{"id":"https://openalex.org/W3175191348","doi":"https://doi.org/10.1109/tc.2021.3092639","title":"Precise Dynamic Symbolic Execution for Nonuniform Data Access in Smart Contracts","display_name":"Precise Dynamic Symbolic Execution for Nonuniform Data Access in Smart Contracts","publication_year":2021,"publication_date":"2021-06-28","ids":{"openalex":"https://openalex.org/W3175191348","doi":"https://doi.org/10.1109/tc.2021.3092639","mag":"3175191348"},"language":"en","primary_location":{"id":"doi:10.1109/tc.2021.3092639","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tc.2021.3092639","pdf_url":null,"source":{"id":"https://openalex.org/S157670870","display_name":"IEEE Transactions on Computers","issn_l":"0018-9340","issn":["0018-9340","1557-9956","2326-3814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037117080","display_name":"Jianjun Huang","orcid":"https://orcid.org/0000-0003-4403-0060"},"institutions":[{"id":"https://openalex.org/I78988378","display_name":"Renmin University of China","ror":"https://ror.org/041pakw92","country_code":"CN","type":"education","lineage":["https://openalex.org/I78988378"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jianjun Huang","raw_affiliation_strings":["School of Information, Renmin University of China, Beijing, China","Key Laboratory of DEKE, Renmin University of China, MOE, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0003-4403-0060","affiliations":[{"raw_affiliation_string":"School of Information, Renmin University of China, Beijing, China","institution_ids":["https://openalex.org/I78988378"]},{"raw_affiliation_string":"Key Laboratory of DEKE, Renmin University of China, MOE, Beijing, China","institution_ids":["https://openalex.org/I78988378"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025731121","display_name":"Jiang Jia-sheng","orcid":"https://orcid.org/0000-0003-0875-5793"},"institutions":[{"id":"https://openalex.org/I78988378","display_name":"Renmin University of China","ror":"https://ror.org/041pakw92","country_code":"CN","type":"education","lineage":["https://openalex.org/I78988378"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiasheng Jiang","raw_affiliation_strings":["School of Information, Renmin University of China, Beijing, China","Key Laboratory of DEKE, Renmin University of China, MOE, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0003-0875-5793","affiliations":[{"raw_affiliation_string":"School of Information, Renmin University of China, Beijing, China","institution_ids":["https://openalex.org/I78988378"]},{"raw_affiliation_string":"Key Laboratory of DEKE, Renmin University of China, MOE, Beijing, China","institution_ids":["https://openalex.org/I78988378"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101927208","display_name":"Wei You","orcid":"https://orcid.org/0000-0003-1009-6627"},"institutions":[{"id":"https://openalex.org/I78988378","display_name":"Renmin University of China","ror":"https://ror.org/041pakw92","country_code":"CN","type":"education","lineage":["https://openalex.org/I78988378"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei You","raw_affiliation_strings":["School of Information, Renmin University of China, Beijing, China","Key Laboratory of DEKE, Renmin University of China, MOE, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0003-1009-6627","affiliations":[{"raw_affiliation_string":"School of Information, Renmin University of China, Beijing, China","institution_ids":["https://openalex.org/I78988378"]},{"raw_affiliation_string":"Key Laboratory of DEKE, Renmin University of China, MOE, Beijing, China","institution_ids":["https://openalex.org/I78988378"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100644627","display_name":"Bin Liang","orcid":"https://orcid.org/0000-0002-4818-7164"},"institutions":[{"id":"https://openalex.org/I78988378","display_name":"Renmin University of China","ror":"https://ror.org/041pakw92","country_code":"CN","type":"education","lineage":["https://openalex.org/I78988378"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Liang","raw_affiliation_strings":["School of Information, Renmin University of China, Beijing, China","Key Laboratory of DEKE, Renmin University of China, MOE, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-4818-7164","affiliations":[{"raw_affiliation_string":"School of Information, Renmin University of China, Beijing, China","institution_ids":["https://openalex.org/I78988378"]},{"raw_affiliation_string":"Key Laboratory of DEKE, Renmin University of China, MOE, Beijing, China","institution_ids":["https://openalex.org/I78988378"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5037117080"],"corresponding_institution_ids":["https://openalex.org/I78988378"],"apc_list":null,"apc_paid":null,"fwci":1.2337,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.79020605,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":"71","issue":"7","first_page":"1551","last_page":"1563"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8004212379455566},{"id":"https://openalex.org/keywords/symbolic-execution","display_name":"Symbolic execution","score":0.7018252015113831},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.594226598739624},{"id":"https://openalex.org/keywords/hash-table","display_name":"Hash table","score":0.5684822797775269},{"id":"https://openalex.org/keywords/table","display_name":"Table (database)","score":0.48753949999809265},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.4652693271636963},{"id":"https://openalex.org/keywords/integer","display_name":"Integer (computer science)","score":0.42468389868736267},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3710847795009613},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.316433846950531},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.2964622974395752},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.22185012698173523}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8004212379455566},{"id":"https://openalex.org/C2779639559","wikidata":"https://www.wikidata.org/wiki/Q7661178","display_name":"Symbolic