{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T19:34:59Z","timestamp":1767900899821,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,12]],"date-time":"2023-07-12T00:00:00Z","timestamp":1689120000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["OAC- 2115167,DGE-2041960"],"award-info":[{"award-number":["OAC- 2115167,DGE-2041960"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"DARPA","award":["R00112120009 Coopera- tive Agreement"],"award-info":[{"award-number":["R00112120009 Coopera- tive Agreement"]}]},{"name":"Cisco","award":[""],"award-info":[{"award-number":[""]}]},{"name":"USHE Deep Technology Initiative Grant","award":[""],"award-info":[{"award-number":[""]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,12]]},"DOI":"10.1145\/3597926.3598132","type":"proceedings-article","created":{"date-parts":[[2023,7,13]],"date-time":"2023-07-13T20:12:53Z","timestamp":1689279173000},"page":"1244-1256","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Automated Generation of Security-Centric Descriptions for Smart Contract Bytecode"],"prefix":"10.1145","author":[{"given":"Yu","family":"Pan","sequence":"first","affiliation":[{"name":"University of Utah, USA"}]},{"given":"Zhichao","family":"Xu","sequence":"additional","affiliation":[{"name":"University of Utah, USA"}]},{"given":"Levi Taiji","family":"Li","sequence":"additional","affiliation":[{"name":"University of Utah, USA"}]},{"given":"Yunhe","family":"Yang","sequence":"additional","affiliation":[{"name":"University of Utah, USA"}]},{"given":"Mu","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Utah, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,7,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2020. Octopus: Security Analysis tool for Blockchain Smart Contracts. https: \/\/github.com\/quoscient\/octopus\/. ( 2020 ). \t\t\t\t  2020. Octopus: Security Analysis tool for Blockchain Smart Contracts. https: \/\/github.com\/quoscient\/octopus\/. ( 2020 )."},{"key":"e_1_3_2_1_2_1","unstructured":"2021. Slither the Solidity source analyzer. https:\/\/github.com\/crytic\/slither. ( 2021 ). \t\t\t\t  2021. Slither the Solidity source analyzer. https:\/\/github.com\/crytic\/slither. ( 2021 )."},{"key":"e_1_3_2_1_3_1","unstructured":"2021. The Ethereum Blockchain Explorer. https:\/\/etherscan.io\/. ( 2021 ). \t\t\t\t  2021. The Ethereum Blockchain Explorer. https:\/\/etherscan.io\/. ( 2021 )."},{"key":"e_1_3_2_1_4_1","unstructured":"2022. Compound. ( 2022 ). https:\/\/compound.finance\/ \t\t\t\t  2022. Compound. ( 2022 ). https:\/\/compound.finance\/"},{"key":"e_1_3_2_1_5_1","unstructured":"2022. Deep Graph Library. https:\/\/www.dgl.ai\/. ( 2022 ). \t\t\t\t  2022. Deep Graph Library. https:\/\/www.dgl.ai\/. ( 2022 )."},{"key":"e_1_3_2_1_6_1","unstructured":"2022. Discover collect and sell extraordinary NFTs. ( 2022 ). https:\/\/opensea.io\/ \t\t\t\t  2022. Discover collect and sell extraordinary NFTs. ( 2022 ). https:\/\/opensea.io\/"},{"key":"e_1_3_2_1_7_1","unstructured":"2022. Ethereum Dapps Ranking. ( 2022 ). https:\/\/www.dapp.com\/dapps\/ethereummarketplace?sort= 4&time=0&type=0 \t\t\t\t  2022. Ethereum Dapps Ranking. ( 2022 ). https:\/\/www.dapp.com\/dapps\/ethereummarketplace?sort= 4&time=0&type=0"},{"key":"e_1_3_2_1_8_1","unstructured":"2022. EY Blockchain Analyzer: Smart Contract & Token Review. ( 2022 ). https: \/\/www.ey.com\/en_us\/blockchain-platforms\/ smart-contract-token-review \t\t\t\t  2022. EY Blockchain Analyzer: Smart Contract & Token Review. ( 2022 ). https: \/\/www.ey.com\/en_us\/blockchain-platforms\/ smart-contract-token-review"},{"key":"e_1_3_2_1_9_1","unstructured":"2022. Oyente. ( 