{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T07:04:51Z","timestamp":1775545491543,"version":"3.50.1"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030940287","type":"print"},{"value":"9783030940294","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-94029-4_6","type":"book-chapter","created":{"date-parts":[[2022,1,11]],"date-time":"2022-01-11T03:02:48Z","timestamp":1641870168000},"page":"79-96","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Vulnerability and\u00a0Transaction Behavior Based Detection of\u00a0Malicious Smart Contracts"],"prefix":"10.1007","author":[{"given":"Rachit","family":"Agarwal","sequence":"first","affiliation":[]},{"given":"Tanmay","family":"Thapliyal","sequence":"additional","affiliation":[]},{"given":"Sandeep Kumar","family":"Shukla","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,11]]},"reference":[{"issue":"9","key":"6_CR1","first-page":"1","volume":"6","author":"R Agarwal","year":"2021","unstructured":"Agarwal, R., Barve, S., Shukla, S.: Detecting malicious accounts in permissionless blockchains using temporal graph properties. Appl. Network Sci. 6(9), 1\u201330 (2021)","journal-title":"Appl. Network Sci."},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Agarwal, R., Thapliyal, T., Shukla, S.: Detecting malicious accounts showing adversarial behavior in permissionless blockchains, pp. 1\u201315 (2021)","DOI":"10.1145\/3549527"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Alkhalifah, A., Ng, A., Kayes, A., Chowdhury, J., Alazab, M., Watters, P.: A taxonomy of blockchain threats and vulnerabilities. In: Maleh, Y., Shojafar, M., Alazab, M., Romdhani, I. (eds.) Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications, pp. 1\u201326. Taylor and Francis Group (2020)","DOI":"10.1201\/9780429324932-2"},{"key":"6_CR4","unstructured":"Angelo, M., Salzer, G.: A survey of tools for analyzing ethereum smart contracts. In: International Conference on Decentralized Applications and Infrastructures, pp. 69\u201378. IEEE, Newark, CA (2019)"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Camino, R., Torres, F., Baden, M., State, R.: A data science approach for detecting honeypots in ethereum. In: International Conference on Blockchain and Cryptocurrency (ICBC), pp. 1\u20139. IEEE, Toronto, Canada (2020)","DOI":"10.1109\/ICBC48266.2020.9169396"},{"issue":"1","key":"6_CR6","first-page":"1","volume":"21","author":"L Chen","year":"2020","unstructured":"Chen, L., Peng, J., Liu, Y., Li, J., Xie, F., Zheng, Z.: Phishing scams detection in ethereum transaction network. Trans. Internet Technol. 21(1), 1\u201316 (2020)","journal-title":"Trans. Internet Technol."},{"key":"6_CR7","doi-asserted-by":"publisher","first-page":"121","DOI":"10.2991\/ijndc.k.190710.003","volume":"7","author":"W Dingman","year":"2019","unstructured":"Dingman, W., et al.: Defects and vulnerabilities in smart contracts, a classification using the NIST bugs framework. Int. J. Networked Distrib. Comput. 7, 121\u2013132 (2019)","journal-title":"Int. J. Networked Distrib. Comput."},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Durieux, T., Ferreira, J., Abreu, R., Cruz, P.: Empirical review of automated analysis tools on 47,587 ethereum smart contracts. In: 42nd International Conference on Software Engineering, pp. 530\u2013541. ACM\/IEEE, Seoul, South Korea (2020)","DOI":"10.1145\/3377811.3380364"},{"key":"6_CR9","unstructured":"Etherscan: Ethereum Developer APIs, October 2020. https:\/\/etherscan.io\/apis, Accessed 09 Oct 2020"},{"key":"6_CR10","unstructured":"Etherscan: Label Word Cloud, October 2020. https:\/\/etherscan.io\/labelcloud\/, Accessed 09 Oct 2020"},{"key":"6_CR11","doi-asserted-by":"publisher","first-page":"113318","DOI":"10.1016\/j.eswa.2020.113318","volume":"150","author":"S Farrugia","year":"2020","unstructured":"Farrugia, S., Ellul, J., Azzopardi, G.: Detection of illicit accounts over the ethereum blockchain. Expert Syst. Appl. 150, 113318 (2020)","journal-title":"Expert Syst. Appl."},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Feist, J., Greico, G., Groce, A.: Slither: a static analysis framework for smart contracts. In: 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain, pp. 8\u201315. IEEE, Montreal, Canada (2019)","DOI":"10.1109\/WETSEB.2019.00008"},{"key":"6_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1007\/978-3-030-66626-2_10","volume-title":"Security, Privacy, and Applied Cryptography Engineering","author":"BC Gupta","year":"2020","unstructured":"Gupta, B.C., Kumar, N., Handa, A., Shukla, S.K.: An insecurity study of ethereum smart contracts. In: Batina, L., Picek, S., Mondal, M. (eds.) SPACE 2020. LNCS, vol. 12586, pp. 188\u2013207. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-66626-2_10"},{"key":"6_CR14","unstructured":"Mueller, B.: Smashing ethereum smart contracts for fun and real profit. In: 9th Annual HITB Security Conference (HITBSecConf), pp. 1\u201354. HITB, Amsterdam, The Netherlands (2018)"},{"key":"6_CR15","unstructured":"Parizi, R., Dehghantanha, A., Choo, R., Singh, A.: Empirical vulnerability analysis of automated smart contracts security testing on blockchains. In: 28th Annual International Conference on Computer Science and Software Engineering, pp. 103\u2013113. ACM, Markham, Canada (2018)"},{"key":"6_CR16","unstructured":"Perez, D., Livshits, B.: Smart contract vulnerabilities: vulnerable does not imply exploited. In: 30th USENIX Security Symposium, pp. 1\u201317. USENIX Association, Vancouver, B.C. (2021)"},{"key":"6_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/978-3-030-36938-5_7","volume-title":"Network and System Security","author":"H Sun","year":"2019","unstructured":"Sun, H., Ruan, N., Liu, H.: Ethereum analysis via node clustering. In: Liu, J.K., Huang, X. (eds.) NSS 2019. LNCS, vol. 11928, pp. 114\u2013129. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-36938-5_7"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Tikhomirov, S., Voskresenskaya, E., Ivanitskiy, I., Takhaviev, R., Marchenko, E., Alexandrov, Y.: Smartcheck: static analysis of ethereum smart contracts. In: 1st International Workshop on Emerging Trends in Software Engineering for Blockchain, pp. 9\u201316. ACM, Gothenburg, Sweden (2018)","DOI":"10.1145\/3194113.3194115"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Wang, W., Song, J., Xu, G., Li, Y., Wang, H., Su, C.: Contractward: automated vulnerability detection models for ethereum smart contracts. Trans. Network Sci. Eng. 8(2), 1133\u20131144 (2020)","DOI":"10.1109\/TNSE.2020.2968505"}],"container-title":["Lecture Notes in Computer Science","Cyberspace Safety and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-94029-4_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,22]],"date-time":"2023-01-22T14:20:25Z","timestamp":1674397225000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-94029-4_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030940287","9783030940294"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-94029-4_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"11 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Cyberspace Safety and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 November 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 November 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"css2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/css2021.compute.dtu.dk\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}