execution","level":3,"score":0.7018252015113831},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.594226598739624},{"id":"https://openalex.org/C67388219","wikidata":"https://www.wikidata.org/wiki/Q207440","display_name":"Hash table","level":3,"score":0.5684822797775269},{"id":"https://openalex.org/C45235069","wikidata":"https://www.wikidata.org/wiki/Q278425","display_name":"Table (database)","level":2,"score":0.48753949999809265},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.4652693271636963},{"id":"https://openalex.org/C97137487","wikidata":"https://www.wikidata.org/wiki/Q729138","display_name":"Integer (computer science)","level":2,"score":0.42468389868736267},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3710847795009613},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.316433846950531},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.2964622974395752},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22185012698173523},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tc.2021.3092639","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tc.2021.3092639","pdf_url":null,"source":{"id":"https://openalex.org/S157670870","display_name":"IEEE Transactions on Computers","issn_l":"0018-9340","issn":["0018-9340","1557-9956","2326-3814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computers","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4300000071525574,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G3560213877","display_name":null,"funder_award_id":"U1836209","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5776807238","display_name":null,"funder_award_id":"61802413","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320333622","display_name":"Fundamental Research Fund of Shandong University","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W1480909796","https://openalex.org/W2048417351","https://openalex.org/W2132897303","https://openalex.org/W2294434616","https://openalex.org/W2539190473","https://openalex.org/W2755935712","https://openalex.org/W2790202156","https://openalex.org/W2805052744","https://openalex.org/W2846896781","https://openalex.org/W2885034081","https://openalex.org/W2897675441","https://openalex.org/W2908007588","https://openalex.org/W2963465913","https://openalex.org/W2963610883","https://openalex.org/W2964144608","https://openalex.org/W2964257386","https://openalex.org/W2978584252","https://openalex.org/W2982383932","https://openalex.org/W2985495886","https://openalex.org/W2987160260","https://openalex.org/W2999378142","https://openalex.org/W3015325345","https://openalex.org/W3015405072","https://openalex.org/W3016155638","https://openalex.org/W3026203297","https://openalex.org/W3099242157","https://openalex.org/W3106007553","https://openalex.org/W4246166885","https://openalex.org/W4246871596","https://openalex.org/W4289548059","https://openalex.org/W6754374649","https://openalex.org/W6754519360","https://openalex.org/W6776775275"],"related_works":["https://openalex.org/W2905722102","https://openalex.org/W2155539595","https://openalex.org/W2752815423","https://openalex.org/W4306251929","https://openalex.org/W345638404","https://openalex.org/W1835589799","https://openalex.org/W2144265691","https://openalex.org/W1605991620","https://openalex.org/W4387251676","https://openalex.org/W4385261619"],"abstract_inverted_index":{"Dynamic":[0],"symbolic":[1,98,115],"execution":[2],"(DSE)":[3],"has":[4],"been":[5],"successfully":[6,195],"adopted":[7],"for":[8,108],"vulnerability":[9,159],"detection":[10],"in":[11,89,139,176],"desktop":[12],"and":[13,57,103,156,185,188,201],"mobile":[14],"platforms.":[15],"Unfortunately,":[16],"we":[17,78,94,147],"cannot":[18],"simply":[19],"extrapolate":[20],"those":[21],"techniques":[22],"to":[23,71,83,119],"smart":[24,31,47,90,207],"contracts.":[25,91,208],"The":[26,165],"major":[27],"challenge":[28],"is":[29],"that":[30,168],"contracts":[32,48],"exhibit":[33],"a":[34,63,80,157],"nonuniform":[35,86],"data":[36,43,87,121],"access":[37,88],"mode.":[38,59],"Other":[39],"than":[40],"accessing":[41,62],"the":[42,73,85,97,105,114,125,136,145,178],"via":[44],"uniform":[45],"addresses,":[46],"compromise":[49],"multiple":[50],"addressing":[51],"modes,":[52],"including":[53],"flat":[54],"address":[55],"mode":[56],"key-value":[58,64],"More":[60,92],"seriously,":[61],"table":[65],"usually":[66],"involves":[67],"additional":[68],"hash":[69],"operations":[70],"obtain":[72],"keys.":[74],"In":[75],"this":[76],"paper,":[77],"propose":[79],"DSE":[81,137],"framework":[82,138],"resolve":[84],"specifically,":[93],"exactly":[95],"track":[96],"variables":[99],"with":[100,124,181],"concrete":[101,127],"addresses":[102],"compute":[104],"actual/hash":[106],"keys":[107,116,128],"table-like":[109],"accesses.":[110],"We":[111,134],"also":[112],"take":[113],"into":[117],"account":[118],"distinguish":[120],"accesses":[122],"incidentally":[123],"same":[126],"resulting":[129],"from":[130,205],"artificially":[131],"generated":[132],"values.":[133],"describe":[135],"operational":[140],"semantics.":[141],"On":[142],"top":[143],"of":[144],"framework,":[146],"implement":[148],"an":[149],"integer":[150,179],"overflow":[151],"detector":[152,160],"<sc":[153,161,169,192],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[154,162,170,193],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">Nova</small>":[155,171],"multi-transactional":[158],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">Mtvd</small>":[163,194],".":[164],"experiments":[166],"show":[167],"outperforms":[172],"state-of-the-art":[173],"analysis":[174],"tools":[175],"detecting":[177],"overflows":[180],"much":[182],"higher":[183],"precision":[184],"recall,":[186],"94.2":[187],"93.0":[189],"percent,":[190],"respectively.":[191],"reports":[196],"three":[197],"ether":[198],"leaking":[199],"vulnerabilities":[200],"one":[202],"suicidal":[203],"issue":[204],"real-world":[206]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
