{"id":"https://openalex.org/W3121465398","doi":"https://doi.org/10.1145/3324884.3416646","title":"Summary-based symbolic evaluation for smart contracts","display_name":"Summary-based symbolic evaluation for smart contracts","publication_year":2020,"publication_date":"2020-12-21","ids":{"openalex":"https://openalex.org/W3121465398","doi":"https://doi.org/10.1145/3324884.3416646","mag":"3121465398"},"language":"en","primary_location":{"id":"doi:10.1145/3324884.3416646","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3324884.3416646","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3324884.3416646","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3324884.3416646","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101567136","display_name":"Yu Feng","orcid":"https://orcid.org/0000-0003-1000-1229"},"institutions":[{"id":"https://openalex.org/I2803209242","display_name":"University of California System","ror":"https://ror.org/00pjdza24","country_code":"US","type":"education","lineage":["https://openalex.org/I2803209242"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yu Feng","raw_affiliation_strings":["University of California"],"affiliations":[{"raw_affiliation_string":"University of California","institution_ids":["https://openalex.org/I2803209242"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088791029","display_name":"Emina Torlak","orcid":"https://orcid.org/0000-0002-1155-2711"},"institutions":[{"id":"https://openalex.org/I201448701","display_name":"University of Washington","ror":"https://ror.org/00cvxb145","country_code":"US","type":"education","lineage":["https://openalex.org/I201448701"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Emina Torlak","raw_affiliation_strings":["University of Washington"],"affiliations":[{"raw_affiliation_string":"University of Washington","institution_ids":["https://openalex.org/I201448701"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085160432","display_name":"Rastislav Bod\u00edk","orcid":"https://orcid.org/0000-0001-6639-1647"},"institutions":[{"id":"https://openalex.org/I201448701","display_name":"University of Washington","ror":"https://ror.org/00cvxb145","country_code":"US","type":"education","lineage":["https://openalex.org/I201448701"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Rastislav Bodik","raw_affiliation_strings":["University of Washington"],"affiliations":[{"raw_affiliation_string":"University of Washington","institution_ids":["https://openalex.org/I201448701"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101567136"],"corresponding_institution_ids":["https://openalex.org/I2803209242"],"apc_list":null,"apc_paid":null,"fwci":2.5044,"has_fulltext":true,"cited_by_count":15,"citation_normalized_percentile":{"value":0.91969859,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1141","last_page":"1152"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9851999878883362,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.8439565896987915},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8129682540893555},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.640444815158844},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5895622372627258},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5779011249542236},{"id":"https://openalex.org/keywords/symbolic-data-analysis","display_name":"Symbolic data analysis","score":0.42716988921165466},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.376767098903656},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.2716485261917114},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.2555248737335205},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.23026397824287415}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.8439565896987915},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8129682540893555},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.640444815158844},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5895622372627258},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5779011249542236},{"id":"https://openalex.org/C65620979","wikidata":"https://www.wikidata.org/wiki/Q7661176","display_name":"Symbolic data analysis","level":2,"score":0.42716988921165466},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.376767098903656},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.2716485261917114},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2555248737335205},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.23026397824287415}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3324884.3416646","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3324884.3416646","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3324884.3416646","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3324884.3416646","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3324884.3416646","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3324884.3416646","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.8299999833106995}],"awards":[{"id":"https://openalex.org/G1006881031","display_name":null,"funder_award_id":"CONIX","funder_id":"https://openalex.org/F4320306087","funder_display_name":"Semiconductor