{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T04:32:00Z","timestamp":1769747520268,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":73,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T00:00:00Z","timestamp":1701302400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Hong Kong RGC Projects","award":["PolyU15219319, PolyU15222320, PolyU15224121"],"award-info":[{"award-number":["PolyU15219319, PolyU15222320, PolyU15224121"]}]},{"name":"National Natural Science Foundation","award":["62202405"],"award-info":[{"award-number":["62202405"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,30]]},"DOI":"10.1145\/3611643.3616343","type":"proceedings-article","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T23:14:38Z","timestamp":1701386078000},"page":"745-757","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["DeepInfer: Deep Type Inference from Smart Contract Bytecode"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9886-0460","authenticated-orcid":false,"given":"Kunsong","family":"Zhao","sequence":"first","affiliation":[{"name":"Hong Kong Polytechnic University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4382-577X","authenticated-orcid":false,"given":"Zihao","family":"Li","sequence":"additional","affiliation":[{"name":"Hong Kong Polytechnic University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3453-0195","authenticated-orcid":false,"given":"Jianfeng","family":"Li","sequence":"additional","affiliation":[{"name":"Xi'an Jiaotong University, Xi'an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4807-2110","authenticated-orcid":false,"given":"He","family":"Ye","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9082-3208","authenticated-orcid":false,"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"Hong Kong Polytechnic University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9165-8331","authenticated-orcid":false,"given":"Ting","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]}],"member":"320","published-online":{"date-parts":[[2023,11,30]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3338999"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"crossref","unstructured":"Maher Alharby and Aad Van Moorsel. 2017. Blockchain-based smart contracts: A systematic mapping study. arXiv preprint arXiv:1710.06372.","DOI":"10.5121\/csit.2017.71011"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385997"},{"key":"e_1_3_2_2_4_1","unstructured":"Uri Alon Shaked Brody Omer Levy and Eran Yahav. 2018. code2seq: Generating sequences from structured representations of code. arXiv preprint arXiv:1808.01400."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-54455-3_28"},{"key":"e_1_3_2_2_6_1","unstructured":"Etherscan API. 2019. Etherscan documentation. https:\/\/docs.etherscan.io\/"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3182657"},{"key":"e_1_3_2_2_8_1","volume-title":"Scheduled sampling for sequence prediction with recurrent neural networks. Advances in Neural Information Processing Systems (NeurIPS), 28","author":"Bengio Samy","year":"2015","unstructured":"Samy Bengio, Oriol Vinyals, Navdeep Jaitly, and Noam Shazeer. 2015. Scheduled sampling for sequence prediction with recurrent neural networks. Advances in Neural Information Processing Systems (NeurIPS), 28 (2015)."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3078342"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2019.00137"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2019.8870156"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486401"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3345664"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460093"},{"key":"e_1_3_2_2_15_1","volume-title":"26th USENIX Security Symposium (USENIX Security). 99\u2013116","author":"Chua Zheng Leong","year":"2017","unstructured":"Zheng Leong Chua, Shiqi Shen, Prateek Saxena, and Zhenkai Liang. 2017. Neural nets can learn function type signatures from binaries. In 26th USENIX Security Symposium (USENIX Security). 99\u2013116."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC48266.2020.9169467"},{"key":"e_1_3_2_2_17_1","unstructured":"Eveem. 2019. Eveem. https:\/\/eveem.org"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"crossref","unstructured":"Michael Fr\u00f6wis and Rainer B\u00f6hme. 2017. In code we trust? In Data Privacy Management Cryptocurrencies and Blockchain Technology. 