{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T07:33:32Z","timestamp":1763105612649,"version":"3.40.3"},"publisher-location":"Cham","reference-count":76,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030034269"},{"type":"electronic","value":"9783030034276"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-03427-6_22","type":"book-chapter","created":{"date-parts":[[2018,10,29]],"date-time":"2018-10-29T16:54:48Z","timestamp":1540832088000},"page":"280-299","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Smart Contracts and Opportunities for Formal Methods"],"prefix":"10.1007","author":[{"given":"Andrew","family":"Miller","sequence":"first","affiliation":[]},{"given":"Zhicheng","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Somesh","family":"Jha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,30]]},"reference":[{"key":"22_CR1","unstructured":"Bitcoin Script Wiki. https:\/\/en.bitcoin.it\/wiki\/Script. Accessed 21 Apr 2018"},{"key":"22_CR2","unstructured":"CertiK: building fully trustworthy smart contracts and blockchain ecosystems. https:\/\/certik.org\/docs\/white_paper.pdf. Accessed 28 Mar 2018"},{"key":"22_CR3","unstructured":"Decompiler and security analysis tool for blockchain-based ethereum smart-contracts. https:\/\/github.com\/comaeio\/porosity. Accessed 25 Mar 2018"},{"key":"22_CR4","unstructured":"Ethereum smart contract security best practices. https:\/\/consensys.github.io\/smart-contract-best-practices\/. Accessed 29 Mar 2018"},{"key":"22_CR5","unstructured":"ethereum\/vyper - new experimental programming language. https:\/\/github.com\/ethereum\/vyper. Accessed 26 Mar 2018"},{"key":"22_CR6","unstructured":"K semantics of the ethereum virtual machine (EVM). https:\/\/github.com\/kframework\/evm-semantics. Accessed 26 Mar 2018"},{"key":"22_CR7","unstructured":"Liquidity: a smart contract language for Tezos. https:\/\/github.com\/OCamlPro\/liquidity. Accessed 19 Apr 2018"},{"key":"22_CR8","unstructured":"MAIAN: automatic tool for finding trace vulnerabilities in ethereum smart contracts. https:\/\/github.com\/MAIAN-tool\/MAIAN. Accessed 24 Mar 2018"},{"key":"22_CR9","unstructured":"Manticore 0.1.7 release - symbolic execution tool. https:\/\/github.com\/trailofbits\/manticore. Accessed 24 Mar 2018"},{"key":"22_CR10","unstructured":"Manticore documentation, release 0.1.0. https:\/\/media.readthedocs.org\/pdf\/manticore\/latest\/manticore.pdf. Accessed 25 Mar 2018"},{"key":"22_CR11","unstructured":"Manticore: Symbolic execution for humans. https:\/\/blog.trailofbits.com\/2017\/04\/27\/manticore-symbolic-execution-for-humans\/. Accessed 24 Mar 2018"},{"key":"22_CR12","unstructured":"Michelson: the language of smart contracts in Tezos. https:\/\/www.tezos.com\/static\/papers\/language.pdf. Accessed 19 Apr 2018"},{"key":"22_CR13","unstructured":"Mythril 0.14.9 - security analysis tool for ethereum smart contracts. https:\/\/pypi.python.org\/pypi\/mythril. Accessed 24 Mar 2018"},{"key":"22_CR14","unstructured":"Openzepplin\/zeppelin-solidity\/contracts\/math\/safemath.sol. https:\/\/github.com\/OpenZeppelin\/zeppelin-solidity\/blob\/master\/contracts\/math\/SafeMath.sol. Accessed 24 Mar 2018"},{"key":"22_CR15","unstructured":"Oyente - an analysis tool for smart contracts, version 0.2.7. https:\/\/github.com\/melonproject\/oyente. Accessed 9 Oct 2017"},{"key":"22_CR16","unstructured":"Oyente web access. https:\/\/oyente.melon.fund. Accessed 24 Mar 