{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T22:08:24Z","timestamp":1766268504908,"version":"3.40.3"},"publisher-location":"Cham","reference-count":56,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031171390"},{"type":"electronic","value":"9783031171406"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-17140-6_3","type":"book-chapter","created":{"date-parts":[[2022,9,24]],"date-time":"2022-09-24T06:19:49Z","timestamp":1664000389000},"page":"46-66","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Opportunistic Algorithmic Double-Spending:"],"prefix":"10.1007","author":[{"given":"Nicholas","family":"Stifter","sequence":"first","affiliation":[]},{"given":"Aljosha","family":"Judmayer","sequence":"additional","affiliation":[]},{"given":"Philipp","family":"Schindler","sequence":"additional","affiliation":[]},{"given":"Edgar","family":"Weippl","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,25]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Apostolaki, M., Zohar, A., Vanbever, L.: Hijacking bitcoin: routing attacks on cryptocurrencies. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 375\u2013392. IEEE (2017)","DOI":"10.1109\/SP.2017.29"},{"key":"3_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1007\/978-3-662-58387-6_29","volume-title":"Financial Cryptography and Data Security","author":"N Atzei","year":"2018","unstructured":"Atzei, N., Bartoletti, M., Lande, S., Zunino, R.: A formal model of bitcoin transactions. In: Meiklejohn, S., Sako, K. (eds.) FC 2018. LNCS, vol. 10957, pp. 541\u2013560. Springer, Heidelberg (2018). https:\/\/doi.org\/10.1007\/978-3-662-58387-6_29"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Badertscher, C., Ga\u017ei, P., Kiayias, A., Russell, A., Zikas, V.: Ouroboros genesis: composable proof-of-stake blockchains with dynamic availability. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 913\u2013930 (2018)","DOI":"10.1145\/3243734.3243848"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Botta, V., Friolo, D., Venturi, D., Visconti, I.: Shielded computations in smart contracts overcoming forks. In: Financial Cryptography and Data Security-25th International Conference, FC, pp. 1\u20135 (2021)","DOI":"10.1007\/978-3-662-64322-8_4"},{"key":"3_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-030-61467-6_6","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation: Applications","author":"L Br\u00fcnjes","year":"2020","unstructured":"Br\u00fcnjes, L., Gabbay, M.J.: UTxO- vs account-based smart contract blockchain programming paradigms. In: Margaria, T., Steffen, B. (eds.) ISoLA 2020. LNCS, vol. 12478, pp. 73\u201388. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-61467-6_6"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Carlsten, M., Kalodner, H., Weinberg, S.M., Narayanan, A.: On the instability of bitcoin without the block reward. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 154\u2013167. ACM (2016)","DOI":"10.1145\/2976749.2978408"},{"key":"3_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1007\/978-3-030-54455-3_37","volume-title":"Financial Cryptography and Data Security","author":"MMT Chakravarty","year":"2020","unstructured":"Chakravarty, M.M.T., Chapman, J., MacKenzie, K., Melkonian, O., Peyton Jones, M., Wadler, P.: The extended UTXO model. In: Bernhard, M., et al. (eds.) FC 2020. LNCS, vol. 12063, pp. 525\u2013539. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-54455-3_37"},{"key":"3_CR8","unstructured":"Corduan, J., Vinogradova, P., Gudemann, M.: A formal specification of the cardano ledger (2019)"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Daian, P., et al.: Flash boys 2.0: frontrunning in decentralized exchanges, miner extractable value, and consensus instability. In: 2020 IEEE Symposium on Security and Privacy (SP), pp. 910\u2013927. IEEE (2020)","DOI":"10.1109\/SP40000.2020.00040"},{"key":"3_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1007\/978-3-319-78375-8_3","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2018","author":"B David","year":"2018","unstructured":"David, B., Ga\u017ei, P., Kiayias, A., Russell, A.: Ouroboros praos: an adaptively-secure, semi-synchronous proof-of-stake blockchain. In: Nielsen, J.B., Rijmen, V. (eds.) EUROCRYPT 2018. LNCS, vol. 10821, pp. 66\u201398. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-78375-8_3"},{"key":"3_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1007\/978-3-662-58820-8_6","volume-title":"Financial Cryptography and Data Security","author":"S Delgado-Segura","year":"2019","unstructured":"Delgado-Segura, S., P\u00e9rez-Sol\u00e0, C., Navarro-Arribas, G., Herrera-Joancomart\u00ed, J.: Analysis of the bitcoin UTXO set. In: Zohar, A., et al. (eds.) FC 2018. LNCS, vol. 10958, pp. 78\u201391. Springer, Heidelberg (2019). https:\/\/doi.org\/10.1007\/978-3-662-58820-8_6"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Di Angelo, M., Salzer, G.: Wallet contracts on ethereum. In: 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pp. 1\u20132. IEEE (2020)","DOI":"10.1109\/ICBC48266.2020.9169467"},{"key":"3_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/978-3-030-57990-6_2","volume-title":"Security and Cryptography for Networks","author":"T Dinsdale-Young","year":"2020","unstructured":"Dinsdale-Young, T., Magri, B., Matt, C., Nielsen, J.B., Tschudi, D.: Afgjort: a partially synchronous finality layer for blockchains. In: Galdi, C., Kolesnikov, V. (eds.) SCN 2020. LNCS, vol. 12238, pp. 24\u201344. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-57990-6_2"},{"key":"3_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/978-3-030-43725-1_13","volume-title":"Financial Cryptography and Data Security","author":"S Eskandari","year":"2020","unstructured":"Eskandari, S., Moosavi, S., Clark, J.: SoK: transparent dishonesty: front-running attacks on blockchain. In: Bracciali, A., Clark, J., Pintore, F., R\u00f8nne, P.B., Sala, M. (eds.) FC 2019. LNCS, vol. 11599, pp. 170\u2013189. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-43725-1_13"},{"key":"3_CR15","unstructured":"Ethereum Community: Issue#134 ethereum\/eips (2016). https:\/\/github.com\/ethereum\/EIPs\/issues\/134"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Ferreira Torres, C., Baden, M., Norvill, R., Jonker, H.: \u00c6gis: smart shielding of smart contracts. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 2589\u20132591 (2019)","DOI":"10.1145\/3319535.3363263"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Ferreira Torres, C., Iannillo, A.K., Gervais, A., et al.: The eye of horus: spotting and analyzing attacks on ethereum smart contracts. In: International Conference on Financial Cryptography and Data Security, Grenada, 1\u20135 March 2021 (2021)","DOI":"10.1007\/978-3-662-64322-8_2"},{"key":"3_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/978-3-662-46803-6_10","volume-title":"Advances in Cryptology - EUROCRYPT 2015","author":"J Garay","year":"2015","unstructured":"Garay, J., Kiayias, A., Leonardos, N.: The bitcoin backbone protocol: analysis and applications. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9057, pp. 281\u2013310. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46803-6_10"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Ga\u017ei, P., Kiayias, A., Russell, A.: Stake-Bleeding Attacks on Proof-of-Stake Blockchains. Cryptology ePrint Archive, Report 2018\/248 (2018)","DOI":"10.1109\/CVCBT.2018.00015"},{"key":"3_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/978-3-662-58820-8_9","volume-title":"Financial Cryptography and Data Security","author":"M Grundmann","year":"2019","unstructured":"Grundmann, M., Neudecker, T., Hartenstein, H.: Exploiting transaction accumulation and double spends for topology inference in bitcoin. In: Zohar, A., et al. (eds.) FC 2018. LNCS, vol. 10958, pp. 113\u2013126. Springer, Heidelberg (2019). https:\/\/doi.org\/10.1007\/978-3-662-58820-8_9"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Guerraoui, R., Kuznetsov, P., Monti, M., Pavlovi\u010d, M., Seredinschi, D.A.: The consensus number of a cryptocurrency. In: Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing, pp. 307\u2013316 (2019)","DOI":"10.1145\/3293611.3331589"},{"key":"3_CR22","doi-asserted-by":"publisher","first-page":"76153","DOI":"10.1109\/ACCESS.2021.3081998","volume":"9","author":"M Iqbal","year":"2021","unstructured":"Iqbal, M., Matulevi\u010dius, R.: Exploring sybil and double-spending risks in blockchain systems. IEEE Access 9, 76153\u201376177 (2021)","journal-title":"IEEE Access"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Judmayer, A., Stifter, N., Schindler, P., Weippl, E.: Estimating (miner) extractable value is hard, let\u2019s go shopping! In: 3rd Workshop on Coordination of Decentralized Finance (CoDecFin) (2022, to appear)","DOI":"10.1007\/978-3-031-32415-4_6"},{"key":"3_CR24","unstructured":"Judmayer, A., et al.: Pay to win: cheap, crowdfundable, cross-chain algorithmic incentive manipulation attacks on pow cryptocurrencies (2019). https:\/\/ia.cr\/2019\/775"},{"key":"3_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1007\/978-3-662-63958-0_38","volume-title":"Financial Cryptography and Data Security. FC 2021 International Workshops","author":"A Judmayer","year":"2021","unstructured":"Judmayer, A., et al.: SoK: algorithmic incentive manipulation attacks on permissionless PoW cryptocurrencies. In: Bernhard, M., et al. (eds.) FC 2021. LNCS, vol. 12676, pp. 507\u2013532. Springer, Heidelberg (2021). https:\/\/doi.org\/10.1007\/978-3-662-63958-0_38"},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"Karakostas, D., Kiayias, A.: Securing proof-of-work ledgers via checkpointing. In: 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pp. 1\u20135. IEEE (2021)","DOI":"10.1109\/ICBC51069.2021.9461066"},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"Karame, G.O., Androulaki, E., Capkun, S.: Double-spending fast payments in bitcoin. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 906\u2013917 (2012)","DOI":"10.1145\/2382196.2382292"},{"key":"3_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1007\/978-3-030-56877-1_16","volume-title":"Advances in Cryptology \u2013 CRYPTO 2020","author":"M Kelkar","year":"2020","unstructured":"Kelkar, M., Zhang, F., Goldfeder, S., Juels, A.: Order-fairness for byzantine consensus. In: Micciancio, D., Ristenpart, T. (eds.) CRYPTO 2020. LNCS, vol. 12172, pp. 451\u2013480. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-56877-1_16"},{"key":"3_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-319-63688-7_12","volume-title":"Advances in Cryptology \u2013 CRYPTO 2017","author":"A Kiayias","year":"2017","unstructured":"Kiayias, A., Russell, A., David, B., Oliynykov, R.: Ouroboros: a provably secure proof-of-stake blockchain protocol. In: Katz, J., Shacham, H. (eds.) CRYPTO 2017. LNCS, vol. 10401, pp. 357\u2013388. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-63688-7_12"},{"key":"3_CR30","doi-asserted-by":"crossref","unstructured":"Kolluri, A., Nikolic, I., Sergey, I., Hobor, A., Saxena, P.: Exploiting the laws of order in smart contracts. In: Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 363\u2013373 (2019)","DOI":"10.1145\/3293882.3330560"},{"key":"3_CR31","unstructured":"Lovejoy, J.P.T.: An empirical analysis of chain reorganizations and double-spend attacks on proof-of-work cryptocurrencies. Master\u2019s thesis, Massachusetts Institute of Technology (2020)"},{"key":"3_CR32","doi-asserted-by":"crossref","unstructured":"Luu, L., Chu, D.H., Olickel, H., Saxena, P., Hobor, A.: Making