2022 ). https:\/\/github.com\/enzymefinance\/oyente \t\t\t\t  2022. Oyente. ( 2022 ). https:\/\/github.com\/enzymefinance\/oyente"},{"key":"e_1_3_2_1_10_1","unstructured":"2022. react-ethereum-lottery. https:\/\/github.com\/omarbastos\/react-ethereumlottery\/blob\/f519d5baaaad7b8e26c36bca1f45d7cb69bfa2d3\/src\/ethereum\/ \\contracts\/Lottery.sol. ( 2022 ). \t\t\t\t  2022. react-ethereum-lottery. https:\/\/github.com\/omarbastos\/react-ethereumlottery\/blob\/f519d5baaaad7b8e26c36bca1f45d7cb69bfa2d3\/src\/ethereum\/ \\contracts\/Lottery.sol. ( 2022 )."},{"key":"e_1_3_2_1_11_1","unstructured":"2022. Smart contract security service for Ethereum. ( 2022 ). https:\/\/mythx.io\/ \t\t\t\t  2022. Smart contract security service for Ethereum. ( 2022 ). https:\/\/mythx.io\/"},{"key":"e_1_3_2_1_12_1","unstructured":"2022. Software Assurance. ( 2022 ). https:\/\/www.trailofbits.com\/services\/softwareassurance \t\t\t\t  2022. Software Assurance. ( 2022 ). https:\/\/www.trailofbits.com\/services\/softwareassurance"},{"key":"e_1_3_2_1_13_1","unstructured":"2022. Trade NFTs Get Rewards. ( 2022 ). https:\/\/looksrare.org\/ \t\t\t\t  2022. Trade NFTs Get Rewards. ( 2022 ). https:\/\/looksrare.org\/"},{"key":"e_1_3_2_1_14_1","unstructured":"2022. TriggerZoo. https:\/\/github.com\/JordanSamhi\/TriggerZoo. ( 2022 ). \t\t\t\t  2022. TriggerZoo. https:\/\/github.com\/JordanSamhi\/TriggerZoo. ( 2022 )."},{"key":"e_1_3_2_1_15_1","unstructured":"2022. TSOpen. https:\/\/github.com\/JordanSamhi\/TSOpen. ( 2022 ). \t\t\t\t  2022. TSOpen. https:\/\/github.com\/JordanSamhi\/TSOpen. ( 2022 )."},{"key":"e_1_3_2_1_16_1","unstructured":"2022. UNISWAP PROTOCOL. ( 2022 ). https:\/\/uniswap.org\/ \t\t\t\t  2022. UNISWAP PROTOCOL. ( 2022 ). https:\/\/uniswap.org\/"},{"key":"e_1_3_2_1_17_1","unstructured":"2023. amazon mechanical turk. https:\/\/www.mturk.com\/mturk\/welcome. ( 2023 ). \t\t\t\t  2023. amazon mechanical turk. https:\/\/www.mturk.com\/mturk\/welcome. ( 2023 )."},{"key":"e_1_3_2_1_18_1","unstructured":"2023. Ethereum Signature Database. https:\/\/www.4byte.directory\/signatures\/. ( 2023 ). \t\t\t\t  2023. Ethereum Signature Database. https:\/\/www.4byte.directory\/signatures\/. ( 2023 )."},{"key":"e_1_3_2_1_19_1","unstructured":"2023. Function Selector. https:\/\/solidity-by-example.org\/function-selector\/. ( 2023 ). \t\t\t\t  2023. Function Selector. https:\/\/solidity-by-example.org\/function-selector\/. ( 2023 )."},{"key":"e_1_3_2_1_20_1","unstructured":"2023. Online Appendix. ( 2023 ). https:\/\/github.com\/Pypy233\/Tx2TXT\/blob\/ master\/appendix.pdf \t\t\t\t  2023. Online Appendix. ( 2023 ). https:\/\/github.com\/Pypy233\/Tx2TXT\/blob\/ master\/appendix.pdf"},{"key":"e_1_3_2_1_21_1","unstructured":"2023. Securify v2.0. ( 2023 ). https:\/\/github.com\/eth-sri\/ securify2 \t\t\t\t  2023. Securify v2.0. ( 2023 ). https:\/\/github.com\/eth-sri\/ securify2"},{"key":"e_1_3_2_1_22_1","volume-title":"AndroZoo: Collecting Millions of Android Apps for the Research Community. In 2016 IEEE\/ACM 13th Working Conference on Mining Software Repositories (MSR). 468-471","author":"Allix Kevin","year":"2016","unstructured":"Kevin Allix , Tegawend\u00e9 F. Bissyand\u00e9 , Jacques Klein , and Yves Le Traon . 2016 . AndroZoo: Collecting Millions of Android Apps for the Research Community. In 2016 IEEE\/ACM 13th Working Conference on Mining Software Repositories (MSR). 468-471 . Kevin Allix, Tegawend\u00e9 F. Bissyand\u00e9, Jacques Klein, and Yves Le Traon. 2016. AndroZoo: Collecting Millions of Android Apps for the Research Community. In 2016 IEEE\/ACM 13th Working Conference on Mining Software Repositories (MSR). 