{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:30:17Z","timestamp":1766068217311,"version":"3.41.0"},"reference-count":94,"publisher":"Association for Computing Machinery (ACM)","issue":"FSE","funder":[{"DOI":"10.13039\/501100012166","name":"National Key R&D Program of China","doi-asserted-by":"crossref","award":["2022YFF060450"],"award-info":[{"award-number":["2022YFF060450"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"crossref","award":["62272224, 62341201, 62302207, 62272215"],"award-info":[{"award-number":["62272224, 62341201, 62302207, 62272215"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Leading Edge Technology Program of Jiangsu Natural Science Foundation","award":["BK20202001"],"award-info":[{"award-number":["BK20202001"]}]},{"name":"Science Foundation for Youths of Jiangsu Province","award":["BK20220772"],"award-info":[{"award-number":["BK20220772"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc. ACM Softw. Eng."],"published-print":{"date-parts":[[2025,6,19]]},"abstract":"<jats:p>Understanding the Ethereum smart contract bytecode is essential for ensuring cryptoeconomics security. However, existing decompilers primarily convert bytecode into pseudocode, which is not easily comprehensible for general users, potentially leading to misunderstanding of contract behavior and increased vulnerability to scams or exploits. In this paper, we propose DiSCo, the first LLMs-based EVM decompilation pipeline, which aims to enable LLMs to understand the opaque bytecode and lift it into smart contract code. DiSCo introduces three core technologies. First, a logic-invariant intermediate representation is proposed to reproject the low-level bytecode into high-level abstracted units. The second technique involves semantic enhancement based on a novel type-aware graph model to infer stripped variables during compilation, enhancing the lifting effect. The third technology is a flexible method incorporating code specifications to construct LLM-comprehensible prompts for source code generation. Extensive experiments illustrate that our generated code guarantees a high compilability rate at 75%, with differential fuzzing pass rate averaging at 50%. Manual validation results further indicate that the generated solidity contracts significantly outperforms baseline methods in tasks such as code comprehension and attack reproduction.<\/jats:p>","DOI":"10.1145\/3729373","type":"journal-article","created":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T15:15:34Z","timestamp":1750346134000},"page":"2311-2334","source":"Crossref","is-referenced-by-count":2,"title":["DiSCo: Towards Decompiling EVM Bytecode to Source Code using Large Language Models"],"prefix":"10.1145","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-5247-1444","authenticated-orcid":false,"given":"Xing","family":"Su","sequence":"first","affiliation":[{"name":"Nanjing University, Nanjing,China, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-1915-6692","authenticated-orcid":false,"given":"Hanzhong","family":"Liang","sequence":"additional","affiliation":[{"name":"Nanjing University, Nanjing,China, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0980-9805","authenticated-orcid":false,"given":"Hao","family":"Wu","sequence":"additional","affiliation":[{"name":"Nanjing University, Nanjing,China, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2898-7495","authenticated-orcid":false,"given":"Ben","family":"Niu","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering at Chinese Academy of Sciences, Beijing,China, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3388-7544","authenticated-orcid":false,"given":"Fengyuan","family":"Xu","sequence":"additional","affiliation":[{"name":"Nanjing University, Nanjing,China, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6581-8730","authenticated-orcid":false,"given":"Sheng","family":"Zhong","sequence":"additional","affiliation":[{"name":"Nanjing University, Nanjing,China, China"}]}],"member":"320","published-online":{"date-parts":[[2025,6,19]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-30823-9_23"},{"key":"e_1_2_1_2_1","volume-title":"https:\/\/claude.ai\/chats Accessed","year":"2023","unstructured":"Anthropic. 