{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T17:44:02Z","timestamp":1767980642030,"version":"3.49.0"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030356521","type":"print"},{"value":"9783030356538","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-35653-8_32","type":"book-chapter","created":{"date-parts":[[2019,11,22]],"date-time":"2019-11-22T13:02:59Z","timestamp":1574427779000},"page":"485-505","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Detect Abnormal Behaviours in Ethereum Smart Contracts Using Attack Vectors"],"prefix":"10.1007","author":[{"given":"Quoc-Bao","family":"Nguyen","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Anh-Quynh","family":"Nguyen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Van-Hoa","family":"Nguyen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Thanh","family":"Nguyen-Le","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Khuong","family":"Nguyen-An","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2019,11,20]]},"reference":[{"key":"32_CR1","unstructured":"Post-Mortem Investigation (2016). https:\/\/www.kingoftheether.com\/postmortem.html"},{"key":"32_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/978-3-662-54455-6_8","volume-title":"Principles of Security and Trust","author":"N Atzei","year":"2017","unstructured":"Atzei, N., Bartoletti, M., Cimoli, T.: A survey of attacks on ethereum smart contracts (SoK). In: Maffei, M., Ryan, M. (eds.) POST 2017. LNCS, vol. 10204, pp. 164\u2013186. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-662-54455-6_8"},{"key":"32_CR3","unstructured":"Beregszaszi, A.: EVM: overflow detection in arithmetic instructions (2016). github.com\/ethereum\/EIPs\/issues\/159"},{"key":"32_CR4","unstructured":"Beyer, S.: Storage allocation exploits in ethereum smart contracts (2018). https:\/\/medium.com\/cryptronics\/storage-allocation-exploits-in-ethereum-smart-contracts-16c2aa312743"},{"key":"32_CR5","doi-asserted-by":"crossref","unstructured":"Bhargavan, K., et al.: Formal verification of smart contracts: short paper. In: Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security, pp. 91\u201396. ACM (2016)","DOI":"10.1145\/2993600.2993611"},{"key":"32_CR6","unstructured":"Buterin, V.: Ethereum Improvement Proposal 7 (2015). https:\/\/github.com\/ethereum\/EIPs\/blob\/master\/EIPS\/eip-7.md"},{"key":"32_CR7","unstructured":"Buterin, V.: Ethereum Improvement Proposal 170 (2016). https:\/\/github.com\/ethereum\/EIPs\/blob\/master\/EIPS\/eip-170.md"},{"key":"32_CR8","unstructured":"Buterin, V., et al.: A next-generation smart contract and decentralized application platform. White Paper (2014)"},{"key":"32_CR9","unstructured":"Buterin, V., et al.: Difference between CALL, CALLCODE and DELEGATECALL (2016). https:\/\/ethereum.stackexchange.com\/questions\/3667\/difference-between-call-callcode-and-delegatecall"},{"key":"32_CR10","unstructured":"Consensys: Solidity Recommendations (2018). https:\/\/consensys.github.io\/smart-contract-best-practices\/recommendations\/"},{"key":"32_CR11","unstructured":"Falkon, S.: The story of the DAO - its history and consequences (2017). https:\/\/medium.com\/swlh\/the-story-of-the-dao-its-history-and-consequences-71e6a8a551ee"},{"key":"32_CR12","unstructured":"Hoyte, D.: MerdeToken: it\u2019s some hot shit (2018). https:\/\/github.com\/Arachnid\/uscc\/tree\/master\/submissions-2017\/doughoyte"},{"key":"32_CR13","doi-asserted-by":"crossref","unstructured":"Kalra, S., Goel, S., Dhawan, M., Sharma, S.: Zeus: analyzing safety of smart contracts. In: NDSS (2018)","DOI":"10.14722\/ndss.2018.23082"},{"key":"32_CR14","doi-asserted-by":"crossref","unstructured":"Luu, L., et al.: Making smart contracts smarter. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 254\u2013269. ACM (2016)","DOI":"10.1145\/2976749.2978309"},{"key":"32_CR15","unstructured":"Manticore (2018). https:\/\/github.com\/trailofbits\/manticore"},{"key":"32_CR16","unstructured":"McKie, S.: Solidity learning: Revert(), Assert(), and Require() in solidity, and the new REVERT Opcode in the EVM (2017). https:\/\/medium.com\/blockchannel\/the-use-of-revert-assert-and-require-in-solidity-and-the-new-revert-opcode-in-the-evm-1a3a7990e06e"},{"key":"32_CR17","unstructured":"Mueller, B.: Mythril - Reversing and Bug Hunting Framework for the Ethereum Blockchain"},{"key":"32_CR18","unstructured":"Nakamoto, S., et al.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008)"},{"key":"32_CR19","doi-asserted-by":"crossref","unstructured":"Nikoli\u0107, I., et al.: Finding the greedy, prodigal, and suicidal contracts at scale. In: Proceedings of the 34th Annual Computer Security Applications Conference, pp. 653\u2013663. ACM (2018)","DOI":"10.1145\/3274694.3274743"},{"key":"32_CR20","unstructured":"Palladino, S.: The parity wallet hack explained - zeppelin blog (2017). https:\/\/blog.zeppelin.solutions\/on-the-parity-wallet-multisig-hack-405a8c12e8f7"},{"key":"32_CR21","unstructured":"SmartDec: automatically checking smart contracts for vulnerabilities and bad practices (2018). https:\/\/tool.smartdec.net"},{"key":"32_CR22","unstructured":"SMARX: Capture the ether - the game of ethereum smart contract security (2018). https:\/\/capturetheether.com"},{"key":"32_CR23","unstructured":"SpankChain: We Got Spanked: What We Know So Far (2018). https:\/\/medium.com\/spankchain\/we-got-spanked-what-we-know-so-far-d5ed3a0f38fe"},{"key":"32_CR24","unstructured":"Szabo, N.: Smart Contracts. Unpublished manuscript (1994)"},{"key":"32_CR25","unstructured":"Tann, A., Han, X.J., Gupta, S.S., Ong, Y.S.: Towards safer smart contracts: a sequence learning approach to detecting vulnerabilities (2018). arXiv preprint arXiv:1811.06632"},{"key":"32_CR26","doi-asserted-by":"crossref","unstructured":"Tsankov, P., et al.: Securify: practical security analysis of smart contracts. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 67\u201382. ACM (2018)","DOI":"10.1145\/3243734.3243780"},{"key":"32_CR27","unstructured":"Wood, G., et al.: Ethereum: A Secure Decentralised Generalised Transaction Ledger. Ethereum project yellow paper 151, 1\u201332 (2014)"},{"key":"32_CR28","unstructured":"Zeppelin team: The Ethernaut Wargame. https:\/\/ethernaut.zeppelin.solutions"}],"container-title":["Lecture Notes in Computer Science","Future Data and Security Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-35653-8_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,5]],"date-time":"2021-02-05T05:56:50Z","timestamp":1612504610000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-35653-8_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030356521","9783030356538"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-35653-8_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"20 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FDSE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Future Data and Security Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nha Trang City","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 November 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 November 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fdse2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/fdse.hcmut.edu.vn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}