{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T14:49:29Z","timestamp":1776782969076,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,12]],"date-time":"2023-07-12T00:00:00Z","timestamp":1689120000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62002393"],"award-info":[{"award-number":["62002393"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key R&D Program of China","award":["2020YFB1006002"],"award-info":[{"award-number":["2020YFB1006002"]}]},{"name":"Guangdong Basic and Applied Basic Research Foundation","award":["2023A1515011336"],"award-info":[{"award-number":["2023A1515011336"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,12]]},"DOI":"10.1145\/3597926.3598124","type":"proceedings-article","created":{"date-parts":[[2023,7,13]],"date-time":"2023-07-13T20:12:53Z","timestamp":1689279173000},"page":"1144-1156","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["DeFiTainter: Detecting Price Manipulation Vulnerabilities in DeFi Protocols"],"prefix":"10.1145","author":[{"given":"Queping","family":"Kong","sequence":"first","affiliation":[{"name":"Sun Yat-sen University, China"}]},{"given":"Jiachi","family":"Chen","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, China"}]},{"given":"Yanlin","family":"Wang","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, China"}]},{"given":"Zigui","family":"Jiang","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, China"}]},{"given":"Zibin","family":"Zheng","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, China"}]}],"member":"320","published-online":{"date-parts":[[2023,7,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54455-6_8"},{"key":"e_1_3_2_1_2_1","volume-title":"Proxy Hunting: Understanding and Characterizing Proxy-based Upgradeable Smart Contracts in Blockchains. In 32th USENIX Security Symposium (USENIX Security 20)","author":"William E","year":"2023","unstructured":"William E Bodell III, Sajad Meisami , and Yue Duan . 2023 . Proxy Hunting: Understanding and Characterizing Proxy-based Upgradeable Smart Contracts in Blockchains. In 32th USENIX Security Symposium (USENIX Security 20) . William E Bodell III, Sajad Meisami, and Yue Duan. 2023. Proxy Hunting: Understanding and Characterizing Proxy-based Upgradeable Smart Contracts in Blockchains. In 32th USENIX Security Symposium (USENIX Security 20)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833721"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385990"},{"key":"e_1_3_2_1_5_1","volume-title":"https:\/\/bscscan.com\/address\/0x98cc2cd55ca2092034146ebd8eb043f9f976623a Accessed","year":"2023","unstructured":"BscScan. 2023. PYESwapRouter. https:\/\/bscscan.com\/address\/0x98cc2cd55ca2092034146ebd8eb043f9f976623a Accessed May , 2023 BscScan. 2023. PYESwapRouter. https:\/\/bscscan.com\/address\/0x98cc2cd55ca2092034146ebd8eb043f9f976623a Accessed May, 2023"},{"key":"e_1_3_2_1_6_1","volume-title":"Community Notice: Post Mortem Analysis. https:\/\/pancakebunny.medium.com\/hello-bunny-fam-a7bf0c7a07ba Accessed","year":"2021","unstructured":"Bunny. 2021 . Community Notice: Post Mortem Analysis. https:\/\/pancakebunny.medium.com\/hello-bunny-fam-a7bf0c7a07ba Accessed May, 2023 Bunny. 2021. Community Notice: Post Mortem Analysis. https:\/\/pancakebunny.medium.com\/hello-bunny-fam-a7bf0c7a07ba Accessed May, 2023"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3391195"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24449"},{"key":"e_1_3_2_1_9_1","volume-title":"Sidi Mohamed Beillahi, and Fan Long","author":"Chen Zhiyang","year":"2022","unstructured":"Zhiyang Chen , Sidi Mohamed Beillahi, and Fan Long . 2022 . FlashSyn: Flash Loan Attack Synthesis via Counter Example Driven Approximation . arXiv preprint arXiv:2206.10708, https:\/\/doi.org\/10.48550\/arXiv.2206.10708 10.48550\/arXiv.2206.10708 Zhiyang Chen, Sidi Mohamed Beillahi, and Fan Long. 2022. FlashSyn: Flash Loan Attack Synthesis via Counter Example Driven Approximation. arXiv preprint arXiv:2206.10708, https:\/\/doi.org\/10.48550\/arXiv.2206.10708"},{"key":"e_1_3_2_1_10_1","volume-title":"Charts And Market Capitalizations. https:\/\/coinmarketcap.com\/ Accessed","author":"Prices Cryptocurrency","year":"2023","unstructured":"CoinMarketCap. 2023. Cryptocurrency Prices , Charts And Market Capitalizations. https:\/\/coinmarketcap.com\/ Accessed May , 2023 CoinMarketCap. 2023. Cryptocurrency Prices, Charts And Market Capitalizations. https:\/\/coinmarketcap.com\/ Accessed May, 2023"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"e_1_3_2_1_12_1","volume-title":"https:\/\/defillama.com\/ Accessed","author":"Dashboard DeFi","year":"2023","unstructured":"DefiLlama. 