2023. Claude. https:\/\/claude.ai\/chats Accessed: Sep., 2023"},{"key":"e_1_2_1_3_1","volume-title":"What is blockchain for business? https:\/\/www.ibm.com\/topics\/blockchain-for-business Accessed","author":"Blockchain IBM","year":"2024","unstructured":"IBM Blockchain. 2023. What is blockchain for business? https:\/\/www.ibm.com\/topics\/blockchain-for-business Accessed: Aug., 2024"},{"key":"e_1_2_1_4_1","volume-title":"Blockchain explorer for Ethereum based network and a tool for inspecting and analyzing EVM based blockchains.. https:\/\/www.blockscout.com\/ Accessed","year":"2024","unstructured":"blockscout. 2024. Blockchain explorer for Ethereum based network and a tool for inspecting and analyzing EVM based blockchains.. https:\/\/www.blockscout.com\/ Accessed: Aug., 2024"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385990"},{"key":"e_1_2_1_6_1","volume-title":"Vandal: A scalable security analysis framework for smart contracts. arxiv:1809.03981.","author":"Brent Lexi","year":"2018","unstructured":"Lexi Brent, Anton Jurisevic, Michael Kong, Eric Liu, Francois Gauthier, Vincent Gramoli, Ralph Holz, and Bernhard Scholz. 2018. Vandal: A scalable security analysis framework for smart contracts. arxiv:1809.03981."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3702973"},{"key":"e_1_2_1_8_1","volume-title":"Jared Kaplan, Harri Edwards, Yuri Burda, Nicholas Joseph, and Greg Brockman.","author":"Chen Mark","year":"2021","unstructured":"Mark Chen, Jerry Tworek, Heewoo Jun, Qiming Yuan, Henrique Ponde de Oliveira Pinto, Jared Kaplan, Harri Edwards, Yuri Burda, Nicholas Joseph, and Greg Brockman. 2021. Evaluating large language models trained on code. arxiv:2107.03374."},{"key":"e_1_2_1_9_1","volume-title":"Augmenting Decompiler Output with Learned Variable Names and Types. In 31st USENIX Security Symposium (USENIX Security 22)","author":"Chen Qibin","year":"2022","unstructured":"Qibin Chen, Jeremy Lacomis, Edward J. Schwartz, Claire Le Goues, Graham Neubig, and Bogdan Vasilescu. 2022. Augmenting Decompiler Output with Learned Variable Names and Types. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA. 4327\u20134343."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3078342"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3345664"},{"key":"e_1_2_1_12_1","volume-title":"Ethereum Smart Contract Security Best Practices. https:\/\/consensys.github.io\/smart-contract-best-practices\/ Accessed","year":"2024","unstructured":"consensys. 2023. Ethereum Smart Contract Security Best Practices. https:\/\/consensys.github.io\/smart-contract-best-practices\/ Accessed: Aug., 2024"},{"key":"e_1_2_1_13_1","volume-title":"Solidity parser for Python built on top of a robust ANTLR4 grammar. https:\/\/github.com\/consensys\/python-solidity-parser\/ Accessed","year":"2024","unstructured":"ConsenSysDiligence. 2019. Solidity parser for Python built on top of a robust ANTLR4 grammar. https:\/\/github.com\/consensys\/python-solidity-parser\/ Accessed: Apr., 2024"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC52881.2021.00021"},{"key":"e_1_2_1_15_1","unstructured":"Isaac David Liyi Zhou Kaihua Qin Dawn Song Lorenzo Cavallaro and Arthur Gervais. 2023. Do you still need a manual smart contract audit? arxiv:2306.12338."},{"key":"e_1_2_1_16_1","volume-title":"Breakdown by Smart Contract Languages:TVL Dominance. https:\/\/defillama.com\/languages Accessed","year":"2024","unstructured":"defillama. 