468-471."},{"key":"e_1_3_2_1_23_1","unstructured":"Antoine Bordes Nicolas Usunier Alberto Garcia-Duran Jason Weston and Oksana Yakhnenko. 2013. Translating embeddings for modeling multi-relational data. Advances in neural information processing systems 26 ( 2013 ). \t\t\t\t  Antoine Bordes Nicolas Usunier Alberto Garcia-Duran Jason Weston and Oksana Yakhnenko. 2013. Translating embeddings for modeling multi-relational data. Advances in neural information processing systems 26 ( 2013 )."},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the IEEE\/ACM International Conference on Automated Software Engineering (ASE'10)","author":"Raymond","unstructured":"Raymond P.L. Buse and Westley R. Weimer. 2010. Automatically Documenting Program Changes . In Proceedings of the IEEE\/ACM International Conference on Automated Software Engineering (ASE'10) . Raymond P.L. Buse and Westley R. Weimer. 2010. Automatically Documenting Program Changes. In Proceedings of the IEEE\/ACM International Conference on Automated Software Engineering (ASE'10)."},{"key":"e_1_3_2_1_25_1","volume-title":"SODA: A Generic Online Detection Framework for Smart Contracts. In 28th Annual Network and Distributed System Security Symposium, NDSS","author":"Chen Ting","year":"2021","unstructured":"Ting Chen , Rong Cao , Ting Li , Xiapu Luo , Guofei Gu , Yufei Zhang , Zhou Liao , Hang Zhu , Gang Chen , Zheyuan He , Yuxing Tang , Xiaodong Lin , and Xiaosong Zhang . 2021 . SODA: A Generic Online Detection Framework for Smart Contracts. In 28th Annual Network and Distributed System Security Symposium, NDSS 2021. Ting Chen, Rong Cao, Ting Li, Xiapu Luo, Guofei Gu, Yufei Zhang, Zhou Liao, Hang Zhu, Gang Chen, Zheyuan He, Yuxing Tang, Xiaodong Lin, and Xiaosong Zhang. 2021. SODA: A Generic Online Detection Framework for Smart Contracts. In 28th Annual Network and Distributed System Security Symposium, NDSS 2021."},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS'19)","author":"Chen Ting","year":"2019","unstructured":"Ting Chen , Yufei Zhang , Zihao Li , Xiapu Luo , Ting Wang , Rong Cao , Xiuzhuo Xiao , and Xiaosong Zhang . 2019 . TokenScope: Automatically Detecting Inconsistent Behaviors of Cryptocurrency Tokens in Ethereum . In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS'19) . Ting Chen, Yufei Zhang, Zihao Li, Xiapu Luo, Ting Wang, Rong Cao, Xiuzhuo Xiao, and Xiaosong Zhang. 2019. TokenScope: Automatically Detecting Inconsistent Behaviors of Cryptocurrency Tokens in Ethereum. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS'19)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2905760.2905763"},{"key":"e_1_3_2_1_28_1","unstructured":"Michael del Castillo. 2016. The DAO Attacked: Code Issue Leads to $60 Million Ether Theft. https:\/\/www.coindesk.com\/dao-attacked-code-issue-leads-60-million-ether-theft. ( 2016 ). \t\t\t\t  Michael del Castillo. 2016. The DAO Attacked: Code Issue Leads to $60 Million Ether Theft. https:\/\/www.coindesk.com\/dao-attacked-code-issue-leads-60-million-ether-theft. ( 2016 )."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557292"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978370"},{"key":"e_1_3_2_1_31_1","volume-title":"29th {USENIX} Security Symposium ({USENIX} Security 20 ).","author":"Frank Joel","unstructured":"Joel Frank , Cornelius Aschermann , and Thorsten Holz . 2020. {ETHBMC} : A Bounded Model Checker for Smart Contracts . In 29th {USENIX} Security Symposium ({USENIX} Security 20 ). Joel Frank, Cornelius Aschermann, and Thorsten Holz. 2020. {ETHBMC}: A Bounded Model Checker for Smart Contracts. In 29th {USENIX} Security Symposium ({USENIX} Security 20 )."