{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T08:34:54Z","timestamp":1742978094109,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031186783"},{"type":"electronic","value":"9783031186790"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-18679-0_7","type":"book-chapter","created":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T19:36:12Z","timestamp":1676835372000},"page":"109-125","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Dissimilar Redundancy in DeFi"],"prefix":"10.1007","author":[{"given":"Daniel","family":"Perez","sequence":"first","affiliation":[]},{"given":"Lewis","family":"Gudgeon","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,19]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Atzei, N., Bartoletti, M., & Cimoli, T. (2017). A survey of attacks on ethereum smart contracts (sok). In International Conference on Principles of Security and Trust (pp. 164\u2013186) Springer.","DOI":"10.1007\/978-3-662-54455-6_8"},{"key":"7_CR2","unstructured":"Barros, G., & Gallagher, P. (2019). Eip-1822: Universal upgradeable proxy standard (uups). https:\/\/eips.ethereum.org\/EIPS\/eip-1822."},{"key":"7_CR3","unstructured":"Bloomberg. (2021). Defi platform mistakenly sends $89 million; ceo begs return. https:\/\/www.bloomberg.com\/news\/articles\/2021-10-01\/defi-platform-mistakenly-sends-89-million-ceo-begs-its-return."},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Brubaker, C., Jana, S., Ray, B., Khurshid, S., & Shmatikov, V. (2014). Using frankencerts for automated adversarial testing of certificate validation in ssl\/tls implementations. In 2014 IEEE Symposium on Security and Privacy (pp. 114\u2013129) IEEE.","DOI":"10.1109\/SP.2014.15"},{"key":"7_CR5","unstructured":"Buterin, V. (2021). Endgame. https:\/\/vitalik.ca\/general\/2021\/12\/06\/endgame.html."},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Chen, Y., Su, T., Sun, C., Su, Z., & Zhao, J. (2016). Coverage-directed differential testing of jvm implementations. In Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation (pp. 85\u201399).","DOI":"10.1145\/2908080.2908095"},{"key":"7_CR7","unstructured":"Copeland, T. (2021). Bug impacting over 50% of ethereum clients leads to fork. https:\/\/www.theblockcrypto.com\/post\/115822\/bug-impacting-over-50-of-ethereum-clients-leads-to-fork."},{"key":"7_CR8","unstructured":"CryptoSec. (2021). Comprehensive list of defi hacks and exploits. https:\/\/cryptosec.info\/defi-hacks\/."},{"key":"7_CR9","unstructured":"Ethereum. (2019). Evm lab utilities. https:\/\/github.com\/ethereum\/evmlab."},{"key":"7_CR10","unstructured":"Ethereum. (2021). Ethereum nodes and clients\u2013client diversity. https:\/\/ethereum.org\/en\/developers\/docs\/nodes-and-clients\/client-diversity\/."},{"key":"7_CR11","unstructured":"Ethereum. (2021). Layer 2 rollups. https:\/\/ethereum.org\/en\/developers\/docs\/scaling\/layer-2-rollups\/."},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Fu, Y., Ren, M., Ma, F., Shi, H., Yang, X., Jiang, Y., Li, H., & Shi, X. (2019). Evmfuzzer: detect evm vulnerabilities via fuzz testing. In Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (pp. 1110\u20131114).","DOI":"10.1145\/3338906.3341175"},{"key":"7_CR13","first-page":"360","volume":"2019","author":"L Gudgeon","year":"2019","unstructured":"Gudgeon, L., Moreno-Sanchez, P., Roos, S., McCorry, P., & Gervais, A. (2019). Sok: Off the chain transactions. IACR Cryptol. ePrint Arch.,\u00a02019, 360.","journal-title":"IACR Cryptol. ePrint Arch."},{"issue":"43","key":"7_CR14","doi-asserted-by":"publisher","first-page":"1891","DOI":"10.21105\/joss.01891","volume":"4","author":"DR MacIver","year":"2019","unstructured":"MacIver, D. R., Hatfield-Dodds, Z., et al. (2019). Hypothesis: A new approach to property-based testing. Journal of Open Source Software,\u00a04(43), 1891.","journal-title":"Journal of Open Source Software"},{"key":"7_CR15","unstructured":"Mutual, N. (2021). A decentralized alternative to insurance. https:\/\/nexusmutual.io\/."},{"key":"7_CR16","unstructured":"Palladino, S. (2019). Eip-1967: Standard proxy storage slots. https:\/\/eips.ethereum.org\/EIPS\/eip-1967."},{"key":"7_CR17","unstructured":"Perez, D., & Livshits, B. (2021). Smart contract vulnerabilities: Vulnerable does not imply exploited. In 30th USENIX Security Symposium (USENIX Security 21) (pp. 1325\u20131341). USENIX Association. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/perez."},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Qin, K., Zhou, L., Livshits, B., & Gervais, A. (2021). Attacking the defi ecosystem with flash loans for fun and profit. In International Conference on Financial Cryptography and Data Security (pp. 3\u201332). Springer.","DOI":"10.1007\/978-3-662-64322-8_1"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Rodler, M., Li, W., Karame, G. O., & Davi, L. (2019). Sereum: Protecting existing smart contracts against re-entrancy attacks. In Proceedings of 26th Annual Network & Distributed System Security Symposium (NDSS). http:\/\/tubiblio.ulb.tu-darmstadt.de\/111410\/.","DOI":"10.14722\/ndss.2019.23413"},{"key":"7_CR20","unstructured":"Uniswap. (2020). Uniswap. https:\/\/app.uniswap.org\/#\/swap"},{"key":"7_CR21","unstructured":"Vogelsteller, F., & Buterin, V. (2015). Eip-20: Erc-20 token standard. https:\/\/eips.ethereum.org\/EIPS\/eip-20."},{"key":"7_CR22","unstructured":"Werner, S. M., Perez, D., Gudgeon, L., Klages-Mundt, A., Harz, D., & Knottenbelt, W. J. (2021). Sok: Decentralized finance (defi). CoRR, abs\/2101.08778. https:\/\/arxiv.org\/abs\/2101.08778."},{"key":"7_CR23","unstructured":"Yang, Y., Kim, T., & Chun, B. G. (2021). Finding consensus bugs in ethereum via multi-transaction differential fuzzing. In 15th USENIX Symposium on Operating Systems Design and Implementation (OSDI 21) (pp. 349\u2013365). USENIX Association. https:\/\/www.usenix.org\/conference\/osdi21\/presentation\/yang."},{"key":"7_CR24","doi-asserted-by":"publisher","unstructured":"Yeh, Y. (1996). Triple-triple redundant 777 primary flight computer. In 1996 IEEE Aerospace Applications Conference. Proceedings, 1, 293\u2013307. https:\/\/doi.org\/10.1109\/AERO.1996.495891.","DOI":"10.1109\/AERO.1996.495891"}],"container-title":["Lecture Notes in Operations Research","Mathematical Research for Blockchain Economy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-18679-0_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T20:21:28Z","timestamp":1676838088000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-18679-0_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031186783","9783031186790"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-18679-0_7","relation":{},"ISSN":["2731-040X","2731-0418"],"issn-type":[{"type":"print","value":"2731-040X"},{"type":"electronic","value":"2731-0418"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"19 February 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MARBLE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The International Conference on Mathematical Research for Blockchain Economy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vilamoura","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 July 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"marble2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.marble-conference.org\/marble2022","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}