2023. Breakdown by Smart Contract Languages:TVL Dominance. https:\/\/defillama.com\/languages Accessed: Sep., 2024"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639219"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559384"},{"key":"e_1_2_1_19_1","volume-title":"https:\/\/github.com\/ethereum\/solc-bin Accessed","author":"Compilers Solidity","year":"2024","unstructured":"ethereum. 2017. Solidity Compilers.. https:\/\/github.com\/ethereum\/solc-bin Accessed: Aug., 2024"},{"key":"e_1_2_1_20_1","volume-title":"Solidity documentation. https:\/\/docs.soliditylang.org Accessed","year":"2023","unstructured":"ethereum. 2018. Solidity documentation. https:\/\/docs.soliditylang.org Accessed: Oct., 2023"},{"key":"e_1_2_1_21_1","volume-title":"Ethereum documentation. https:\/\/ethereum.org\/en\/developers\/docs\/ Accessed","year":"2024","unstructured":"ethereum. 2023. Ethereum documentation. https:\/\/ethereum.org\/en\/developers\/docs\/ Accessed: Aug., 2024"},{"key":"e_1_2_1_22_1","volume-title":"Ethereum Signature Database (a). https:\/\/www.4byte.directory\/ Accessed","year":"2024","unstructured":"ethereum lists. 2018. Ethereum Signature Database (a). https:\/\/www.4byte.directory\/ Accessed: Nov., 2024"},{"key":"e_1_2_1_23_1","volume-title":"Sep","year":"2024","unstructured":"etherscan. Accessed: Sep., 2024. The Ethereum Blockchain Explorer. https:\/\/etherscan.io\/"},{"key":"e_1_2_1_24_1","volume-title":"ethervm.io. https:\/\/ethervm.io\/ Accessed","year":"2024","unstructured":"ethervm. 2018. ethervm.io. https:\/\/ethervm.io\/ Accessed: Nov., 2024"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2024.3428972"},{"key":"e_1_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Lishui Fan Jiakun Liu Zhongxin Liu David Lo Xin Xia and Shanping Li. 2024. Exploring the Capabilities of LLMs for Code Change Related Tasks. arxiv:2407.02824.","DOI":"10.1145\/3709358"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598091"},{"key":"e_1_2_1_28_1","volume-title":"Foundry: A blazing fast, portable and modular toolkit for Ethereum application development written in Rust. https:\/\/github.com\/foundry-rs\/foundry Accessed","year":"2023","unstructured":"foundry-rs. 2023. Foundry: A blazing fast, portable and modular toolkit for Ethereum application development written in Rust. https:\/\/github.com\/foundry-rs\/foundry Accessed: Aug., 2024"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464804"},{"key":"e_1_2_1_30_1","volume-title":"https:\/\/geth.ethereum.org\/docs\/interacting-with-geth\/rpc\/ns-debug#debugtracetransaction Accessed","author":"Transaction","year":"2024","unstructured":"go ethereum. 2024. Debug_traceTransaction documentation. https:\/\/geth.ethereum.org\/docs\/interacting-with-geth\/rpc\/ns-debug#debugtracetransaction Accessed: Aug., 2024"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00120"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3527321"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3404366"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363230"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2023.111627"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623175"},{"key":"e_1_2_1_37_1","volume-title":"DeGPT: Optimizing Decompiler Output with LLM","author":"Hu Peiwei","unstructured":"Peiwei Hu, Ruigang Liang, and Kai Chen. 2024. DeGPT: Optimizing Decompiler Output with LLM. In NDSS. The Internet Society."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3050051"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE56229.2023.00181"},{"key":"e_1_2_1_40_1","unstructured":"Nan Jiang Chengxiao Wang Kevin Liu Xiangzhe Xu Lin Tan and Xiangyu Zhang. 2023. Nova^+: Generative Language Models for Binaries. arxiv:2311.13721."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560612"},{"key":"e_1_2_1_42_1","doi-asserted-by":"crossref","unstructured":"Tom Kenter Alexey Borisov and Maarten De Rijke. 