},{"key":"e_1_3_2_1_32_1","volume-title":"TriggerScope: Towards Detecting Logic Bombs in Android Applications. In 2016 IEEE Symposium on Security and Privacy (Oakland).","author":"Fratantonio Y.","unstructured":"Y. Fratantonio , A. Bianchi , W. Robertson , E. Kirda , C. Kruegel , and G. Vigna . 2016 . TriggerScope: Towards Detecting Logic Bombs in Android Applications. In 2016 IEEE Symposium on Security and Privacy (Oakland). Y. Fratantonio, A. Bianchi, W. Robertson, E. Kirda, C. Kruegel, and G. Vigna. 2016. TriggerScope: Towards Detecting Logic Bombs in Android Applications. In 2016 IEEE Symposium on Security and Privacy (Oakland)."},{"key":"e_1_3_2_1_33_1","volume-title":"Procceedings of The 45th ACM SIGPLAN Symposium on Principles of Programming Languages (POPL 2018 ).","author":"Grossman Shelly","year":"2018","unstructured":"Shelly Grossman , Ittai Abraham , Guy Golan-Gueta , Yan Michalevsky , Noam Rinetzky , Mooly Sagiv , and Yoni Zohar . 2018 . Online Detection of Efectively Callback Free Objects with Applications to Smart Contracts . In Procceedings of The 45th ACM SIGPLAN Symposium on Principles of Programming Languages (POPL 2018 ). Shelly Grossman, Ittai Abraham, Guy Golan-Gueta, Yan Michalevsky, Noam Rinetzky, Mooly Sagiv, and Yoni Zohar. 2018. Online Detection of Efectively Callback Free Objects with Applications to Smart Contracts. In Procceedings of The 45th ACM SIGPLAN Symposium on Principles of Programming Languages (POPL 2018 )."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Jianjun Huang Xiangyu Zhang Lin Tan Peng Wang and Bin Liang. 2014. AsDroid: Detecting Stealthy Behaviors in Android Applications by User Interface and Program Behavior Contradiction (ICSE 2014 ). \t\t\t\t  Jianjun Huang Xiangyu Zhang Lin Tan Peng Wang and Bin Liang. 2014. AsDroid: Detecting Stealthy Behaviors in Android Applications by User Interface and Program Behavior Contradiction (ICSE 2014 ).","DOI":"10.1145\/2568225.2568301"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23082"},{"key":"e_1_3_2_1_36_1","unstructured":"Thomas N Kipf and Max Welling. 2016. Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907 ( 2016 ). \t\t\t\t  Thomas N Kipf and Max Welling. 2016. Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907 ( 2016 )."},{"key":"e_1_3_2_1_37_1","volume-title":"Proceedings of the 27th USENIX Conference on Security Symposium (USENIX Security'18)","author":"Krupp Johannes","year":"2018","unstructured":"Johannes Krupp and Christian Rossow . 2018 . TEETHER: Gnawing at Ethereum to Automatically Exploit Smart Contracts . In Proceedings of the 27th USENIX Conference on Security Symposium (USENIX Security'18) . Johannes Krupp and Christian Rossow. 2018. TEETHER: Gnawing at Ethereum to Automatically Exploit Smart Contracts. In Proceedings of the 27th USENIX Conference on Security Symposium (USENIX Security'18)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of the 2013 IEEE 21th International Conference on Program Comprehension (ICPC'13)","author":"Moreno Laura","unstructured":"Laura Moreno , Jairo Aponte , Giriprasad Sridhara , Andrian Marcus , Lori Pollock , and K. Vijay-Shanker . 2013. Automatic Generation of Natural Language Summaries for Java Classes . In Proceedings of the 2013 IEEE 21th International Conference on Program Comprehension (ICPC'13) . Laura Moreno, Jairo Aponte, Giriprasad Sridhara, Andrian Marcus, Lori Pollock, and K. Vijay-Shanker. 2013. Automatic Generation of Natural Language Summaries for Java Classes. In Proceedings of the 2013 IEEE 21th International Conference on Program Comprehension (ICPC'13)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274743"},{"key":"e_1_3_2_1_41_1","unstructured":"OpenAI. 