \t\t\t\t  golang. 2022. Implementation of sprintf in Go. https:\/\/github.com\/golang\/go\/blob\/master\/src\/fmt\/print.go"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380428"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428215"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236028"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062363"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363230"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484813"},{"key":"e_1_3_2_1_32_1","volume-title":"30th $USENIX$ Security Symposium ($USENIX$ Security 21).","author":"He Ningyu","unstructured":"Ningyu He , Ruiyi Zhang , Haoyu Wang , Lei Wu , Xiapu Luo , Yao Guo , Ting Yu , and Xuxian Jiang . 2021. $EOSAFE$ : Security Analysis of $EOSIO$ Smart Contracts . In 30th $USENIX$ Security Symposium ($USENIX$ Security 21). Ningyu He, Ruiyi Zhang, Haoyu Wang, Lei Wu, Xiapu Luo, Yao Guo, Ting Yu, and Xuxian Jiang. 2021. $EOSAFE$: Security Analysis of $EOSIO$ Smart Contracts. In 30th $USENIX$ Security Symposium ($USENIX$ Security 21)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134050"},{"key":"e_1_3_2_1_34_1","unstructured":"Hexops. 2022. Game engine and graphics toolkit. https:\/\/github.com\/hexops\/mach \t\t\t\t  Hexops. 2022. Game engine and graphics toolkit. https:\/\/github.com\/hexops\/mach"},{"key":"e_1_3_2_1_35_1","unstructured":"Joerg Schulenburg. 2022. Official page of GOCR. https:\/\/jocr.sourceforge.net\/ \t\t\t\t  Joerg Schulenburg. 2022. Official page of GOCR. https:\/\/jocr.sourceforge.net\/"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24018"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"key":"e_1_3_2_1_38_1","volume-title":"Oblique: Accelerating Page Loads Using Symbolic Execution. In 18th $USENIX$ Symposium on Networked Systems Design and Implementation ($NSDI$ 21). 289\u2013302.","author":"Ko Ronny","year":"2021","unstructured":"Ronny Ko , James Mickens , Blake Loring , and Ravi Netravali . 2021 . Oblique: Accelerating Page Loads Using Symbolic Execution. In 18th $USENIX$ Symposium on Networked Systems Design and Implementation ($NSDI$ 21). 289\u2013302. Ronny Ko, James Mickens, Blake Loring, and Ravi Netravali. 2021. Oblique: Accelerating Page Loads Using Symbolic Execution. In 18th $USENIX$ Symposium on Networked Systems Design and Implementation ($NSDI$ 21). 289\u2013302."},{"key":"e_1_3_2_1_39_1","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems, Erika \u00c1brah\u00e1m and Klaus Havelund (Eds.)","author":"Kroening Daniel","unstructured":"Daniel Kroening and Michael Tautschnig . 2014. CBMC \u2013 C Bounded Model Checker . In Tools and Algorithms for the Construction and Analysis of Systems, Erika \u00c1brah\u00e1m and Klaus Havelund (Eds.) . Springer Berlin Heidelberg , Berlin, Heidelberg . 389\u2013391. isbn:978-3-642-54862-8 Daniel Kroening and Michael Tautschnig. 2014. CBMC \u2013 C Bounded Model Checker. In Tools and Algorithms for the Construction and Analysis of Systems, Erika \u00c1brah\u00e1m and Klaus Havelund (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg. 389\u2013391. isbn:978-3-642-54862-8"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2544173.2509553"},{"key":"e_1_3_2_1_41_1","unstructured":"Linux. 2022. Official page of dnstracer. https:\/\/linux.die.net\/man\/8\/dnstracer \t\t\t\t  Linux. 2022. Official page of dnstracer. https:\/\/linux.die.net\/man\/8\/dnstracer"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3488022"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23702-7_11"},{"key":"e_1_3_2_1_44_1","unstructured":"Mihai Maganu. 2022. WebAssembly is abused by e-criminals. https:\/\/www.crowdstrike.com\/blog\/ecriminals-increasingly-use-webassembly-to-hide-malware\/ \t\t\t\t  Mihai Maganu. 2022. WebAssembly is abused by e-criminals. https:\/\/www.crowdstrike.com\/blog\/ecriminals-increasingly-use-webassembly-to-hide-malware\/"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00133"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9111839"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00024"},{"key":"e_1_3_2_1_48_1","volume-title":"24th $USENIX$ Security Symposium ($USENIX$ Security 15). 49\u201364.","author":"Ramos David A","unstructured":"David A Ramos and Dawson Engler . 2015. Under-constrained symbolic execution: Correctness checking for real code . In 24th $USENIX$ Security Symposium ($USENIX$ Security 15). 49\u201364. David A Ramos and Dawson Engler. 