2016. Siamese CBOW: Optimizing Word Embeddings for Sentence Representations. arxiv:1606.04640.","DOI":"10.18653\/v1\/P16-1089"},{"key":"e_1_2_1_43_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Krupp Johannes","year":"2018","unstructured":"Johannes Krupp and Christian Rossow. 2018. $teEther$: Gnawing at Ethereum to Automatically Exploit Smart Contracts. In 27th USENIX Security Symposium (USENIX Security 18). 1317\u20131333."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428258"},{"key":"e_1_2_1_45_1","volume-title":"International conference on machine learning. 1188\u20131196","author":"Le Quoc","year":"2014","unstructured":"Quoc Le and Tomas Mikolov. 2014. Distributed representations of sentences and documents. In International conference on machine learning. 1188\u20131196."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","unstructured":"Fengjie Li Jiajun Jiang Jiajun Sun and Hongyu Zhang. 2024. Hybrid Automated Program Repair by Combining Large Language Models and Program Analysis. ACM Transactions on Software Engineering and Methodology https:\/\/doi.org\/10.1145\/3715004 10.1145\/3715004","DOI":"10.1145\/3715004"},{"key":"e_1_2_1_47_1","volume-title":"Yangtian Zi, Niklas Muennighoff, Denis Kocetkov, Chenghao Mou, Marc Marone, Christopher Akiki, Jia Li, and Jenny Chim.","author":"Li Raymond","year":"2023","unstructured":"Raymond Li, Loubna Ben Allal, Yangtian Zi, Niklas Muennighoff, Denis Kocetkov, Chenghao Mou, Marc Marone, Christopher Akiki, Jia Li, and Jenny Chim. 2023. Starcoder: may the source be with you!. arxiv:2305.06161."},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3582016.3582053"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/QRS51102.2020.00045"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.324"},{"key":"e_1_2_1_51_1","unstructured":"Junwei Liu Kaixin Wang Yixuan Chen Xin Peng Zhenpeng Chen Lingming Zhang and Yiling Lou. 2024. Large Language Model-Based Agents for Software Engineering: A Survey. arxiv:2409.02977."},{"key":"e_1_2_1_52_1","unstructured":"Jiawei Liu Songrun Xie Junhao Wang Yuxiang Wei Yifeng Ding and Lingming Zhang. 2024. Evaluating Language Models for Efficient Code Generation. arxiv:2408.06450."},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER56733.2023.00011"},{"key":"e_1_2_1_54_1","volume-title":"No Need to Lift a Finger Anymore? Assessing the Quality of Code Generation by ChatGPT. ArXiv, abs\/2308.04838","author":"Liu Zhijie","year":"2023","unstructured":"Zhijie Liu, Yutian Tang, Xiapu Luo, Yuming Zhou, and Liang Feng Zhang. 2023. No Need to Lift a Finger Anymore? Assessing the Quality of Code Generation by ChatGPT. ArXiv, abs\/2308.04838 (2023), https:\/\/api.semanticscholar.org\/CorpusID:260735968"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3117966"},{"key":"e_1_2_1_57_1","unstructured":"Pengxiang Ma Ningyu He Yuhua Huang Haoyu Wang and Xiapu Luo. 2024. Abusing the Ethereum Smart Contract Verification Services for Fun and Profit."},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.21105\/joss.00205"},{"key":"e_1_2_1_59_1","volume-title":"Sep","year":"2024","unstructured":"Meta. Accessed: Sep., 2024. Meta Llama 3. https:\/\/llama.meta.com\/"},{"key":"e_1_2_1_60_1","unstructured":"Erik Nijkamp Bo Pang Hiroaki Hayashi Lifu Tu Huan Wang Yingbo Zhou Silvio Savarese and Caiming Xiong. 2022. CodeGen: An Open Large Language Model for Code with Multi-Turn Program Synthesis. arxiv:2203.13474."},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274743"},{"key":"e_1_2_1_62_1","volume-title":"https:\/\/openai.com\/chatgpt Accessed","author":"AI.","year":"2023","unstructured":"OpenAI. 2022. ChatGPT. https:\/\/openai.com\/chatgpt Accessed: Oct., 2023"},{"key":"e_1_2_1_63_1","volume-title":"https:\/\/openai.com\/ Accessed","author":"AI.","year":"2023","unstructured":"OpenAI. 