Research Corporation"},{"id":"https://openalex.org/G1103137783","display_name":"SI2-SSE: Algorithms and Tools for Data-Driven Executable Biology","funder_award_id":"1535191","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G2233570209","display_name":null,"funder_award_id":"1936731","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G3785592558","display_name":null,"funder_award_id":"FA8750-16-2-0032","funder_id":"https://openalex.org/F4320332180","funder_display_name":"Defense Advanced Research Projects Agency"},{"id":"https://openalex.org/G4377053310","display_name":null,"funder_award_id":"1651225","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G4651870101","display_name":null,"funder_award_id":"OIA-1936731","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G4713059963","display_name":null,"funder_award_id":"FA8750","funder_id":"https://openalex.org/F4320332180","funder_display_name":"Defense Advanced Research Projects Agency"},{"id":"https://openalex.org/G4767762227","display_name":null,"funder_award_id":"CCF-1918027","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G5292072049","display_name":"FMitF: Track II: Programming by Demonstration for the Browser with Applications in Data Science","funder_award_id":"1918027","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G5985606540","display_name":null,"funder_award_id":"1908494","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G6724302884","display_name":null,"funder_award_id":"FA8750-14-C-0011","funder_id":"https://openalex.org/F4320332180","funder_display_name":"Defense Advanced Research Projects Agency"},{"id":"https://openalex.org/G6947076996","display_name":null,"funder_award_id":"FA8750-16-2-003","funder_id":"https://openalex.org/F4320332180","funder_display_name":"Defense Advanced Research Projects Agency"},{"id":"https://openalex.org/G731481035","display_name":null,"funder_award_id":"1723352","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320306087","display_name":"Semiconductor Research Corporation","ror":"https://ror.org/047z4n946"},{"id":"https://openalex.org/F4320332180","display_name":"Defense Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3121465398.pdf","grobid_xml":"https://content.openalex.org/works/W3121465398.grobid-xml"},"referenced_works_count":29,"referenced_works":["https://openalex.org/W121297392","https://openalex.org/W1496222301","https://openalex.org/W1497028280","https://openalex.org/W2043100293","https://openalex.org/W2057156093","https://openalex.org/W2101512909","https://openalex.org/W2113864883","https://openalex.org/W2133612077","https://openalex.org/W2171469152","https://openalex.org/W2278821771","https://openalex.org/W2399923814","https://openalex.org/W2539190473","https://openalex.org/W2604844934","https://openalex.org/W2769609281","https://openalex.org/W2790202156","https://openalex.org/W2805052744","https://openalex.org/W2846896781","https://openalex.org/W2888928288","https://openalex.org/W2898569715","https://openalex.org/W2898652659","https://openalex.org/W2898656313","https://openalex.org/W2963723316","https://openalex.org/W2964144608","https://openalex.org/W2976890614","https://openalex.org/W3011737828","https://openalex.org/W3104720502","https://openalex.org/W3151748982","https://openalex.org/W4229675450","https://openalex.org/W4246385123"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W4312814274","https://openalex.org/W1590307681","https://openalex.org/W2536018345","https://openalex.org/W2906845177","https://openalex.org/W4200107511","https://openalex.org/W2891427086","https://openalex.org/W1968625315"],"abstract_inverted_index":{"This":[0],"paper":[1],"presents":[2],"Solar,":[3],"a":[4,16,27],"system":[5],"for":[6],"automatic":[7],"synthesis":[8,23],"of":[9,41,54,62,80,99],"adversarial":[10],"contracts":[11,64,91],"that":[12,43,86],"exploit":[13],"vulnerabilities":[14,61],"in":[15,97],"victim":[17],"smart":[18,63,90],"contract.":[19],"To":[20],"make":[21],"the":[22,39,52,55,69,78],"tractable,":[24],"we":[25],"introduce":[26],"query":[28],"language":[29],"as":[30,32],"well":[31],"summary-based":[33,81],"symbolic":[34,82],"evaluation,":[35],"which":[36],"significantly":[37],"reduces":[38],"number":[40],"instructions":[42],"our":[44],"synthesizer":[45],"needs":[46],"to":[47],"evaluate":[48],"symbolically,":[49],"without":[50],"compromising":[51],"precision":[53],"vulnerability":[56],"query.":[57],"We":[58],"encoded":[59],"common":[60],"and":[65,84,95,102],"evaluated":[66],"Solar":[67,87],"on":[68],"entire":[70],"data":[71],"set":[72],"from":[73],"Etherscan.":[74],"Our":[75],"experiments":[76],"demonstrate":[77],"benefits":[79],"evaluation":[83],"show":[85],"outperforms":[88],"state-of-the-art":[89],"analyzers,":[92],"teether,":[93],"Mythril,":[94],"ContractFuzzer,":[96],"terms":[98],"running":[100],"time":[101],"precision.":[103]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
