{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:32:00Z","timestamp":1766442720940,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","funder":[{"name":"Deutsche Forschungsgemeinschaft (DFG)","award":["SFB 1119 ? 236615297"],"award-info":[{"award-number":["SFB 1119 ? 236615297"]}]},{"DOI":"10.13039\/100019180","name":"HORIZON EUROPE European Research Council","doi-asserted-by":"publisher","award":["CONSEC - 101042266"],"award-info":[{"award-number":["CONSEC - 101042266"]}],"id":[{"id":"10.13039\/100019180","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,19]]},"DOI":"10.1145\/3719027.3760714","type":"proceedings-article","created":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T23:42:02Z","timestamp":1763854922000},"page":"4752-4754","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Poster: Code HarvETHter: Corpus-Driven Decompilation of Ethereum Smart Contracts"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-0685-6237","authenticated-orcid":false,"given":"Jens-Rene","family":"Giesen","sequence":"first","affiliation":[{"name":"University of Duisburg-Essen, Essen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-2601-2202","authenticated-orcid":false,"given":"Christian","family":"Scholz","sequence":"additional","affiliation":[{"name":"University of Duisburg-Essen, Essen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7322-2777","authenticated-orcid":false,"given":"Lucas","family":"Davi","sequence":"additional","affiliation":[{"name":"University of Duisburg-Essen, Essen, Germany"}]}],"member":"320","published-online":{"date-parts":[[2025,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"4327","volume-title":"Augmenting Decompiler Output with Learned Variable Names and Types. In 31st USENIX Security Symposium (USENIX Security 22)","author":"Chen Qibin","year":"2022","unstructured":"Qibin Chen, Jeremy Lacomis, Edward J. Schwartz, Claire Le Goues, Graham Neubig, and Bogdan Vasilescu. 2022. Augmenting Decompiler Output with Learned Variable Names and Types. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, 4327-4343. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/chen-qibin"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIS.2019.00011"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.3390\/info15010024"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3527321"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2022.3207428"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3689711"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER56733.2023.00011"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2023.111653"},{"key":"e_1_3_2_1_9_1","unstructured":"Etherscan Team. 2016. Etherscan Verifying Contracts. https:\/\/info.etherscan.com\/how-to-verify-contracts\/. Accessed: 2025-07-02."},{"key":"e_1_3_2_1_10_1","volume-title":"The Free Encyclopedia. https:\/\/en.wikipedia.org\/w\/index.php?title=Infinite_monkey_theorem&oldid=1268253249 [Online","author":"Wikipedia","year":"2025","unstructured":"Wikipedia contributors. 2025. Infinite monkey theorem -- Wikipedia, The Free Encyclopedia. https:\/\/en.wikipedia.org\/w\/index.php?title=Infinite_monkey_theorem&oldid=1268253249 [Online; accessed 7-February-2025]."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3670340"}],"event":{"name":"CCS '25: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"CCS '25"},"container-title":["Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3719027.3760714","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:27:48Z","timestamp":1766442468000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3719027.3760714"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,19]]},"references-count":11,"alternative-id":["10.1145\/3719027.3760714","10.1145\/3719027"],"URL":"https:\/\/doi.org\/10.1145\/3719027.3760714","relation":{},"subject":[],"published":{"date-parts":[[2025,11,19]]},"assertion":[{"value":"2025-11-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}