2022. ChatGPT: Optimizing Language Models for Dialogue. https: \/\/openai.com\/blog\/chatgpt\/. ( 2022 ). \t\t\t\t  OpenAI. 2022. ChatGPT: Optimizing Language Models for Dialogue. https: \/\/openai.com\/blog\/chatgpt\/. ( 2022 )."},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of the 22nd USENIX Conference on Security (SEC'13)","author":"Pandita Rahul","year":"2013","unstructured":"Rahul Pandita , Xusheng Xiao , Wei Yang , William Enck , and Tao Xie . 2013 . WHYPER: Towards Automating Risk Assessment of Mobile Applications . In Proceedings of the 22nd USENIX Conference on Security (SEC'13) . Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, and Tao Xie. 2013. WHYPER: Towards Automating Risk Assessment of Mobile Applications. In Proceedings of the 22nd USENIX Conference on Security (SEC'13)."},{"key":"e_1_3_2_1_43_1","first-page":"1325","volume-title":"Smart Contract Vulnerabilities: Vulnerable Does Not Imply Exploited. In 30th USENIX Security Symposium (USENIX Security 21)","author":"Perez Daniel","year":"2021","unstructured":"Daniel Perez and Benjamin Livshits . 2021 . Smart Contract Vulnerabilities: Vulnerable Does Not Imply Exploited. In 30th USENIX Security Symposium (USENIX Security 21) . USENIX Association , 1325 - 1341 . https:\/\/www.usenix.org\/conference\/ usenixsecurity21\/presentation\/perez Daniel Perez and Benjamin Livshits. 2021. Smart Contract Vulnerabilities: Vulnerable Does Not Imply Exploited. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 1325-1341. https:\/\/www.usenix.org\/conference\/ usenixsecurity21\/presentation\/perez"},{"key":"e_1_3_2_1_44_1","volume-title":"VerX: Safety Verification of Smart Contracts. In 2020 IEEE Symposium on Security and Privacy (Oakland).","author":"Permenev Anton","year":"2020","unstructured":"Anton Permenev , Dimitar Dimitrov , Petar Tsankov , Dana Drachsler-Cohen , and Martin Vechev . 2020 . VerX: Safety Verification of Smart Contracts. In 2020 IEEE Symposium on Security and Privacy (Oakland). Anton Permenev, Dimitar Dimitrov, Petar Tsankov, Dana Drachsler-Cohen, and Martin Vechev. 2020. VerX: Safety Verification of Smart Contracts. In 2020 IEEE Symposium on Security and Privacy (Oakland)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660287"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23413"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Evgeniy Shishkin. 2019. Debugging Smart Contract's Business Logic Using Symbolic Model Checking. Programming and Computer Software 45 8 ( 2019 ) 590-599. \t\t\t\t  Evgeniy Shishkin. 2019. Debugging Smart Contract's Business Logic Using Symbolic Model Checking. Programming and Computer Software 45 8 ( 2019 ) 590-599.","DOI":"10.1134\/S0361768819080164"},{"key":"e_1_3_2_1_48_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 1361-1378. https:\/\/www.usenix.org\/ conference\/usenixsecurity21\/presentation\/so","author":"So Sunbeom","year":"2021","unstructured":"Sunbeom So , Seongjoon Hong , and Hakjoo Oh . 2021 . SmarTest: Efectively Hunting Vulnerable Transaction Sequences in Smart Contracts through Language Model-Guided Symbolic Execution . In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 1361-1378. https:\/\/www.usenix.org\/ conference\/usenixsecurity21\/presentation\/so Sunbeom So, Seongjoon Hong, and Hakjoo Oh. 2021. SmarTest: Efectively Hunting Vulnerable Transaction Sequences in Smart Contracts through Language Model-Guided Symbolic Execution. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 1361-1378. https:\/\/www.usenix.org\/ conference\/usenixsecurity21\/presentation\/so"},{"key":"e_1_3_2_1_49_1","volume-title":"VERISMART: A Highly Precise Safety Verifier for Ethereum Smart Contracts. In 2020 IEEE Symposium on Security and Privacy (Oakland).","author":"So Sunbeom","year":"2020","unstructured":"Sunbeom So , Myungho Lee , Jisu Park , Heejo Lee , and Hakjoo Oh . 2020 . VERISMART: A Highly Precise Safety Verifier for Ethereum Smart Contracts. In 2020 IEEE Symposium on Security and Privacy (Oakland). Sunbeom So, Myungho Lee, Jisu Park, Heejo Lee, and Hakjoo Oh. 2020. VERISMART: A Highly Precise Safety Verifier for Ethereum Smart Contracts. In 2020 IEEE Symposium on Security and Privacy (Oakland)."},{"key":"e_1_3_2_1_50_1","unstructured":"Solidity. 2022. Solidity. https:\/\/solidity.readthedocs. io\/en\/v0.6.1\/. ( 2022 ). \t\t\t\t  Solidity. 2022. Solidity. https:\/\/solidity.readthedocs. io\/en\/v0.6.1\/. ( 2022 )."},{"key":"e_1_3_2_1_51_1","volume-title":"Conventions in Solidity. https:\/\/docs.soliditylang. org\/en\/v0.8.17\/ assembly.html. ( 2023 ).","year":"2023","unstructured":"Solidity. 2023 . Conventions in Solidity. https:\/\/docs.soliditylang. org\/en\/v0.8.17\/ assembly.html. ( 2023 ). Solidity. 2023. Conventions in Solidity. https:\/\/docs.soliditylang. org\/en\/v0.8.17\/ assembly.html. ( 2023 )."},{"key":"e_1_3_2_1_52_1","volume-title":"Proceedings of the IEEE\/ACM International Conference on Automated Software Engineering (ASE'10)","author":"Sridhara Giriprasad","unstructured":"Giriprasad Sridhara , Emily Hill , Divya Muppaneni , Lori Pollock , and K. VijayShanker . 2010. Towards Automatically Generating Summary Comments for Java Methods . In Proceedings of the IEEE\/ACM International Conference on Automated Software Engineering (ASE'10) . Giriprasad Sridhara, Emily Hill, Divya Muppaneni, Lori Pollock, and K. VijayShanker. 2010. Towards Automatically Generating Summary Comments for Java Methods. In Proceedings of the IEEE\/ACM International Conference on Automated Software Engineering (ASE'10)."},{"key":"e_1_3_2_1_53_1","volume-title":"Proceedings of the 33rd International Conference on Software Engineering (ICSE'11)","author":"Sridhara Giriprasad","unstructured":"Giriprasad Sridhara , Lori Pollock , and K. Vijay-Shanker . 2011. Automatically Detecting and Describing High Level Actions Within Methods . In Proceedings of the 33rd International Conference on Software Engineering (ICSE'11) . Giriprasad Sridhara, Lori Pollock, and K. Vijay-Shanker. 2011. Automatically Detecting and Describing High Level Actions Within Methods. In Proceedings of the 33rd International Conference on Software Engineering (ICSE'11)."},{"key":"e_1_3_2_1_54_1","volume-title":"Proceedings of the 2011 IEEE 19th International Conference on Program Comprehension (ICPC'11)","author":"Sridhara Giriprasad","unstructured":"Giriprasad Sridhara , Lori Pollock , and K. Vijay-Shanker . 2011. Generating Parameter Comments and Integrating with Method Summaries . In Proceedings of the 2011 IEEE 19th International Conference on Program Comprehension (ICPC'11) . Giriprasad Sridhara, Lori Pollock, and K. Vijay-Shanker. 2011. Generating Parameter Comments and Integrating with Method Summaries. In Proceedings of the 2011 IEEE 19th International Conference on Program Comprehension (ICPC'11)."},{"key":"e_1_3_2_1_55_1","first-page":"1307","article-title":"Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications. In 30th USENIX Security Symposium (USENIX Security 21)","author":"Su Liya","year":"2021","unstructured":"Liya Su , Xinyue Shen , Xiangyu Du , Xiaojing Liao , XiaoFeng Wang , Luyi Xing , and Baoxu Liu . 2021 . Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications. In 30th USENIX Security Symposium (USENIX Security 21) . USENIX Association , 1307 - 1324 . https:\/\/www.usenix.org\/ conference\/usenixsecurity21\/presentation\/su Liya Su, Xinyue Shen, Xiangyu Du, Xiaojing Liao, XiaoFeng Wang, Luyi Xing, and Baoxu Liu. 2021. Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 1307-1324. https:\/\/www.usenix.org\/ conference\/usenixsecurity21\/presentation\/su","journal-title":"USENIX Association"},{"key":"e_1_3_2_1_56_1","unstructured":"SunBeomSo. 2022. VeriSmart-benchmarks. https:\/\/github.com\/kupl\/VeriSmartbenchmarks. ( 2022 ). \t\t\t\t  SunBeomSo. 2022. VeriSmart-benchmarks. https:\/\/github.com\/kupl\/VeriSmartbenchmarks. ( 2022 )."},{"key":"e_1_3_2_1_57_1","volume-title":"Proceedings of the 26th USENIX Conference on Security Symposium (SEC'17)","author":"Tian Yuan","year":"2017","unstructured":"Yuan Tian , Nan Zhang , Yueh-Hsun Lin , XiaoFeng Wang , Blase Ur , XianZheng Guo , and Patrick Tague . 2017 . Smartauth: User-Centered Authorization for the Internet of Things . In Proceedings of the 26th USENIX Conference on Security Symposium (SEC'17) . Yuan Tian, Nan Zhang, Yueh-Hsun Lin, XiaoFeng Wang, Blase Ur, XianZheng Guo, and Patrick Tague. 2017. Smartauth: User-Centered Authorization for the Internet of Things. In Proceedings of the 26th USENIX Conference on Security Symposium (SEC'17)."},{"key":"e_1_3_2_1_58_1","first-page":"1591","volume-title":"The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts. In 28th USENIX Security Symposium (USENIX Security 19)","author":"Torres Christof Ferreira","year":"2019","unstructured":"Christof Ferreira Torres , Mathis Steichen , and Radu State . 2019 . The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts. In 28th USENIX Security Symposium (USENIX Security 19) . USENIX Association, Santa Clara, CA , 1591 - 1607 . https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/ ferreira Christof Ferreira Torres, Mathis Steichen, and Radu State. 2019. The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 1591-1607. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/ ferreira"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243780"},{"key":"e_1_3_2_1_60_1","volume-title":"Formal specification and verification of smart contracts for Azure blockchain. arXiv preprint arXiv","author":"Wang Yuepeng","year":"1812","unstructured":"Yuepeng Wang , Shuvendu K Lahiri , Shuo Chen , Rong Pan , Isil Dillig , Cody Born , and Immad Naseer . 2018. Formal specification and verification of smart contracts for Azure blockchain. arXiv preprint arXiv : 1812 . 08829 ( 2018 ). Yuepeng Wang, Shuvendu K Lahiri, Shuo Chen, Rong Pan, Isil Dillig, Cody Born, and Immad Naseer. 2018. Formal specification and verification of smart contracts for Azure blockchain. arXiv preprint arXiv: 1812. 08829 ( 2018 )."},{"key":"e_1_3_2_1_61_1","article-title":"Benchmarking the capability of symbolic execution tools with logic bombs","volume":"17","author":"Xu Hui","year":"2018","unstructured":"Hui Xu , Zirui Zhao , Yangfan Zhou , and Michael R Lyu . 2018 . Benchmarking the capability of symbolic execution tools with logic bombs . IEEE Transactions on Dependable and Secure Computing 17 , 6 ( 2018 ), 1243-1256. Hui Xu, Zirui Zhao, Yangfan Zhou, and Michael R Lyu. 2018. Benchmarking the capability of symbolic execution tools with logic bombs. IEEE Transactions on Dependable and Secure Computing 17, 6 ( 2018 ), 1243-1256.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134018"},{"key":"e_1_3_2_1_63_1","volume-title":"DescribeCtx: Context-Aware Description Synthesis for Sensitive Behaviors in Mobile Apps. In 2022 IEEE\/ACM 44th International Conference on Software Engineering (ICSE).","author":"Yang Shao","year":"2022","unstructured":"Shao Yang , Yuehan Wang , Yuan Yao , Haoyu Wang , Yanfang Fanny Ye , and Xusheng Xiao . 