{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T21:44:26Z","timestamp":1743371066874,"version":"3.37.3"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","funder":[{"name":"National Key R&D Program of China","award":["2021YFB2700500"]},{"name":"Key R&D Program of Zhejiang Province","award":["2022C01086, 2023C01217"]},{"name":"Scientific Research Fund of Zhejiang Provincial Education Department","award":["Y202250832"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,30]]},"DOI":"10.1145\/3543507.3583367","type":"proceedings-article","created":{"date-parts":[[2023,4,26]],"date-time":"2023-04-26T23:30:51Z","timestamp":1682551851000},"page":"2220-2229","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Cross-Modality Mutual Learning for Enhancing Smart Contract Vulnerability Detection on Bytecode"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4934-5811","authenticated-orcid":false,"given":"Peng","family":"Qian","sequence":"first","affiliation":[{"name":"Zhejiang University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7981-9873","authenticated-orcid":false,"given":"Zhenguang","family":"Liu","sequence":"additional","affiliation":[{"name":"Zhejiang University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6525-6133","authenticated-orcid":false,"given":"Yifang","family":"Yin","sequence":"additional","affiliation":[{"name":"Institute for Infocomm Research, A*STAR, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5147-7253","authenticated-orcid":false,"given":"Qinming","family":"He","sequence":"additional","affiliation":[{"name":"Zhejiang University, China"}]}],"member":"320","published-online":{"date-parts":[[2023,4,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2022. Octopus. https:\/\/github.com\/FuzzingLabs\/octopus."},{"key":"e_1_3_2_1_2_1","volume-title":"International Conference on Learning Representations.","author":"Allamanis Miltiadis","year":"2018","unstructured":"Miltiadis Allamanis, Marc Brockschmidt, and Mahmoud Khademi. 2018. Learning to Represent Programs with Graphs. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54455-6_8"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2993600.2993611"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3391195","article-title":"A survey on ethereum systems security: Vulnerabilities, attacks, and defenses","volume":"53","author":"Chen Huashan","year":"2020","unstructured":"Huashan Chen, Marcus Pendleton, Laurent Njilla, and Shouhuai Xu. 2020. A survey on ethereum systems security: Vulnerabilities, attacks, and defenses. ACM Computing Surveys (CSUR) 53, 3 (2020), 1\u201343.","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"e_1_3_2_1_6_1","volume-title":"Defectchecker: Automated smart contract defect detection by analyzing evm bytecode","author":"Chen Jiachi","year":"2021","unstructured":"Jiachi Chen, Xin Xia, David Lo, John Grundy, Xiapu Luo, and Ting Chen. 2021. Defectchecker: Automated smart contract defect detection by analyzing evm bytecode. IEEE Transactions on Software Engineering (2021)."},{"key":"e_1_3_2_1_7_1","volume-title":"A blockchain consensus mechanism that uses Proof of Solution to optimize energy dispatch and trading. Nature Energy","author":"Chen Sijie","year":"2022","unstructured":"Sijie Chen, Hanning Mi, Jian Ping, Zheng Yan, Zeyu Shen, Xuezhi Liu, Ning Zhang, Qing Xia, and Chongqing Kang. 2022. A blockchain consensus mechanism that uses Proof of Solution to optimize energy dispatch and trading. Nature Energy (2022), 1\u20138."},{"volume-title":"Proceedings of the ACM on Measurement and Analysis of Computing Systems 5, 2 (202)","author":"Chen Weimin","key":"e_1_3_2_1_8_1","unstructured":"Weimin Chen, Xinran Li, Yuting Sui, Ningyu He, Haoyu Wang, Lei Wu, and Xiapu Luo. 202. Sadponzi: Detecting and characterizing ponzi schemes in ethereum smart contracts. Proceedings of the ACM on Measurement and Analysis of Computing Systems 5, 2 (202), 1\u201330."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678888"},{"key":"e_1_3_2_1_10_1","unstructured":"CoinMarketCap. 2022. Ethereum (ETH) price charts market cap and other metrics. https:\/\/coinmarketcap.com\/currencies\/ethereum."