2023. DeFi Dashboard . https:\/\/defillama.com\/ Accessed May , 2023 DefiLlama. 2023. DeFi Dashboard. https:\/\/defillama.com\/ Accessed May, 2023"},{"key":"e_1_3_2_1_13_1","volume-title":"https:\/\/ethereum.org\/zh\/developers\/docs\/standards\/tokens\/ Accessed","author":"Standards Token","year":"2023","unstructured":"Ethereum. 2023. Token Standards . https:\/\/ethereum.org\/zh\/developers\/docs\/standards\/tokens\/ Accessed May , 2023 Ethereum. 2023. Token Standards. https:\/\/ethereum.org\/zh\/developers\/docs\/standards\/tokens\/ Accessed May, 2023"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534378"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23089"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3527321"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3404366"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3158136"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2021.3092639"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238177"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23082"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330560"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385982"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534222"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3117966"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00133"},{"key":"e_1_3_2_1_28_1","first-page":"54","article-title":"Smashing ethereum smart contracts for fun and real profit","volume":"9","author":"Mueller Bernhard","year":"2018","unstructured":"Bernhard Mueller . 2018 . Smashing ethereum smart contracts for fun and real profit . HITB SECCONF Amsterdam , 9 (2018), 54 . Bernhard Mueller. 2018. Smashing ethereum smart contracts for fun and real profit. HITB SECCONF Amsterdam, 9 (2018), 54.","journal-title":"HITB SECCONF Amsterdam"},{"key":"e_1_3_2_1_29_1","volume-title":"2nd USENIX Conference on Web Application Development (WebApps 11)","author":"Papagiannis Ioannis","year":"2011","unstructured":"Ioannis Papagiannis , Matteo Migliavacca , and Peter Pietzuch . 2011 . $PHP$ Aspis: Using Partial Taint Tracking to Protect Against Injection Attacks . In 2nd USENIX Conference on Web Application Development (WebApps 11) . https:\/\/doi.org\/10.5555\/2002168.2002170 10.5555\/2002168.2002170 Ioannis Papagiannis, Matteo Migliavacca, and Peter Pietzuch. 2011. $PHP$ Aspis: Using Partial Taint Tracking to Protect Against Injection Attacks. In 2nd USENIX Conference on Web Application Development (WebApps 11). https:\/\/doi.org\/10.5555\/2002168.2002170"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00024"},{"key":"e_1_3_2_1_31_1","volume-title":"The Blockchain Development Platform. https:\/\/www.quicknode.com\/ Accessed","year":"2023","unstructured":"QuickNode. 2023. The Blockchain Development Platform. https:\/\/www.quicknode.com\/ Accessed May , 2023 QuickNode. 2023. The Blockchain Development Platform. https:\/\/www.quicknode.com\/ Accessed May, 2023"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23039"},{"key":"e_1_3_2_1_33_1","volume-title":"https:\/\/hacked.slowmist.io\/ Accessed","year":"2023","unstructured":"SlowMist. 2022. Hacked. https:\/\/hacked.slowmist.io\/ Accessed May , 2023 SlowMist. 2022. Hacked. https:\/\/hacked.slowmist.io\/ Accessed May, 2023"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00085"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3155693"},{"key":"e_1_3_2_1_36_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Torres Christof Ferreira","year":"2019","unstructured":"Christof Ferreira Torres and Mathis Steichen . 2019 . The art of the scam: Demystifying honeypots in ethereum smart contracts . In 28th USENIX Security Symposium (USENIX Security 19) . 1591\u20131607. https:\/\/doi.org\/10.48550\/arXiv.1902.06976 10.48550\/arXiv.1902.06976 Christof Ferreira Torres and Mathis Steichen. 2019. The art of the scam: Demystifying honeypots in ethereum smart contracts. In 28th USENIX Security Symposium (USENIX Security 19). 