2022 . DescribeCtx: Context-Aware Description Synthesis for Sensitive Behaviors in Mobile Apps. In 2022 IEEE\/ACM 44th International Conference on Software Engineering (ICSE). Shao Yang, Yuehan Wang, Yuan Yao, Haoyu Wang, Yanfang Fanny Ye, and Xusheng Xiao. 2022. DescribeCtx: Context-Aware Description Synthesis for Sensitive Behaviors in Mobile Apps. In 2022 IEEE\/ACM 44th International Conference on Software Engineering (ICSE)."},{"key":"e_1_3_2_1_64_1","volume-title":"Proceedings of the International Conference on Program Comprehension (ICPC'21)","author":"Yang Zhen","year":"2021","unstructured":"Zhen Yang , Jacky Keung , Xiao Yu , Xiaodong Gu , Zhengyuan Wei , Xiaoxue Ma , and Miao Zhang . 2021 . A Multi-Modal Transformer-based Code Summarization Approach for Smart Contracts . In Proceedings of the International Conference on Program Comprehension (ICPC'21) . Zhen Yang, Jacky Keung, Xiao Yu, Xiaodong Gu, Zhengyuan Wei, Xiaoxue Ma, and Miao Zhang. 2021. A Multi-Modal Transformer-based Code Summarization Approach for Smart Contracts. In Proceedings of the International Conference on Program Comprehension (ICPC'21)."},{"key":"e_1_3_2_1_65_1","article-title":"Toward automatically generating privacy policy for android apps","volume":"12","author":"Yu Le","year":"2016","unstructured":"Le Yu , Tao Zhang , Xiapu Luo , Lei Xue , and Henry Chang . 2016 . Toward automatically generating privacy policy for android apps . IEEE Transactions on Information Forensics and Security 12 , 4 ( 2016 ), 865-880. Le Yu, Tao Zhang, Xiapu Luo, Lei Xue, and Henry Chang. 2016. Toward automatically generating privacy policy for android apps. IEEE Transactions on Information Forensics and Security 12, 4 ( 2016 ), 865-880.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"e_1_3_2_1_66_1","volume-title":"Proceedings of the 22nd ACM Conference on Computer and Communications Security (CCS'15)","author":"Zhang Mu","year":"2015","unstructured":"Mu Zhang , Yue Duan , Qian Feng , and Heng Yin . 2015 . Towards Automatic Generation of Security-Centric Descriptions for Android Apps . In Proceedings of the 22nd ACM Conference on Computer and Communications Security (CCS'15) . Mu Zhang, Yue Duan, Qian Feng, and Heng Yin. 2015. Towards Automatic Generation of Security-Centric Descriptions for Android Apps. In Proceedings of the 22nd ACM Conference on Computer and Communications Security (CCS'15)."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"crossref","unstructured":"Received 2023-02-16; accepted 2023-05-03 \t\t\t\t  Received 2023-02-16; accepted 2023-05-03","DOI":"10.1055\/s-0043-1770751"}],"event":{"name":"ISSTA '23: 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Seattle WA USA","acronym":"ISSTA '23","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","AITO"]},"container-title":["Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597926.3598132","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3597926.3598132","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:43Z","timestamp":1750182523000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597926.3598132"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,12]]},"references-count":67,"alternative-id":["10.1145\/3597926.3598132","10.1145\/3597926"],"URL":"https:\/\/doi.org\/10.1145\/3597926.3598132","relation":{},"subject":[],"published":{"date-parts":[[2023,7,12]]},"assertion":[{"value":"2023-07-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}