357\u2013372.","DOI":"10.1007\/978-3-319-67816-0_20"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32101-7_7"},{"key":"e_1_3_2_2_20_1","volume-title":"Proceedings of the 14th International Conference on Artificial Intelligence and Statistics. 315\u2013323","author":"Glorot Xavier","year":"2011","unstructured":"Xavier Glorot, Antoine Bordes, and Yoshua Bengio. 2011. Deep sparse rectifier neural networks. In Proceedings of the 14th International Conference on Artificial Intelligence and Statistics. 315\u2013323."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00120"},{"key":"e_1_3_2_2_22_1","unstructured":"Jiatao Gu Zhengdong Lu Hang Li and Victor OK Li. 2016. Incorporating copying mechanism in sequence-to-sequence learning. arXiv preprint arXiv:1603.06393."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363230"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","unstructured":"Zheyuan He Shuwei Song Yang Bai Xiapu Luo Ting Chen Wensheng Zhang Peng He Hongwei Li Xiaodong Lin and Xiaosong Zhang. 2022. TokenAware: Accurate and Efficient Bookkeeping Recognition for Token Smart Contracts. ACM Transactions on Software Engineering and Methodology (TOSEM) https:\/\/doi.org\/10.1145\/3560263 10.1145\/3560263","DOI":"10.1145\/3560263"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3050051"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238177"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00066"},{"key":"e_1_3_2_2_29_1","unstructured":"Jerome Kehrli. 2016. Blockchain 2.0-from bitcoin transactions to smart contract applications. Niceideas November. Available at: https:\/\/www. niceideas. ch\/roller2\/badtrash\/entry\/blockchain-2-0-frombitcoin."},{"key":"e_1_3_2_2_30_1","volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980.","author":"Kingma Diederik P","year":"2014","unstructured":"Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-020-01316-z"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3519939.3523449"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2023.3248280"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616590"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3508398.3511502"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678597"},{"key":"e_1_3_2_2_37_1","volume-title":"Proceedings of the 30th International Conference on Machine Learning (ICML). 30","author":"Maas Andrew L","year":"2013","unstructured":"Andrew L Maas, Awni Y Hannun, and Andrew Y Ng. 2013. Rectifier nonlinearities improve neural network acoustic models. In Proceedings of the 30th International Conference on Machine Learning (ICML). 30, 3."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00045"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2011.11.005"},{"key":"e_1_3_2_2_40_1","unstructured":"Tomas Mikolov Kai Chen Greg Corrado and Jeffrey Dean. 2013. Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510124"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3453483.3454057"},{"key":"e_1_3_2_2_43_1","unstructured":"MrLuit. 2019. EVM bytecode decompiler. https:\/\/github.com\/MrLuit\/evm"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939712"},{"key":"e_1_3_2_2_45_1","volume-title":"Ethereum: A Secure Decentralised Generalised Transaction Ledger. https:\/\/ethereum.github.io\/yellowpaper\/paper.pdf","author":"Paper Ethereum Yellow","year":"2022","unstructured":"Ethereum Yellow Paper. 2022. Ethereum: A Secure Decentralised Generalised Transaction Ledger. https:\/\/ethereum.github.io\/yellowpaper\/paper.pdf"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468607"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510038"},{"key":"e_1_3_2_2_48_1","unstructured":"PyTorch. 2022. PyTorch Documentation. https:\/\/pytorch.org\/docs\/stable\/index.html"},{"key":"e_1_3_2_2_49_1","first-page":"20601","article-title":"Unsupervised translation of programming languages","volume":"33","author":"Roziere Baptiste","year":"2020","unstructured":"Baptiste Roziere, Marie-Anne Lachaux, Lowik Chanussot, and Guillaume Lample. 2020. Unsupervised translation of programming languages. Advances in Neural Information Processing Systems (NeurIPS), 33 (2020), 20601\u201320611.","journal-title":"Advances in Neural Information Processing Systems (NeurIPS)"},{"key":"e_1_3_2_2_50_1","unstructured":"Samczsun. 2022. Abi-guesser. https:\/\/github.com\/samczsun\/abi-guesser"},{"key":"e_1_3_2_2_51_1","unstructured":"Abigail See Peter J Liu and Christopher D Manning. 2017. Get to the point: Summarization with pointer-generator networks. arXiv preprint arXiv:1704.04368."