{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T06:16:28Z","timestamp":1770531388961,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Google Faculty Research Award"},{"DOI":"10.13039\/501100006374","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["1908494"],"award-info":[{"award-number":["1908494"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006374","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["N66001-22-2-4037"],"award-info":[{"award-number":["N66001-22-2-4037"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Ethereum Foundation Academic Award"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3690293","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"1001-1015","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["FORAY: Towards Effective Attack Synthesis against Deep Logical Vulnerabilities in DeFi Protocols"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3517-445X","authenticated-orcid":false,"given":"Hongbo","family":"Wen","sequence":"first","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, California, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7027-8302","authenticated-orcid":false,"given":"Hanzhi","family":"Liu","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, California, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4847-9183","authenticated-orcid":false,"given":"Jiaxin","family":"Song","sequence":"additional","affiliation":[{"name":"University of Illinois Urbana-Champaign, Champaign, Illinois, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6494-3126","authenticated-orcid":false,"given":"Yanju","family":"Chen","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, California, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6890-4503","authenticated-orcid":false,"given":"Wenbo","family":"Guo","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, California, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1000-1229","authenticated-orcid":false,"given":"Yu","family":"Feng","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, California, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"1inch. 2023. One-stop access to decentralized finance. https:\/\/1inch.io\/."},{"key":"e_1_3_2_1_2_1","volume-title":"Halmos: A symbolic testing tool for EVM smart contracts. https:\/\/github.com\/a16z\/halmos.","year":"2023","unstructured":"a16z. 2023. Halmos: A symbolic testing tool for EVM smart contracts. https:\/\/github.com\/a16z\/halmos."},{"key":"e_1_3_2_1_3_1","volume-title":"Aave: Open Source Liquidity Protocol. https:\/\/aave.com\/.","author":"AAVE.","year":"2023","unstructured":"AAVE. 2023. Aave: Open Source Liquidity Protocol. https:\/\/aave.com\/."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428277"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503275"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2560217.2560219"},{"key":"e_1_3_2_1_7_1","unstructured":"Binance Smart Chain Developers. 2017. Binance Smart Chain Whitepaper. https:\/\/github.com\/bnb-chain\/whitepaper\/blob\/master\/WHITEPAPER.md."},{"key":"e_1_3_2_1_8_1","volume-title":"Stephane Sezer, et al.","author":"Blackshear Sam","year":"2019","unstructured":"Sam Blackshear, Evan Cheng, David L Dill, Victor Gao, Ben Maurer, Todd Nowacki, Alistair Pott, Shaz Qadeer, Dario Russi Rain, Stephane Sezer, et al. 2019. Move: A language with programmable resources. Libra Assoc (2019), 1."},{"key":"e_1_3_2_1_9_1","unstructured":"blockworks. 2023. Mango Markets Mangled by Oracle Manipulation for 112M. https:\/\/blockworks.co\/news\/mango-markets-mangled-by-oracle-manipulation-for-112m\/."},{"key":"e_1_3_2_1_10_1","volume-title":"SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds. In 2022 IEEE Symposium on Security and Privacy (SP).","author":"Bose Priyanka","year":"2022","unstructured":"Priyanka Bose, Dipanjan Das, Yanju Chen, Yu Feng, and Christopher Kruegel. 2022. SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds. In 2022 IEEE Symposium on Security and Privacy (SP)."},{"key":"e_1_3_2_1_11_1","volume-title":"Security Report","author":"K.","year":"2023","unstructured":"CertiK. 2023. Hack3d: The Web3 Security Report 2023. https:\/\/www.certik.com\/resources\/blog\/7BokMhPUgffqEvyvXgHNaq-hack3d-the-web3-security-report-2023. Accessed: 2024-07--24."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.31"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP57164.2023.00028"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3345664"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503222.3507751"},{"key":"e_1_3_2_1_16_1","volume-title":"Program Synthesis Using Deduction-Guided Reinforcement Learning","author":"Chen Yanju","unstructured":"Yanju Chen, Chenglong Wang, Osbert Bastani, Isil Dillig, and Yu Feng. 2020. Program Synthesis Using Deduction-Guided Reinforcement Learning. In Computer Aided Verification, Shuvendu K Lahiri and Chao Wang (Eds.). Springer International Publishing, Cham, 587--610."