2023. GPT-4. https:\/\/openai.com\/ Accessed: Sep., 2023"},{"key":"e_1_2_1_64_1","volume-title":"Ethereum Signature Database (b). https:\/\/openchain.xyz\/signatures\/ Accessed","year":"2024","unstructured":"openchain.xyz. 2023. Ethereum Signature Database (b). https:\/\/openchain.xyz\/signatures\/ Accessed: Nov., 2024"},{"key":"e_1_2_1_65_1","unstructured":"OpenZeppelin. Nov. 2023. A library for secure smart contract development. https:\/\/github.com\/OpenZeppelin\/openzeppelin-contracts"},{"key":"e_1_2_1_66_1","unstructured":"David N Palacio Daniel Rodriguez-Cardenas Alejandro Velasco Dipin Khati Kevin Moran and Denys Poshyvanyk. 2024. Towards More Trustworthy and Interpretable LLMs for Code through Syntax-Grounded Explanations. arxiv:2407.08983."},{"key":"e_1_2_1_67_1","unstructured":"Hammond A. Pearce Benjamin Tan Prashanth Krishnamurthy Farshad Khorrami Ramesh Karri and Brendan Dolan-Gavitt. 2022. Pop Quiz! Can a Large Language Model Help With Reverse Engineering? arxiv:2202.01142."},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1"},{"key":"e_1_2_1_69_1","volume-title":"Proceedings of the 2007 joint conference on empirical methods in natural language processing and computational natural language learning (EMNLP-CoNLL). 410\u2013420","author":"Rosenberg Andrew","year":"2007","unstructured":"Andrew Rosenberg and Julia Hirschberg. 2007. V-measure: A conditional entropy-based external cluster evaluation measure. In Proceedings of the 2007 joint conference on empirical methods in natural language processing and computational natural language learning (EMNLP-CoNLL). 410\u2013420."},{"key":"e_1_2_1_70_1","doi-asserted-by":"crossref","unstructured":"Nicola Ruaro Fabio Gritti Robert McLaughlin Ilya Grishchenko Christopher Kruegel and Giovanni Vigna. 2024. Not your Type! Detecting Storage Collision Vulnerabilities in Ethereum Smart Contracts.","DOI":"10.14722\/ndss.2024.24713"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME58944.2024.00012"},{"key":"e_1_2_1_72_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"So Sunbeom","year":"2021","unstructured":"Sunbeom So, Seongjoon Hong, and Hakjoo Oh. 2021. $SmarTest$: Effectively Hunting Vulnerable Transaction Sequences in Smart Contracts through Language $Model-Guided$ Symbolic Execution. In 30th USENIX Security Symposium (USENIX Security 21). 1361\u20131378."},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00032"},{"key":"e_1_2_1_74_1","unstructured":"sourcify. Sep. 2024. Source-verified smart contracts for transparency and better UX in web3. https:\/\/sourcify.dev\/"},{"key":"e_1_2_1_75_1","volume-title":"What\u2019s the difference between \u2019address","year":"2023","unstructured":"stackexchange. 2018. What\u2019s the difference between \u2019address\u2019 and \u2019address payable\u2019? https:\/\/ethereum.stackexchange.com\/questions\/64108\/whats-the-difference-between-address-and-address-payable Accessed: Oct., 2023"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639117"},{"key":"e_1_2_1_77_1","unstructured":"Zhensu Sun Haotian Zhu Bowen Xu Xiaoning Du Li Li and David Lo. 2024. LLM as Runtime Error Handler: A Promising Pathway to Adaptive Self-Healing of Software Systems. arxiv:2408.01055."},{"key":"e_1_2_1_78_1","volume-title":"Reproduce DeFi hacked incidents using Foundry.. https:\/\/github.com\/SunWeb3Sec\/DeFiHackLabs Accessed","year":"2025","unstructured":"SunWeb3Sec. 2022. Reproduce DeFi hacked incidents using Foundry.. https:\/\/github.com\/SunWeb3Sec\/DeFiHackLabs Accessed: Jan., 2025"},{"key":"e_1_2_1_79_1","unstructured":"Hanzhuo Tan Qi Luo Jing Li and Yuqun Zhang. 2024. LLM4Decompile: Decompiling Binary Code with Large Language Models. arxiv:2403.05286."},{"key":"e_1_2_1_80_1","unstructured":"Shardeum Content Team. September 23 2022. Blockchain Basics Ethereum Virtual Machine or EVM. https:\/\/shardeum.org\/blog\/evm-vs-non-evm\/"},{"key":"e_1_2_1_81_1","unstructured":"Kolinko Tomasz and Palkeo. 