},{"key":"e_1_3_2_2_52_1","unstructured":"Solidity. 2022. Solidity Documentation v0.8.17. https:\/\/docs.soliditylang.org\/en\/v0.8.17"},{"key":"e_1_3_2_2_53_1","unstructured":"Contract ABI Specification. 2022. Solidity Documentation v0.8.17. https:\/\/docs.soliditylang.org\/en\/v0.8.17\/abi-spec.html"},{"key":"e_1_3_2_2_54_1","unstructured":"SWC-104. 2020. Unchecked call return value. https:\/\/swcregistry.io\/docs\/SWC-104"},{"key":"e_1_3_2_2_55_1","unstructured":"Transformers. 2022. Hugging Face Transformers. https:\/\/github.com\/huggingface\/transformers"},{"key":"e_1_3_2_2_56_1","unstructured":"Solidity v0.8.0. 2020. Solidity v0.8.0 Breaking Changes. https:\/\/docs.soliditylang.org\/en\/v0.8.17\/080-breaking-changes.html"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","unstructured":"Paper Artifact V1.0. 2023. Paper Artifact. https:\/\/doi.org\/10.6084\/m9.figshare.23993463.v1 10.6084\/m9.figshare.23993463.v1","DOI":"10.6084\/m9.figshare.23993463.v1"},{"key":"e_1_3_2_2_58_1","unstructured":"Vyper. 2022. Vyper Documentation. https:\/\/vyper.readthedocs.io\/en\/stable\/"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion52605.2021.00104"},{"key":"e_1_3_2_2_60_1","volume-title":"MAVEN: A massive general domain event detection dataset. arXiv preprint arXiv:2004.13590.","author":"Wang Xiaozhi","year":"2020","unstructured":"Xiaozhi Wang, Ziqi Wang, Xu Han, Wangyi Jiang, Rong Han, Zhiyuan Liu, Juanzi Li, Peng Li, Yankai Lin, and Jie Zhou. 2020. MAVEN: A massive general domain event detection dataset. arXiv preprint arXiv:2004.13590."},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/423"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491051"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3471165"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i05.6476"},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1"},{"key":"e_1_3_2_2_67_1","first-page":"3872","article-title":"Codecmr: Cross-modal retrieval for function-level binary source code matching","volume":"33","author":"Yu Zeping","year":"2020","unstructured":"Zeping Yu, Wenxin Zheng, Jiaqi Wang, Qiyi Tang, Sen Nie, and Shi Wu. 2020. Codecmr: Cross-modal retrieval for function-level binary source code matching. Advances in Neural Information Processing Systems (NeurIPS), 33 (2020), 3872\u20133883.","journal-title":"Advances in Neural Information Processing Systems (NeurIPS)"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380383"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"crossref","unstructured":"Wen Zhang Yang Feng Fandong Meng Di You and Qun Liu. 2019. Bridging the gap between training and inference for neural machine translation. arXiv preprint arXiv:1906.02448.","DOI":"10.18653\/v1\/P19-1426"},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534395"},{"key":"e_1_3_2_2_71_1","volume-title":"Devign: Effective vulnerability identification by learning comprehensive program semantics via graph neural networks. Advances in Neural Information Processing Systems (NeurIPS), 32","author":"Zhou Yaqin","year":"2019","unstructured":"Yaqin Zhou, Shangqing Liu, Jingkai Siow, Xiaoning Du, and Yang Liu. 2019. Devign: Effective vulnerability identification by learning comprehensive program semantics via graph neural networks. Advances in Neural Information Processing Systems (NeurIPS), 32 (2019)."},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/595"},{"key":"e_1_3_2_2_73_1","volume-title":"International Conference on Machine Learning (ICML). 1604\u20131612","author":"Zhu Xiaodan","year":"2015","unstructured":"Xiaodan Zhu, Parinaz Sobihani, and Hongyu Guo. 2015. Long short-term memory over recursive structures. In International Conference on Machine Learning (ICML). 1604\u20131612."}],"event":{"name":"ESEC\/FSE '23: 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"San Francisco CA USA","acronym":"ESEC\/FSE '23","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3616343","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3611643.3616343","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:11Z","timestamp":1750178171000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3616343"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,30]]},"references-count":73,"alternative-id":["10.1145\/3611643.3616343","10.1145\/3611643"],"URL":"https:\/\/doi.org\/10.1145\/3611643.3616343","relation":{},"subject":[],"published":{"date-parts":[[2023,11,30]]},"assertion":[{"value":"2023-11-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}