2018"},{"key":"22_CR17","unstructured":"Plutus language prototype. https:\/\/github.com\/input-output-hk\/plutus-prototype. Accessed 20 Apr 2018"},{"key":"22_CR18","unstructured":"Remix - solidity IDE, v0.4.21. http:\/\/remix.ethereum.org. Accessed 28 Mar 2018"},{"key":"22_CR19","unstructured":"Rholang. https:\/\/github.com\/rchain\/rchain\/tree\/master\/rholang. Accessed 26 Mar 2018"},{"key":"22_CR20","unstructured":"Securify - formal verification of ethereum smart contracts. https:\/\/securify.ch\/. Accessed 24 Mar 2018"},{"key":"22_CR21","unstructured":"Security considerations - pitfalls - tx.origin. https:\/\/solidity.readthedocs.io\/en\/develop\/security-considerations.html#tx-origin. Accessed 24 Mar 2018"},{"key":"22_CR22","unstructured":"Smartcheck. https:\/\/tool.smartdec.net\/. Accessed 24 Mar 2018"},{"key":"22_CR23","unstructured":"Smartcheck - a static analysis tool that detects vulnerabilities and bugs in solidity programs. https:\/\/github.com\/smartdec\/smartcheck. Accessed 24 Mar 2018"},{"key":"22_CR24","unstructured":"Solidity v0.4.21. https:\/\/solidity.readthedocs.io\/en\/v0.4.21\/. Accessed 28 Mar 2018"},{"key":"22_CR25","unstructured":"The source code of ethereum virtual machine bytecode f* formalization. https:\/\/secpriv.tuwien.ac.at\/tools\/ethsemantics. Accessed 26 Mar 2018"},{"key":"22_CR26","unstructured":"Try Michelson. https:\/\/try-michelson.com\/. Accessed 19 Apr 2018"},{"key":"22_CR27","unstructured":"Vyper. https:\/\/vyper.readthedocs.io\/en\/latest\/index.html. Accessed 27 Mar 2018"},{"key":"22_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/978-3-662-54455-6_8","volume-title":"Principles of Security and Trust","author":"N Atzei","year":"2017","unstructured":"Atzei, N., Bartoletti, M., Cimoli, T.: A survey of attacks on ethereum smart contracts (SoK). In: Maffei, M., Ryan, M. (eds.) POST 2017. LNCS, vol. 10204, pp. 164\u2013186. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-662-54455-6_8"},{"key":"22_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1007\/978-3-319-70278-0_31","volume-title":"Financial Cryptography and Data Security","author":"M Bartoletti","year":"2017","unstructured":"Bartoletti, M., Pompianu, L.: An empirical analysis of smart contracts: platforms, applications, and design patterns. In: Brenner, M., et al. (eds.) FC 2017. LNCS, vol. 10323, pp. 494\u2013509. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70278-0_31"},{"key":"22_CR30","doi-asserted-by":"publisher","unstructured":"Bhargavan, K., et al.: Formal verification of smart contracts: short paper. In: Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security, PLAS 2016, pp. 91\u201396. ACM, New York (2016). https:\/\/doi.org\/10.1145\/2993600.2993611","DOI":"10.1145\/2993600.2993611"},{"key":"22_CR31","unstructured":"Blockstream: Simplicity itself for blockchains. https:\/\/blockstream.com\/2017\/10\/30\/simplicity.html. Accessed 20 Apr 2018"},{"key":"22_CR32","unstructured":"BOScoin: Smart contracts and trust contracts: part 3. https:\/\/medium.com\/@boscoin\/smart-contracts-trust-contracts-part-3-6cf76bf5882e. Accessed 21 Apr 2018"},{"key":"22_CR33","unstructured":"Buterin, V.: Bootstrapping a decentralized autonomous corporation: part I. Bitcoin Mag. (2013)"},{"key":"22_CR34","doi-asserted-by":"publisher","unstructured":"Crary, K., Sullivan, M.J.: Peer-to-peer affine commitment using bitcoin. In: Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2015, pp. 479\u2013488. ACM, New York (2015). https:\/\/doi.org\/10.1145\/2737924.2737997","DOI":"10.1145\/2737924.2737997"},{"key":"22_CR35","unstructured":"Daian, P.: Analysis of the DAO exploit (2016). http:\/\/hackingdistributed.com\/2016\/06\/18\/analysis-of-the-dao-exploit\/"},{"key":"22_CR36","unstructured":"Daian, P.: An in-depth look at the parity multisig bug, July 2017. http:\/\/hackingdistributed.com\/2017\/07\/22\/deep-dive-parity-bug\/"},{"key":"22_CR37","doi-asserted-by":"crossref","unstructured":"Danezis, G., Meiklejohn, S.: Centrally banked cryptocurrencies. In: NDSS (2016)","DOI":"10.14722\/ndss.2016.23187"},{"key":"22_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/978-3-319-70972-7_22","volume-title":"Financial Cryptography and Data Security","author":"AE Gencer","year":"2017","unstructured":"Gencer, A.E., van Renesse, R., Sirer, E.G.: Short paper: service-oriented sharding for blockchains. In: Kiayias, A. (ed.) FC 2017. LNCS, vol. 10322, pp. 393\u2013401. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70972-7_22"},{"key":"22_CR39","doi-asserted-by":"crossref","unstructured":"Grishchenko, I., Maffei, M., Schneidewind, C.: A semantic framework for the security analysis of ethereum smart contracts. arXiv preprint arXiv:1802.08660 (2018)","DOI":"10.1007\/978-3-319-89722-6_10"},{"key":"22_CR40","doi-asserted-by":"crossref","unstructured":"Grossman, S.: Online detection of effectively callback free objects with applications to smart contracts. Proc. ACM Program. Lang. 2(POPL), 48 (2017)","DOI":"10.1145\/3158136"},{"key":"22_CR41","unstructured":"Higgins, S.: Ethereum developers launch white hat counter-attack on the DAO, June 2016. https:\/\/www.coindesk.com\/ethereum-developers-draining-dao\/"},{"key":"22_CR42","doi-asserted-by":"crossref","unstructured":"Hildenbrandt, E., et al.: KEVM: a complete semantics of the ethereum virtual machine. http:\/\/hdl.handle.net\/2142\/97207. Accessed 27 Mar 2018","DOI":"10.1109\/CSF.2018.00022"},{"key":"22_CR43","unstructured":"Hileman, G.: State of blockchain Q1 2016: blockchain funding overtakes bitcoin (2016). http:\/\/www.coindesk.com\/state-of-blockchain-q1-2016\/"},{"key":"22_CR44","unstructured":"Hirai, Y.: Dr. Y\u2019s ethereum contract analyzer. https:\/\/github.com\/pirapira\/dry-analyzer. Accessed 25 Mar 2018"},{"key":"22_CR45","unstructured":"Hirai, Y.: A lem formalization of EVM and some Isabelle\/HOL proofs. https:\/\/github.com\/pirapira\/eth-isabelle. Accessed 25 Mar 2018"},{"key":"22_CR46","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"520","DOI":"10.1007\/978-3-319-70278-0_33","volume-title":"Financial Cryptography and Data Security","author":"Y Hirai","year":"2017","unstructured":"Hirai, Y.: Defining the ethereum virtual machine for interactive theorem provers. In: Brenner, M., et al. (eds.) FC 2017. LNCS, vol. 10323, pp. 520\u2013535. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70278-0_33"},{"key":"22_CR47","doi-asserted-by":"crossref","unstructured":"Kalra, S., Goel, S., Dhawan, M., Sharma, S.: Zeus: Analyzing safety of smart contracts. In: NDSS (2018)","DOI":"10.14722\/ndss.2018.23082"},{"key":"22_CR48","doi-asserted-by":"crossref","unstructured":"Kokoris-Kogias, E., Jovanovic, P., Gasser, L., Gailly, N., Syta, E., Ford, B.: OmniLedger: a secure, scale-out, decentralized ledger via sharding (2018)","DOI":"10.1109\/SP.2018.000-5"},{"key":"22_CR49","doi-asserted-by":"crossref","unstructured":"Kosba, A., Miller, A., Shi, E., Wen, Z., Papamanthou, C.: Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 