},{"key":"e_1_3_2_1_11_1","volume-title":"Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805","author":"Devlin Jacob","year":"2018","unstructured":"Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2018. Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018)."},{"volume-title":"Blockchain Enabled Applications","author":"Dhillon Vikram","key":"e_1_3_2_1_12_1","unstructured":"Vikram Dhillon, David Metcalf, and Max Hooper. 2017. The DAO hacked. In Blockchain Enabled Applications. Springer, 67\u201378."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Mojtaba Eshghie Cyrille Artho and Dilian Gurov. 2021. Dynamic Vulnerability Detection on Smart Contracts Using Machine Learning. In Evaluation and Assessment in Software Engineering. 305\u2013312.","DOI":"10.1145\/3463274.3463348"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/WETSEB.2019.00008"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion.2019.00029"},{"key":"e_1_3_2_1_16_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"He Ningyu","year":"2021","unstructured":"Ningyu He, Ruiyi Zhang, Haoyu Wang, Lei Wu, Xiapu Luo, Yao Guo, Ting Yu, and Xuxian Jiang. 2021. { EOSAFE} : Security Analysis of { EOSIO} Smart Contracts. In 30th USENIX Security Symposium (USENIX Security 21). 1271\u20131288."},{"key":"e_1_3_2_1_17_1","volume-title":"SCSGuard: Deep Scam Detection for Ethereum Smart Contracts. ArXiv abs\/2105.10426","author":"Hu Huiwen","year":"2021","unstructured":"Huiwen Hu and Yuedong Xu. 2021. SCSGuard: Deep Scam Detection for Ethereum Smart Contracts. ArXiv abs\/2105.10426 (2021)."},{"key":"e_1_3_2_1_18_1","unstructured":"Inspex. 2021. Reentrancy Attack on Cream Finance. https:\/\/inspexco.medium.com\/reentrancy-attack-on-cream-finance-incident-analysis-1c629686b6f5."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238177"},{"key":"e_1_3_2_1_20_1","volume-title":"Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907","author":"Kipf N","year":"2016","unstructured":"Thomas\u00a0N Kipf and Max Welling. 2016. Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907 (2016)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Zhenwen Liang and Xiangliang Zhang. 2021. Solving Math Word Problems with Teacher Supervision. In IJCAI. 3522\u20133528.","DOI":"10.24963\/ijcai.2021\/485"},{"key":"e_1_3_2_1_22_1","first-page":"653","article-title":"A survey of blockchain security issues and challenges.Int","volume":"19","author":"Lin Iuon-Chang","year":"2017","unstructured":"Iuon-Chang Lin and Tzu-Chun Liao. 2017. A survey of blockchain security issues and challenges.Int. J. Netw. Secur. 19, 5 (2017), 653\u2013659.","journal-title":"J. Netw. Secur."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2020.106503"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Zhenguang Liu Peng Qian Xiang Wang Lei Zhu Qinming He and Shouling Ji. 2021. Smart Contract Vulnerability Detection: From Pure Neural Network to Interpretable Graph Feature and Expert Pattern Fusion. In IJCAI. 2751\u20132759.","DOI":"10.24963\/ijcai.2021\/379"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3095196"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3237370"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2020.02.054"},{"key":"e_1_3_2_1_29_1","unstructured":"Bernhard Mueller. 2017. A framework for bug hunting on the Ethereum blockchain. https:\/\/github.com\/ConsenSys\/mythril."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380334"},{"key":"e_1_3_2_1_31_1","unstructured":"Purathani Praitheeshan Lei Pan Jiangshan Yu Joseph\u00a0K. Liu and R. Doss. 2019. Security Analysis Methods on Ethereum Smart Contract Vulnerabilities: A Survey. ArXiv abs\/1908.08605 (2019)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2969429"},{"key":"e_1_3_2_1_33_1","volume-title":"Sereum: Protecting existing smart contracts against re-entrancy attacks. arXiv preprint arXiv:1812.05934","author":"Rodler Michael","year":"2018","unstructured":"Michael Rodler, Wenting Li, Ghassan\u00a0O Karame, and Lucas Davi. 2018. Sereum: Protecting existing smart contracts against re-entrancy attacks. arXiv preprint arXiv:1812.05934 (2018)."