{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T02:14:20Z","timestamp":1775873660424,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,12]],"date-time":"2023-07-12T00:00:00Z","timestamp":1689120000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,12]]},"DOI":"10.1145\/3597926.3598111","type":"proceedings-article","created":{"date-parts":[[2023,7,13]],"date-time":"2023-07-13T20:12:53Z","timestamp":1689279173000},"page":"980-991","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["SmartState: Detecting State-Reverting Vulnerabilities in Smart Contracts via Fine-Grained State-Dependency Analysis"],"prefix":"10.1145","author":[{"given":"Zeqin","family":"Liao","sequence":"first","affiliation":[{"name":"Sun Yat-sen University, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sicheng","family":"Hao","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yuhong","family":"Nan","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zibin","family":"Zheng","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2023,7,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2018. How the winner got Fomo3D prize \u2014 A Detailed Explanation. Web:. https:\/\/medium.com\/coinmonks\/how-the-winner-got-fomo3d-prize-a-detailed-explanation-b30a69b7813f \t\t\t\t  2018. How the winner got Fomo3D prize \u2014 A Detailed Explanation. Web:. https:\/\/medium.com\/coinmonks\/how-the-winner-got-fomo3d-prize-a-detailed-explanation-b30a69b7813f"},{"key":"e_1_3_2_1_2_1","unstructured":"2023. BNB Chain. Web:. https:\/\/www.bnbchain.org\/ \t\t\t\t  2023. BNB Chain. Web:. https:\/\/www.bnbchain.org\/"},{"key":"e_1_3_2_1_3_1","unstructured":"2023. EOSIO. Web:. https:\/\/eos.io\/ \t\t\t\t  2023. EOSIO. Web:. https:\/\/eos.io\/"},{"key":"e_1_3_2_1_4_1","unstructured":"2023. Ethereum. Web:. https:\/\/www.ethereum.org\/ \t\t\t\t  2023. Ethereum. Web:. https:\/\/www.ethereum.org\/"},{"key":"e_1_3_2_1_5_1","unstructured":"2023. Ethereum accounts. Web:. https:\/\/ethereum.org\/en\/developers\/docs\/accounts\/ \t\t\t\t  2023. Ethereum accounts. Web:. https:\/\/ethereum.org\/en\/developers\/docs\/accounts\/"},{"key":"e_1_3_2_1_6_1","unstructured":"2023. Guide: Cybersecurity for GameFi Projects. Web:. https:\/\/hacken.io\/discover\/guide-cybersecurity-for-gamefi-projects\/#GameFi_hacks_are_increasing \t\t\t\t  2023. Guide: Cybersecurity for GameFi Projects. Web:. https:\/\/hacken.io\/discover\/guide-cybersecurity-for-gamefi-projects\/#GameFi_hacks_are_increasing"},{"key":"e_1_3_2_1_7_1","unstructured":"2023. Solidity documentation. Web:. https:\/\/docs.soliditylang.org\/en\/v0.8.10\/ \t\t\t\t  2023. Solidity documentation. Web:. https:\/\/docs.soliditylang.org\/en\/v0.8.10\/"},{"key":"e_1_3_2_1_8_1","unstructured":"2023. The sources of statistics and corresponding incidents. Web:. https:\/\/github.com\/InPlusLab\/Collection-for-real-world-SRV-attacks \t\t\t\t  2023. The sources of statistics and corresponding incidents. Web:. https:\/\/github.com\/InPlusLab\/Collection-for-real-world-SRV-attacks"},{"key":"e_1_3_2_1_9_1","unstructured":"2023. TRON. Web:. https:\/\/tron.network\/ \t\t\t\t  2023. TRON. Web:. https:\/\/tron.network\/"},{"key":"e_1_3_2_1_10_1","unstructured":"2023. WASM documentation. Web:. https:\/\/webassembly.org\/getting-started\/developers-guide\/ \t\t\t\t  2023. WASM documentation. Web:. https:\/\/webassembly.org\/getting-started\/developers-guide\/"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833721"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385990"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534218"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678888"},{"key":"e_1_3_2_1_15_1","unstructured":"ConsenSys. 2023. Mythril. Web:. https:\/\/github.com\/ConsenSys\/mythril-classic \t\t\t\t  ConsenSys. 2023. Mythril. Web:. https:\/\/github.com\/ConsenSys\/mythril-classic"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380364"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.2998527"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/WETSEB.2019.00008"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534378"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3276486"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3404366"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3469076"},{"key":"e_1_3_2_1_23_1","volume-title":"EOSAFE: Security Analysis of EOSIO Smart Contracts. In USENIX Security Symposium. 