839\u2013858. IEEE (2016)","DOI":"10.1109\/SP.2016.55"},{"key":"22_CR50","unstructured":"Kuske, D., Muscholl, A.: Communicating automata. http:\/\/eiche.theoinf.tu-ilmenau.de\/kuske\/Submitted\/cfm-final.pdf. Accessed 27 Mar 2018"},{"key":"22_CR51","unstructured":"Larimer, D.: Overpaying for security: the hidden costs of bitcoin, September 2013. https:\/\/letstalkbitcoin.com\/is-bitcoin-overpaying-for-false-security"},{"key":"22_CR52","doi-asserted-by":"crossref","unstructured":"Luu, L., Chu, D.H., Olickel, H., Saxena, P., Hobor, A.: Making smart contracts smarter. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 254\u2013269. ACM (2016)","DOI":"10.1145\/2976749.2978309"},{"key":"22_CR53","unstructured":"Mark, D., Zamfir, V., Sirer, E.G.: A call for a temporary moratorium on \u201cthe DAO\u201d, May 2016"},{"key":"22_CR54","unstructured":"Mavridou, A.: Smartcontracts - the FSolidM framework. https:\/\/github.com\/anmavrid\/smart-contracts. Accessed 26 Mar 2018"},{"key":"22_CR55","doi-asserted-by":"crossref","unstructured":"Mavridou, A., Laszka, A.: Designing secure ethereum smart contracts: a finite state machine based approach. arXiv preprint arXiv:1711.09327 (2017)","DOI":"10.1007\/978-3-662-58387-6_28"},{"key":"22_CR56","unstructured":"McAdams, D.: Formal specification of the plutus (core) language. https:\/\/github.com\/input-output-hk\/plutus-prototype\/tree\/master\/docs\/spec. Accessed 20 Apr 2018"},{"issue":"5","key":"22_CR57","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.entcs.2005.05.016","volume":"141","author":"L Meredith","year":"2005","unstructured":"Meredith, L., Radestock, M.: A reflective higher-order calculus. Electron. Notes Theor. Comput. Sci. 141(5), 49\u201367 (2005). https:\/\/doi.org\/10.1016\/j.entcs.2005.05.016. Proceedings of the Workshop on the Foundations of Interactive Computation (FInCo 2005). http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1571066105051893","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"22_CR58","unstructured":"Morgan Stanley Research: Global insight: blockchain in banking: disruptive threat or tool? (2016)"},{"key":"22_CR59","unstructured":"Morris, D.Z.: Blockchain-based venture capital fund hacked for $60 million, June 2016. http:\/\/fortune.com\/2016\/06\/18\/blockchain-vc-fund-hacked\/"},{"key":"22_CR60","unstructured":"Mueller, B.: Analyzing ethereum smart contracts for vulnerabilities. https:\/\/hackernoon.com\/scanning-ethereum-smart-contracts-for-vulnerabilities-b5caefd995df. Accessed 24 Mar 2018"},{"key":"22_CR61","unstructured":"Mueller, B.: Introducing Mythril: a framework for bug hunting on the ethereum blockchain. https:\/\/hackernoon.com\/introducing-mythril-a-framework-for-bug-hunting-on-the-ethereum-blockchain-9dc5588f82f6. Accessed 24 Mar 2018"},{"key":"22_CR62","unstructured":"Mueller, B.: Mythril. https:\/\/github.com\/ConsenSys\/mythril. Accessed 24 Mar 2018"},{"key":"22_CR63","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)"},{"key":"22_CR64","doi-asserted-by":"crossref","unstructured":"Nikolic, I., Kolluri, A., Sergey, I., Saxena, P., Hobor, A.: Finding the Greedy, Prodigal, and Suicidal Contracts at Scale. ArXiv e-prints, February 2018","DOI":"10.1145\/3274694.3274743"},{"key":"22_CR65","unstructured":"OCamlPRO: Liquidity online. http:\/\/www.liquidity-lang.org\/edit\/. Accessed 19 Apr 2018"},{"key":"22_CR66","unstructured":"O\u2019Connor, R.: Simplicity: a new language for blockchains. CoRR abs\/1711.03028 (2017). http:\/\/arxiv.org\/abs\/1711.03028"},{"key":"22_CR67","unstructured":"Revere, R.: solgraph - visualize solidity control flow for smart contract security analysis. https:\/\/github.com\/raineorshine\/solgraph. Accessed 24 Mar 2018"},{"key":"22_CR68","unstructured":"Securify: Automatically detecting the bug that froze parity wallets. https:\/\/medium.com\/@SecurifySwiss\/automatically-detecting-the-bug-that-froze-parity-wallets-ad2bebebd3b0. Accessed 24 Mar 2018"},{"key":"22_CR69","unstructured":"Seijas, P.L., Thompson, S.J., McAdams, D.: Scripting smart contracts for distributed ledger technology. IACR Cryptology ePrint Archive 2016\/1156 (2016). http:\/\/eprint.iacr.org\/2016\/1156"},{"key":"22_CR70","unstructured":"Sergey, I.: Scilla-Coq, state-transition systems for smart contracts. https:\/\/github.com\/ilyasergey\/scilla-coq. Accessed 25 Mar 2018"},{"key":"22_CR71","unstructured":"Sergey, I., Kumar, A., Hobor, A.: Scilla: a smart contract intermediate-level language. arXiv preprint arXiv:1801.00687 (2018)"},{"key":"22_CR72","unstructured":"Suiche, M.: DEF CON 25: Porosity. https:\/\/blog.comae.io\/porosity-18790ee42827. Accessed 24 Mar 2018"},{"key":"22_CR73","unstructured":"Suiche, M.: Porosity: a decompiler for blockchain-based smart contracts bytecode. https:\/\/www.comae.io\/reports\/dc25-msuiche-Porosity-Decompiling-Ethereum-Smart-Contracts-wp.pdf. Accessed 25 Mar 2018"},{"key":"22_CR74","unstructured":"Szabo, N.: The idea of smart contracts. Nick Szabos Papers and Concise Tutorials, vol. 6 (1997)"},{"key":"22_CR75","unstructured":"Vigna, P.: Cryptocurrency platform ethereum gets a controversial update. Wall Street J. (2016). http:\/\/www.wsj.com\/articles\/cryptocurrency-platform-ethereum-gets-a-controversial-update-1469055722"},{"key":"22_CR76","unstructured":"Wadler, P.: Simplicity and Michelson: a programming language that is too simple. https:\/\/iohk.io\/blog\/simplicity-and-michelson\/. Accessed 21 Apr 2018"}],"container-title":["Lecture Notes in Computer Science","Leveraging Applications of Formal Methods, Verification and Validation. Industrial Practice"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-03427-6_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,4]],"date-time":"2022-09-04T21:24:53Z","timestamp":1662326693000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-03427-6_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030034269","9783030034276"],"references-count":76,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-03427-6_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"30 October 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISoLA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Leveraging Applications of Formal Methods","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Limassol","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cyprus","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isola2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.isola-conference.org\/isola2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Equinocs","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"149","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"126","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"85% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"invitation-based event","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}