},{"volume-title":"30th { USENIX} Security Symposium ({ USENIX} Security 21).","author":"Rodler Michael","key":"e_1_3_2_1_34_1","unstructured":"Michael Rodler, Wenting Li, Ghassan\u00a0O Karame, and Lucas Davi. 2021. EVMPatch: timely and automated patching of ethereum smart contracts. In 30th { USENIX} Security Symposium ({ USENIX} Security 21)."},{"key":"e_1_3_2_1_35_1","unstructured":"Wesley Joon-Wie Tann X. Han Sourav Sengupta and Y. Ong. 2018. Towards Safer Smart Contracts: A Sequence Learning Approach to Detecting Vulnerabilities. ArXiv abs\/1811.06632 (2018)."},{"key":"e_1_3_2_1_36_1","unstructured":"Parity Technologies. 2021. Security alert: Parity wallet (multi-sig wallets).https:\/\/www.parity.io\/security-alert-2\/."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3194113.3194115"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274737"},{"key":"e_1_3_2_1_39_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Torres Christof\u00a0Ferreira","year":"2019","unstructured":"Christof\u00a0Ferreira Torres, Mathis Steichen, 2019. The art of the scam: Demystifying honeypots in ethereum smart contracts. In 28th USENIX Security Symposium (USENIX Security 19). 1591\u20131607."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243780"},{"key":"e_1_3_2_1_41_1","volume-title":"Graph attention networks. arXiv preprint arXiv:1710.10903","author":"Veli\u010dkovi\u0107 Petar","year":"2017","unstructured":"Petar Veli\u010dkovi\u0107, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Lio, and Yoshua Bengio. 2017. Graph attention networks. arXiv preprint arXiv:1710.10903 (2017)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00367"},{"key":"e_1_3_2_1_43_1","volume-title":"Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151","author":"Gavin Wood","year":"2014","unstructured":"Gavin Wood 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151, 2014 (2014), 1\u201332."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3417064"},{"key":"e_1_3_2_1_45_1","volume-title":"Blockchain technology overview. arXiv preprint arXiv:1906.11078","author":"Yaga Dylan","year":"2019","unstructured":"Dylan Yaga, Peter Mell, Nik Roby, and Karen Scarfone. 2019. Blockchain technology overview. arXiv preprint arXiv:1906.11078 (2019)."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i12.17280"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5466"},{"key":"e_1_3_2_1_48_1","first-page":"3872","article-title":"Codecmr: Cross-modal retrieval for function-level binary source code matching","volume":"33","author":"Yu Zeping","year":"2020","unstructured":"Zeping Yu, Wenxin Zheng, Jiaqi Wang, Qiyi Tang, Sen Nie, and Shi Wu. 2020. Codecmr: Cross-modal retrieval for function-level binary source code matching. Advances in Neural Information Processing Systems 33 (2020), 3872\u20133883.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.3390\/s22093577"},{"key":"e_1_3_2_1_50_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Zhang Mengya","year":"2020","unstructured":"Mengya Zhang, Xiaokuan Zhang, Yinqian Zhang, and Zhiqiang Lin. 2020. { TXSPECTOR} : Uncovering attacks in ethereum from transactions. In 29th USENIX Security Symposium (USENIX Security 20). 2775\u20132792."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00829"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"crossref","unstructured":"Yuan Zhuang Zhenguang Liu Peng Qian Qi Liu Xiang Wang and Qinming He. 2020. Smart Contract Vulnerability Detection using Graph Neural Network. In IJCAI. 3283\u20133290.","DOI":"10.24963\/ijcai.2020\/454"}],"event":{"name":"WWW '23: The ACM Web Conference 2023","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Austin TX USA","acronym":"WWW '23"},"container-title":["Proceedings of the ACM Web Conference 2023"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3543507.3583367","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,19]],"date-time":"2024-10-19T08:05:33Z","timestamp":1729325133000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3543507.3583367"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,30]]},"references-count":52,"alternative-id":["10.1145\/3543507.3583367","10.1145\/3543507"],"URL":"https:\/\/doi.org\/10.1145\/3543507.3583367","relation":{},"subject":[],"published":{"date-parts":[[2023,4,30]]},"assertion":[{"value":"2023-04-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}