smart contracts smarter. In: 23rd ACM Conference on Computer and Communications Security (ACM CCS 2016) (2016)","DOI":"10.1145\/2976749.2978309"},{"key":"3_CR33","unstructured":"Maersk, N.: Thedaohardforkoracle (2016). https:\/\/github.com\/veox\/solidity-contracts\/blob\/TheDAOHardForkOracle-v0.1\/TheDAOHardForkOracle\/TheDAOHardForkOracle.sol"},{"key":"3_CR34","unstructured":"Mai, A., Pfeffer, K., Gusenbauer, M., Weippl, E., Krombholz, K.: User mental models of cryptocurrency systems-a grounded theory approach. In: Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), pp. 341\u2013358 (2020)"},{"key":"3_CR35","doi-asserted-by":"crossref","unstructured":"McCorry, P., Heilman, E., Miller, A.: Atomically Trading with Roger: gambling on the success of a hardfork. In: CBT 2017: Proceedings of the International Workshop on Cryptocurrencies and Blockchain Technology (2017)","DOI":"10.1007\/978-3-319-67816-0_19"},{"key":"3_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-662-58820-8_1","volume-title":"Financial Cryptography and Data Security","author":"P McCorry","year":"2019","unstructured":"McCorry, P., Hicks, A., Meiklejohn, S.: Smart contracts for bribing miners. In: Zohar, A., et al. (eds.) FC 2018. LNCS, vol. 10958, pp. 3\u201318. Springer, Heidelberg (2019). https:\/\/doi.org\/10.1007\/978-3-662-58820-8_1"},{"key":"3_CR37","unstructured":"Meissner, R.: Gnosis community: Gnosis safe contracts - Executor.sol. https:\/\/github.com\/safe-global\/safe-contracts\/blob\/main\/contracts\/base\/Executor.sol. Accessed 28 May 2022"},{"key":"3_CR38","unstructured":"Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008)"},{"key":"3_CR39","doi-asserted-by":"crossref","unstructured":"Natoli, C., Gramoli, V.: The blockchain anomaly. In: 2016 IEEE 15th International Symposium on Network Computing and Applications (NCA), pp. 310\u2013317. IEEE (2016)","DOI":"10.1109\/NCA.2016.7778635"},{"key":"3_CR40","doi-asserted-by":"crossref","unstructured":"Nayak, K., Kumar, S., Miller, A., Shi, E.: Stubborn mining: generalizing selfish mining and combining with an eclipse attack. In: 1st IEEE European Symposium on Security and Privacy. IEEE (2016)","DOI":"10.1109\/EuroSP.2016.32"},{"key":"3_CR41","doi-asserted-by":"crossref","unstructured":"Neu, J., Tas, E.N., Tse, D.: Ebb-and-flow protocols: a resolution of the availability-finality dilemma. In: 2021 IEEE Symposium on Security and Privacy (SP), pp. 446\u2013465. IEEE (2021)","DOI":"10.1109\/SP40001.2021.00045"},{"key":"3_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1007\/978-3-319-56614-6_22","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2017","author":"R Pass","year":"2017","unstructured":"Pass, R., Seeman, L., Shelat, A.: Analysis of the blockchain protocol in asynchronous networks. In: Coron, J.-S., Nielsen, J.B. (eds.) EUROCRYPT 2017. LNCS, vol. 10211, pp. 643\u2013673. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-56614-6_22"},{"issue":"4","key":"3_CR43","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1145\/98163.98167","volume":"22","author":"FB Schneider","year":"1990","unstructured":"Schneider, F.B.: Implementing fault-tolerant services using the state machine approach: a tutorial. ACM Comput. Surv. (CSUR) 22(4), 299\u2013319 (1990)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"3_CR44","doi-asserted-by":"crossref","unstructured":"Schwarz-Schilling, C., Neu, J., Monnot, B., Asgaonkar, A., Tas, E.N., Tse, D.: Three attacks on proof-of-stake ethereum. In: International Conference on Financial Cryptography and Data Security (2022)","DOI":"10.1007\/978-3-031-18283-9_28"},{"key":"3_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"478","DOI":"10.1007\/978-3-319-70278-0_30","volume-title":"Financial Cryptography and Data Security","author":"I Sergey","year":"2017","unstructured":"Sergey, I., Hobor, A.: A concurrent perspective on smart contracts. In: Brenner, M., et al. (eds.) FC 2017. LNCS, vol. 10323, pp. 478\u2013493. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70278-0_30"},{"key":"3_CR46","unstructured":"Sompolinsky, Y., Zohar, A.: Bitcoin\u2019s Security Model Revisited. arXiv preprint arXiv:1605.09193 (2016)"},{"key":"3_CR47","unstructured":"Todd, P.: Op_checklocktimeverify (2014). https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0065.mediawiki"},{"key":"3_CR48","doi-asserted-by":"crossref","unstructured":"Tran, M., Choi, I., Moon, G.J., Vu, A.V., Kang, M.S.: A stealthier partitioning attack against bitcoin peer-to-peer network. In: Proceedings of IEEE Symposium on Security and Privacy (IEEE S &P) (2020)","DOI":"10.1109\/SP40000.2020.00027"},{"key":"3_CR49","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/978-3-030-32101-7_8","volume-title":"Financial Cryptography and Data Security","author":"F Victor","year":"2019","unstructured":"Victor, F., L\u00fcders, B.K.: Measuring ethereum-based ERC20 token networks. In: Goldberg, I., Moore, T. (eds.) FC 2019. LNCS, vol. 11598, pp. 113\u2013129. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-32101-7_8"},{"key":"3_CR50","doi-asserted-by":"crossref","unstructured":"Wohrer, M., Zdun, U.: Smart contracts: security patterns in the ethereum ecosystem and solidity. In: 2018 International Workshop on Blockchain Oriented Software Engineering (IWBOSE), pp. 2\u20138. IEEE (2018)","DOI":"10.1109\/IWBOSE.2018.8327565"},{"issue":"2014","key":"3_CR51","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood, G., et al.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151(2014), 1\u201332 (2014)","journal-title":"Ethereum Project Yellow Paper"},{"key":"3_CR52","unstructured":"Wu, L., et al.: EthScope: A Transaction-centric Security Analytics Framework to Detect Malicious Smart Contracts on Ethereum. arXiv:2005.08278 (2020). arXiv: 2005.08278"},{"key":"3_CR53","unstructured":"Zhang, M., Zhang, X., Zhang, Y., Lin, Z.: $$\\{$$TXSPECTOR$$\\}$$: uncovering attacks in ethereum from transactions. In: 29th $$\\{$$USENIX$$\\}$$ Security Symposium ($$\\{$$USENIX$$\\}$$ Security 2020), pp. 2775\u20132792 (2020)"},{"key":"3_CR54","doi-asserted-by":"crossref","unstructured":"Zhang, R., Preneel, B.: Lay down the common metrics: evaluating proof-of-work consensus protocols\u2019 security. In: 2019 IEEE Symposium on Security and Privacy (SP). IEEE (2019)","DOI":"10.1109\/SP.2019.00086"},{"key":"3_CR55","unstructured":"Zhang, Y., Setty, S., Chen, Q., Zhou, L., Alvisi, L.: Byzantine ordered consensus without byzantine oligarchy. In: 14th $$\\{$$USENIX$$\\}$$ Symposium on Operating Systems Design and Implementation ($$\\{$$OSDI$$\\}$$ 2020), pp. 633\u2013649 (2020)"},{"key":"3_CR56","doi-asserted-by":"crossref","unstructured":"Zhou, L., Qin, K., Torres, C.F., Le, D.V., Gervais, A.: High-frequency trading on decentralized on-chain exchanges. In: 2021 IEEE Symposium on Security and Privacy (SP), pp. 428\u2013445. IEEE (2021)","DOI":"10.1109\/SP40001.2021.00027"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2022"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-17140-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,4]],"date-time":"2024-10-04T15:15:23Z","timestamp":1728054923000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-17140-6_3"}},"subtitle":["How I Learned to Stop Worrying and Love the Fork"],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031171390","9783031171406"],"references-count":56,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-17140-6_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"25 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2022.compute.dtu.dk\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"562","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"104","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}