2015. Under-constrained symbolic execution: Correctness checking for real code. In 24th $USENIX$ Security Symposium ($USENIX$ Security 15). 49\u201364."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.232226"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3471621.3471865"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409734"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101654"},{"key":"e_1_3_2_1_54_1","volume-title":"SMARTEST: Effectively Hunting Vulnerable Transaction Sequences in Smart Contracts through Language Model-Guided Symbolic Execution. In 30th $USENIX$ Security Symposium ($USENIX$ Security 21).","author":"So Sunbeom","year":"2021","unstructured":"Sunbeom So , Seongjoon Hong , and Hakjoo Oh . 2021 . SMARTEST: Effectively Hunting Vulnerable Transaction Sequences in Smart Contracts through Language Model-Guided Symbolic Execution. In 30th $USENIX$ Security Symposium ($USENIX$ Security 21). Sunbeom So, Seongjoon Hong, and Hakjoo Oh. 2021. SMARTEST: Effectively Hunting Vulnerable Transaction Sequences in Smart Contracts through Language Model-Guided Symbolic Execution. In 30th $USENIX$ Security Symposium ($USENIX$ Security 21)."},{"key":"e_1_3_2_1_55_1","unstructured":"srdja. 2022. Collections-C a library for data structures in C. https:\/\/github.com\/srdja\/Collections-C \t\t\t\t  srdja. 2022. Collections-C a library for data structures in C. https:\/\/github.com\/srdja\/Collections-C"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23368"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180251"},{"key":"e_1_3_2_1_58_1","unstructured":"Vladim\u00edr Vondru\u0161. 2022. Graphics middleware libraries. https:\/\/github.com\/mosra\/magnum \t\t\t\t  Vladim\u00edr Vondru\u0161. 2022. Graphics middleware libraries. https:\/\/github.com\/mosra\/magnum"},{"key":"e_1_3_2_1_59_1","unstructured":"w3reality. 2021. Multithreading library for Rust and WebAssembly. https:\/\/github.com\/w3reality\/wasm-mt \t\t\t\t  w3reality. 2021. Multithreading library for Rust and WebAssembly. https:\/\/github.com\/w3reality\/wasm-mt"},{"key":"e_1_3_2_1_60_1","volume-title":"WANA: Symbolic Execution of Wasm Bytecode for Cross-Platform Smart Contract Vulnerability Detection. arXiv preprint arXiv:2007.15510.","author":"Wang Dong","year":"2020","unstructured":"Dong Wang , Bo Jiang , and WK Chan . 2020 . WANA: Symbolic Execution of Wasm Bytecode for Cross-Platform Smart Contract Vulnerability Detection. arXiv preprint arXiv:2007.15510. Dong Wang, Bo Jiang, and WK Chan. 2020. WANA: Symbolic Execution of Wasm Bytecode for Cross-Platform Smart Contract Vulnerability Detection. arXiv preprint arXiv:2007.15510."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/SecDev.2017.14"},{"key":"e_1_3_2_1_62_1","unstructured":"WebAssembly. 2021. WebAssembly Official Site. https:\/\/webassembly.org\/ \t\t\t\t  WebAssembly. 2021. WebAssembly Official Site. https:\/\/webassembly.org\/"},{"key":"e_1_3_2_1_63_1","unstructured":"WebAssembly. 2022. A standard interface between WebAssembly and external environments. https:\/\/wasi.dev\/ \t\t\t\t  WebAssembly. 2022. A standard interface between WebAssembly and external environments. https:\/\/wasi.dev\/"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693084"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270315"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2866469"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/2338965.2336771"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.7"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29959-0_31"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2015.7102601"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2659751"}],"event":{"name":"ISSTA '23: 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Seattle WA USA","acronym":"ISSTA '23","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","AITO"]},"container-title":["Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597926.3598064","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3597926.3598064","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:42Z","timestamp":1750182522000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597926.3598064"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,12]]},"references-count":71,"alternative-id":["10.1145\/3597926.3598064","10.1145\/3597926"],"URL":"https:\/\/doi.org\/10.1145\/3597926.3598064","relation":{},"subject":[],"published":{"date-parts":[[2023,7,12]]},"assertion":[{"value":"2023-07-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}