2020. panoramix. https:\/\/github.com\/eveem-org\/panoramix"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274737"},{"key":"e_1_2_1_83_1","volume-title":"Vyper documentation. https:\/\/docs.vyperlang.org\/en\/stable\/ Accessed","year":"2023","unstructured":"vyperlang. 2020. Vyper documentation. https:\/\/docs.vyperlang.org\/en\/stable\/ Accessed: Oct., 2023"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","unstructured":"Shuohan Wu Zihao Li Luyi Yan Weimin Chen Muhui Jiang Chenxu Wang Xiapu Luo and Hao Zhou. 2024. Are We There Yet? Unraveling the State-of-the-Art Smart Contract Fuzzers. https:\/\/doi.org\/10.1145\/3597503.3639152 10.1145\/3597503.3639152","DOI":"10.1145\/3597503.3639152"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2788018"},{"key":"e_1_2_1_86_1","unstructured":"Xiangzhe Xu Zhuo Zhang Zian Su Ziyang Huang Shiwei Feng Yapeng Ye Nan Jiang Danning Xie Siyuan Cheng Lin Tan and Xiangyu Zhang. 2024. Symbol Preference Aware Generative Models for Recovering Variable Names from Stripped Binary. arxiv:2306.02546."},{"key":"e_1_2_1_87_1","volume-title":"Cross-Contract Static Analysis for Detecting Practical Reentrancy Vulnerabilities in Smart Contracts. In 2020 35th IEEE\/ACM International Conference on Automated Software Engineering (ASE). 1029\u20131040","author":"Xue Yinxing","year":"2020","unstructured":"Yinxing Xue, Mingliang Ma, Yun Lin, Yulei Sui, Jiaming Ye, and Tianyong Peng. 2020. Cross-Contract Static Analysis for Detecting Practical Reentrancy Vulnerabilities in Smart Contracts. In 2020 35th IEEE\/ACM International Conference on Automated Software Engineering (ASE). 1029\u20131040."},{"key":"e_1_2_1_88_1","volume-title":"15th USENIX Symposium on Operating Systems Design and Implementation (OSDI 21)","author":"Yang Youngseok","year":"2021","unstructured":"Youngseok Yang, Taesoo Kim, and Byung-Gon Chun. 2021. Finding Consensus Bugs in Ethereum via Multi-transaction Differential Fuzzing. In 15th USENIX Symposium on Operating Systems Design and Implementation (OSDI 21). 349\u2013365."},{"key":"e_1_2_1_89_1","unstructured":"Zhiqiang Yuan Junwei Liu Qiancheng Zi Mingwei Liu Xin Peng and Yiling Lou. 2023. Evaluating Instruction-Tuned Large Language Models on Code Comprehension and Generation. arxiv:2308.01240."},{"key":"e_1_2_1_90_1","first-page":"54769","article-title":"ALGO: Synthesizing Algorithmic Programs with LLM-Generated Oracle Verifiers","volume":"36","author":"Zhang Kexun","year":"2023","unstructured":"Kexun Zhang, Danqing Wang, Jingtao Xia, William Yang Wang, and Lei Li. 2023. ALGO: Synthesizing Algorithmic Programs with LLM-Generated Oracle Verifiers. Advances in Neural Information Processing Systems, 36 (2023), 54769\u201354784.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.67"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3616343"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2024.3452252"},{"key":"e_1_2_1_94_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Zhou Yi","year":"2018","unstructured":"Yi Zhou, Deepak Kumar, Surya Bakshi, Joshua Mason, Andrew Miller, and Michael Bailey. 2018. Erays: reverse engineering ethereum\u2019s opaque smart contracts. In 27th USENIX Security Symposium (USENIX Security 18). 1371\u20131385."}],"container-title":["Proceedings of the ACM on Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3729373","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T15:18:49Z","timestamp":1750346329000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3729373"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,19]]},"references-count":94,"journal-issue":{"issue":"FSE","published-print":{"date-parts":[[2025,6,19]]}},"alternative-id":["10.1145\/3729373"],"URL":"https:\/\/doi.org\/10.1145\/3729373","relation":{},"ISSN":["2994-970X"],"issn-type":[{"value":"2994-970X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,19]]}}}