},{"key":"e_1_3_2_1_17_1","volume-title":"Sidi Mohamed Beillahi, and Fan Long","author":"Chen Zhiyang","year":"2022","unstructured":"Zhiyang Chen, Sidi Mohamed Beillahi, and Fan Long. 2022. FlashSyn: Flash Loan Attack Synthesis via Counter Example Driven Approximation. arxiv: 2206.10708 [cs.PL]"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678888"},{"key":"e_1_3_2_1_19_1","volume-title":"Mythril: Security Analysis Tool for Ethereum Smart Contracts. https:\/\/github.com\/ConsenSys\/mythril.","year":"2020","unstructured":"ConsenSys. 2020. Mythril: Security Analysis Tool for Ethereum Smart Contracts. https:\/\/github.com\/ConsenSys\/mythril."},{"key":"e_1_3_2_1_20_1","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"de Moura Leonardo","unstructured":"Leonardo de Moura and Nikolaj Bj\u00f8rner. 2008. Z3: An Efficient SMT Solver. In Tools and Algorithms for the Construction and Analysis of Systems. Springer Berlin Heidelberg, 337--340."},{"key":"e_1_3_2_1_21_1","unstructured":"decrypt. 2023. Zunami Protocol Loses Over 2.1 Million in Price Manipulation Hack. https:\/\/decrypt.co\/152366\/zunami-protocol-curve-finance-hack\/."},{"key":"e_1_3_2_1_22_1","unstructured":"DeFi Prime. 2023. Ethereum DeFi Ecosystem. https:\/\/defiprime.com\/ethereum"},{"key":"e_1_3_2_1_23_1","unstructured":"DeFiHackLabs. 2023. DeFi Hacks Reproduce - Foundry. https:\/\/github.com\/SunWeb3Sec\/DeFiHackLabs."},{"key":"e_1_3_2_1_24_1","unstructured":"defillama. 2023. DefiLlama - DeFi Dashboard. https:\/\/defillama.com\/."},{"key":"e_1_3_2_1_25_1","unstructured":"DYDX. 2023. dYdX: Trade Perpetuals on the most powerful trading platform. https:\/\/dydx.exchange\/."},{"key":"e_1_3_2_1_26_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Eckert Moritz","year":"2018","unstructured":"Moritz Eckert, Antonio Bianchi, Ruoyu Wang, Yan Shoshitaishvili, Christopher Kruegel, and Giovanni Vigna. 2018. HeapHopper: Bringing bounded model checking to heap implementation security. In 27th USENIX Security Symposium (USENIX Security 18). 99--116."},{"key":"e_1_3_2_1_27_1","unstructured":"William Entriken Dieter Shirley Jacob Evans and Nastassia Sachs. 2018. ERC-721: Non-Fungible Token Standard. Ethereum Improvement Proposals. [Online serial]. Available: https:\/\/eips.ethereum.org\/EIPS\/eip-721."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/wetseb.2019.00008"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3192366.3192382"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062351"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416646"},{"key":"e_1_3_2_1_32_1","volume-title":"Foundry: A Blazing Fast, Portable and Modular Toolkit for Ethereum Application Development. https:\/\/github.com\/foundry-rs\/foundry.","year":"2021","unstructured":"foundry team. 2021. Foundry: A Blazing Fast, Portable and Modular Toolkit for Ethereum Application Development. https:\/\/github.com\/foundry-rs\/foundry."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3276486"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3158136"},{"key":"e_1_3_2_1_35_1","volume-title":"The Decentralized Financial Crisis. arxiv","author":"Gudgeon Lewis","year":"2002","unstructured":"Lewis Gudgeon, Daniel Perez, Dominik Harz, Benjamin Livshits, and Arthur Gervais. 2020. The Decentralized Financial Crisis. arxiv: 2002.08099 [cs.CR]"},{"key":"e_1_3_2_1_36_1","volume-title":"Proc. ACM Program. Lang.","volume":"4","author":"Guo Zheng","year":"2019","unstructured":"Zheng Guo, Michael James, David Justo, Jiaxiao Zhou, Ziteng Wang, Ranjit Jhala, and Nadia Polikarpova. 2019. Program synthesis by type-guided abstraction refinement. Proc. ACM Program. Lang., Vol. 4, POPL (Dec. 2019), 1--28."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238177"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598124"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213876"},{"key":"e_1_3_2_1_40_1","unstructured":"Lido. 2023. Lido - Liquid Staking for Digital Tokens. https:\/\/lido.fi\/."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3591246"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"e_1_3_2_1_43_1","unstructured":"MakerDAO. 2023. MakerDAO: An Unbiased Global Financial System. https:\/\/makerdao.com\/."