1591\u20131607. https:\/\/doi.org\/10.48550\/arXiv.1902.06976"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00127"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3417059"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.13328\/j.cnki.jos.005190"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3360615"},{"key":"e_1_3_2_1_41_1","volume-title":"Blockchain Hacks and Scams. https:\/\/www.web3rekt.com\/ Accessed","year":"2023","unstructured":"Web3rekt. 2022. Blockchain Hacks and Scams. https:\/\/www.web3rekt.com\/ Accessed May , 2023 Web3rekt. 2022. Blockchain Hacks and Scams. https:\/\/www.web3rekt.com\/ Accessed May, 2023"},{"key":"e_1_3_2_1_42_1","volume-title":"https:\/\/www.web3rekt.com\/ Accessed","year":"2023","unstructured":"Web3rekt. 2022. Web3.py 5.31.3 Documentation. https:\/\/www.web3rekt.com\/ Accessed May , 2023 Web3rekt. 2022. Web3.py 5.31.3 Documentation. https:\/\/www.web3rekt.com\/ Accessed May, 2023"},{"key":"e_1_3_2_1_43_1","volume-title":"Web3rekt Adds Data API. https:\/\/www.web3rekt.com\/post\/web3rekt-adds-data-api\/ Accessed","year":"2023","unstructured":"Web3rekt. 2022. Web3rekt Adds Data API. https:\/\/www.web3rekt.com\/post\/web3rekt-adds-data-api\/ Accessed May , 2023 Web3rekt. 2022. Web3rekt Adds Data API. https:\/\/www.web3rekt.com\/post\/web3rekt-adds-data-api\/ Accessed May, 2023"},{"key":"e_1_3_2_1_44_1","volume-title":"Sok: Decentralized finance (defi). arXiv preprint arXiv:2101.08778, https:\/\/doi.org\/10.48550\/arXiv.2101.08778","author":"Werner Sam M","year":"2021","unstructured":"Sam M Werner , Daniel Perez , Lewis Gudgeon , Ariah Klages-Mundt , Dominik Harz , and William J Knottenbelt . 2021 . Sok: Decentralized finance (defi). arXiv preprint arXiv:2101.08778, https:\/\/doi.org\/10.48550\/arXiv.2101.08778 10.48550\/arXiv.2101.08778 Sam M Werner, Daniel Perez, Lewis Gudgeon, Ariah Klages-Mundt, Dominik Harz, and William J Knottenbelt. 2021. Sok: Decentralized finance (defi). arXiv preprint arXiv:2101.08778, https:\/\/doi.org\/10.48550\/arXiv.2101.08778"},{"key":"e_1_3_2_1_45_1","volume-title":"Static single-assignment form. https:\/\/en.wikipedia.org\/wiki\/Static_single-assignment_form Accessed","year":"2023","unstructured":"Wikipedia. 2023. Static single-assignment form. https:\/\/en.wikipedia.org\/wiki\/Static_single-assignment_form Accessed May , 2023 Wikipedia. 2023. Static single-assignment form. https:\/\/en.wikipedia.org\/wiki\/Static_single-assignment_form Accessed May, 2023"},{"key":"e_1_3_2_1_46_1","volume-title":"Defiranger: Detecting price manipulation attacks on defi applications. arXiv preprint arXiv:2104.15068, https:\/\/doi.org\/10.48550\/arXiv.2104.15068","author":"Wu Siwei","year":"2021","unstructured":"Siwei Wu , Dabao Wang , Jianting He , Yajin Zhou , Lei Wu , Xingliang Yuan , Qinming He , and Kui Ren . 2021 . Defiranger: Detecting price manipulation attacks on defi applications. arXiv preprint arXiv:2104.15068, https:\/\/doi.org\/10.48550\/arXiv.2104.15068 10.48550\/arXiv.2104.15068 Siwei Wu, Dabao Wang, Jianting He, Yajin Zhou, Lei Wu, Xingliang Yuan, Qinming He, and Kui Ren. 2021. Defiranger: Detecting price manipulation attacks on defi applications. arXiv preprint arXiv:2104.15068, https:\/\/doi.org\/10.48550\/arXiv.2104.15068"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3417064"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416553"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3109563"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00040"},{"key":"e_1_3_2_1_51_1","volume-title":"Demystifying Exploitable Bugs in Smart Contracts. In 2023 IEEE\/ACM 45th International Conference on Software Engineering (ICSE).","author":"Zhang Zhuo","year":"2023","unstructured":"Zhuo Zhang , Brian Zhang , Wen Xu , and Zhiqiang Lin . 2023 . Demystifying Exploitable Bugs in Smart Contracts. In 2023 IEEE\/ACM 45th International Conference on Software Engineering (ICSE). Zhuo Zhang, Brian Zhang, Wen Xu, and Zhiqiang Lin. 2023. Demystifying Exploitable Bugs in Smart Contracts. In 2023 IEEE\/ACM 45th International Conference on Software Engineering (ICSE)."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.12.019"}],"event":{"name":"ISSTA '23: 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Seattle WA USA","acronym":"ISSTA '23","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","AITO"]},"container-title":["Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597926.3598124","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3597926.3598124","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:43Z","timestamp":1750182523000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597926.3598124"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,12]]},"references-count":52,"alternative-id":["10.1145\/3597926.3598124","10.1145\/3597926"],"URL":"https:\/\/doi.org\/10.1145\/3597926.3598124","relation":{},"subject":[],"published":{"date-parts":[[2023,7,12]]},"assertion":[{"value":"2023-07-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}