1271\u20131288","author":"He Ningyu","year":"2021","unstructured":"Ningyu He , Ruiyi Zhang , Haoyu Wang , Lei Wu , Xiapu Luo , Yao Guo , Ting Yu , and Xuxian Jiang . 2021 . EOSAFE: Security Analysis of EOSIO Smart Contracts. In USENIX Security Symposium. 1271\u20131288 . Ningyu He, Ruiyi Zhang, Haoyu Wang, Lei Wu, Xiapu Luo, Yao Guo, Ting Yu, and Xuxian Jiang. 2021. EOSAFE: Security Analysis of EOSIO Smart Contracts. In USENIX Security Symposium. 1271\u20131288."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3457913.3457920"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238177"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23082"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330560"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2623623"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534222"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678597"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380334"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274743"},{"key":"e_1_3_2_1_34_1","volume-title":"Sereum: Protecting existing smart contracts against re-entrancy attacks. arXiv preprint arXiv:1812.05934.","author":"Rodler Michael","year":"2018","unstructured":"Michael Rodler , Wenting Li , Ghassan O Karame , and Lucas Davi . 2018 . Sereum: Protecting existing smart contracts against re-entrancy attacks. arXiv preprint arXiv:1812.05934. Michael Rodler, Wenting Li, Ghassan O Karame, and Lucas Davi. 2018. Sereum: Protecting existing smart contracts against re-entrancy attacks. arXiv preprint arXiv:1812.05934."},{"key":"e_1_3_2_1_35_1","volume-title":"USENIX Security Symposium. 1361\u20131378","author":"So Sunbeom","year":"2021","unstructured":"Sunbeom So , Seongjoon Hong , and Hakjoo Oh . 2021 . SmarTest: Effectively Hunting Vulnerable Transaction Sequences in Smart Contracts through Language Model-Guided Symbolic Execution . In USENIX Security Symposium. 1361\u20131378 . Sunbeom So, Seongjoon Hong, and Hakjoo Oh. 2021. SmarTest: Effectively Hunting Vulnerable Transaction Sequences in Smart Contracts through Language Model-Guided Symbolic Execution. In USENIX Security Symposium. 1361\u20131378."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3560429"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3194113.3194115"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274737"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243780"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416553"},{"key":"e_1_3_2_1_41_1","volume-title":"29th USENIX Security Symposium, USENIX Security 2020","author":"Zhang Mengya","year":"2020","unstructured":"Mengya Zhang , Xiaokuan Zhang , Yinqian Zhang , and Zhiqiang Lin . 2020 . TXSPECTOR: Uncovering attacks in ethereum from transactions . In 29th USENIX Security Symposium, USENIX Security 2020 , August 12-14, 2020. Mengya Zhang, Xiaokuan Zhang, Yinqian Zhang, and Zhiqiang Lin. 2020. TXSPECTOR: Uncovering attacks in ethereum from transactions. In 29th USENIX Security Symposium, USENIX Security 2020, August 12-14, 2020."}],"event":{"name":"ISSTA '23: 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Seattle WA USA","acronym":"ISSTA '23","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","AITO"]},"container-title":["Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597926.3598111","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3597926.3598111","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:42Z","timestamp":1750182522000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597926.3598111"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,12]]},"references-count":41,"alternative-id":["10.1145\/3597926.3598111","10.1145\/3597926"],"URL":"https:\/\/doi.org\/10.1145\/3597926.3598111","relation":{},"subject":[],"published":{"date-parts":[[2023,7,12]]},"assertion":[{"value":"2023-07-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}