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065018"},{"key":"e_1_3_2_1_45_1","volume-title":"Hack Track: Analysis of the BNB Smart Chain Exploit. https:\/\/blog.merklescience.com\/general\/hack-track-analysis-of-the-bnb-smart-chain-exploit. Accessed: 2024-07--24.","author":"Science Merkle","year":"2022","unstructured":"Merkle Science. 2022. Hack Track: Analysis of the BNB Smart Chain Exploit. https:\/\/blog.merklescience.com\/general\/hack-track-analysis-of-the-bnb-smart-chain-exploit. Accessed: 2024-07--24."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00133"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380334"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Maria Leonor Pacheco Max von Hippel Ben Weintraub Dan Goldwasser and Cristina Nita-Rotaru. 2022. Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents. arxiv: 2202.09470 [cs.CR]","DOI":"10.1109\/SP46214.2022.9833673"},{"key":"e_1_3_2_1_49_1","unstructured":"PancakeSwap. 2023. Everyone's Favorite DEX. https:\/\/pancakeswap.finance\/."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2980930.2907962"},{"key":"e_1_3_2_1_51_1","unstructured":"Witek Radomski Andrew Cooke Philippe Castonguay James Therien Eric Binet and Ronan Sandford. 2018. ERC-1155: Multi Token Standard. Ethereum Improvement Proposals. [Online serial]. Available: https:\/\/eips.ethereum.org\/EIPS\/eip-1155."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598059"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1168857.1168907"},{"key":"e_1_3_2_1_54_1","unstructured":"solidityscan. 2023. ROE Finance hack Analysis ' Price Manipulation. https:\/\/blog.solidityscan.com\/roe-finance-hack-analysis-price-manipulation-6993fbea0d7c\/."},{"key":"e_1_3_2_1_55_1","volume-title":"Tether: Fiat currencies on the Bitcoin blockchain. https:\/\/tether.to\/en\/.","author":"Developers Tether","year":"2014","unstructured":"Tether Developers. 2014. Tether: Fiat currencies on the Bitcoin blockchain. https:\/\/tether.to\/en\/."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594340"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243780"},{"key":"e_1_3_2_1_58_1","unstructured":"Uniswap. 2023. The Uniswap Protocol. https:\/\/uniswap.org\/."},{"key":"e_1_3_2_1_59_1","volume-title":"ERC-20: Token Standard. Ethereum Improvement Proposals 20 (Nov","author":"Vogelsteller Fabian","year":"2015","unstructured":"Fabian Vogelsteller and Vitalik Buterin. 2015. ERC-20: Token Standard. Ethereum Improvement Proposals 20 (Nov 2015). [Online serial]. Available: https:\/\/eips.ethereum.org\/EIPS\/eip-20."},{"key":"e_1_3_2_1_60_1","first-page":"21","article-title":"Intellidroid: a targeted input generator for the dynamic analysis of android malware","volume":"16","author":"Wong Michelle Y","year":"2016","unstructured":"Michelle Y Wong and David Lie. 2016. Intellidroid: a targeted input generator for the dynamic analysis of android malware.. In NDSS, Vol. 16. 21--24.","journal-title":"NDSS"},{"key":"e_1_3_2_1_61_1","volume-title":"Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper","author":"Gavin Wood","year":"2014","unstructured":"Gavin Wood et al. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper, Vol. 151, 2014 (2014), 1--32."},{"key":"e_1_3_2_1_62_1","unstructured":"Siwei Wu Dabao Wang Jianting He Yajin Zhou Lei Wu Xingliang Yuan Qinming He and Kui Ren. 2021. DeFiRanger: Detecting Price Manipulation Attacks on DeFi Applications. arxiv: 2104.15068 [cs.CR]"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3417064"},{"key":"e_1_3_2_1_64_1","volume-title":"Solana: A new architecture for a high performance blockchain. Whitepaper","author":"Yakovenko Anatoly","year":"2018","unstructured":"Anatoly Yakovenko. 2018. Solana: A new architecture for a high performance blockchain. Whitepaper (2018)."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00061"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","unstructured":"L Zhou K Qin A Cully B Livshits and A Gervais. 2021. On the just-in-time discovery of profit-generating transactions in DeFi Protocols. 919--936. https:\/\/doi.org\/10.1109\/SP40001.2021.00113","DOI":"10.1109\/SP40001.2021.00113"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179435"}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","location":"Salt Lake City UT USA","acronym":"CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690293","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3690293","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:58:07Z","timestamp":1755842287000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690293"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":67,"alternative-id":["10.1145\/3658644.3690293","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3690293","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}