{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T09:59:43Z","timestamp":1768903183537,"version":"3.49.0"},"publisher-location":"Cham","reference-count":41,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031324147","type":"print"},{"value":"9783031324154","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-32415-4_32","type":"book-chapter","created":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T20:25:45Z","timestamp":1689971145000},"page":"516-538","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Not All Code are Create2 Equal"],"prefix":"10.1007","author":[{"given":"Michael","family":"Fr\u00f6wis","sequence":"first","affiliation":[]},{"given":"Rainer","family":"B\u00f6hme","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,22]]},"reference":[{"key":"32_CR1","unstructured":"EVM - implement EIP 1014: Skinny CREATE2 #1165. https:\/\/github.com\/trailofbits\/manticore\/issues\/1165. Accessed 28 Oct 2021"},{"key":"32_CR2","unstructured":"0age: Metamorphic. https:\/\/github.com\/0age\/metamorphic. Accessed 07 April 2021"},{"key":"32_CR3","unstructured":"0age: On Efficient Ethereum Addresses (2018). https:\/\/medium.com\/coinmonks\/on-efficient-ethereum-addresses-3fef0596e263. Accessed 20 May 2021"},{"key":"32_CR4","unstructured":"0age: Etherscan CREATE2SafeDeploy (2019). https:\/\/etherscan.io\/address\/0x5df4c8e56fe3a95f98ce3d1935abd1b187525915\/. Accessed 07 Apr 2021"},{"key":"32_CR5","unstructured":"0age: On Efficient Ethereum Storage (2019). https:\/\/medium.com\/coinmonks\/on-efficient-ethereum-storage-c76869591add. Accessed 25 May 2021"},{"key":"32_CR6","unstructured":"Anderson, R., et al.: Measuring the changing cost of cybercrime. In: Workshop on the Economics of Information Security (WEIS). Harvard University, Cambridge (2019)"},{"key":"32_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/978-3-030-03769-7_8","volume-title":"Runtime Verification","author":"S Azzopardi","year":"2018","unstructured":"Azzopardi, S., Ellul, J., Pace, G.J.: Monitoring smart contracts: ContractLarva and open challenges beyond. In: Colombo, C., Leucker, M. (eds.) RV 2018. LNCS, vol. 11237, pp. 113\u2013137. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03769-7_8"},{"issue":"10","key":"32_CR8","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1145\/3372115","volume":"63","author":"R B\u00f6hme","year":"2020","unstructured":"B\u00f6hme, R., Eckey, L., Moore, T., Narula, N., Ruffing, T., Zohar, A.: Responsible vulnerability disclosure in cryptocurrencies. Commun. ACM 63(10), 62\u201371 (2020). https:\/\/doi.org\/10.1145\/3372115","journal-title":"Commun. ACM"},{"key":"32_CR9","unstructured":"Buterin, V.: Prevent overwriting contracts #684 (2017). https:\/\/github.com\/ethereum\/EIPs\/issues\/684. Accessed 07 Apr 2021"},{"key":"32_CR10","unstructured":"Buterin, V.: EIP 1014: Skinny Create2 (2018). https:\/\/github.com\/ethereum\/EIPs\/blob\/master\/EIPS\/eip-1014.md. Accessed 07 Apr 2021"},{"key":"32_CR11","doi-asserted-by":"publisher","unstructured":"Chen, T., Li, X., Luo, X., Zhang, X.: Under-optimized smart contracts devour your money. In: 2017 IEEE 24th International Conference on Software Analysis, Evolution and Reengineering (SANER), pp. 442\u2013446. IEEE (2017). https:\/\/doi.org\/10.1109\/SANER.2017.7884650","DOI":"10.1109\/SANER.2017.7884650"},{"key":"32_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-72359-4_1","volume-title":"Information Security Practice and Experience","author":"T Chen","year":"2017","unstructured":"Chen, T., et al.: An adaptive gas cost mechanism for ethereum to defend against under-priced DoS attacks. In: Liu, J.K., Samarati, P. (eds.) ISPEC 2017. LNCS, vol. 10701, pp. 3\u201324. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-72359-4_1"},{"key":"32_CR13","unstructured":"Coleman, J., Horne, L., Xuanji, L.: Counterfactual: Generalized State Channels (2018). https:\/\/l4.ventures\/papers\/statechannels.pdf. Accessed 07 Apr 2021"},{"key":"32_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1007\/978-3-030-03427-6_23","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation. Industrial Practice","author":"C Colombo","year":"2018","unstructured":"Colombo, C., Ellul, J., Pace, G.J.: Contracts over smart contracts: recovering from violations dynamically. In: Margaria, T., Steffen, B. (eds.) ISoLA 2018. LNCS, vol. 11247, pp. 300\u2013315. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03427-6_23"},{"key":"32_CR15","doi-asserted-by":"publisher","unstructured":"Di Angelo, M., Salzer, G.: A survey of tools for analyzing ethereum smart contracts. In: 2019 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON), pp. 69\u201378. IEEE (2019). https:\/\/doi.org\/10.1109\/DAPPCON.2019.00018","DOI":"10.1109\/DAPPCON.2019.00018"},{"key":"32_CR16","doi-asserted-by":"publisher","unstructured":"Di Angelo, M., Salzer, G.: Collateral use of deployment code for smart contracts in ethereum. In: 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp. 1\u20135. IEEE (2019). https:\/\/doi.org\/10.1109\/NTMS.2019.8763828","DOI":"10.1109\/NTMS.2019.8763828"},{"key":"32_CR17","doi-asserted-by":"publisher","unstructured":"Di Angelo, M., Salzer, G.: Characteristics of wallet contracts on ethereum. In: 2020 2nd Conference on Blockchain Research and Applications for Innovative Networks and Services (BRAINS), pp. 232\u2013239. IEEE (2020). https:\/\/doi.org\/10.1109\/BRAINS49436.2020.9223287","DOI":"10.1109\/BRAINS49436.2020.9223287"},{"key":"32_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-662-58820-8_22","volume-title":"Financial Cryptography and Data Security, WTSC Workshop","author":"T Dickerson","year":"2019","unstructured":"Dickerson, T., Gazzillo, P., Herlihy, M., Saraph, V., Koskinen, E.: Proof-carrying smart contracts. In: Zohar, A., et al. (eds.) Financial Cryptography and Data Security, WTSC Workshop. Lecture Notes in Computer Science, vol. 10958, pp. 325\u2013338. Springer, Heidelberg (2019). https:\/\/doi.org\/10.1007\/978-3-662-58820-8_22"},{"key":"32_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-319-67816-0_20","volume-title":"Data Privacy Management, Cryptocurrencies and Blockchain Technology","author":"M Fr\u00f6wis","year":"2017","unstructured":"Fr\u00f6wis, M., B\u00f6hme, R.: In code we trust? Measuring the control flow immutability of all smart contracts deployed on ethereum. In: Garcia-Alfaro, J., Navarro-Arribas, G., Hartenstein, H., Herrera-Joancomart\u00ed, J. (eds.) ESORICS\/DPM\/CBT -2017. LNCS, vol. 10436, pp. 357\u2013372. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-67816-0_20"},{"key":"32_CR20","unstructured":"Barros, G., Gallagher, P.: EIP-1822: Universal Upgradeable Proxy Standard (UUPS) (2019). https:\/\/eips.ethereum.org\/EIPS\/eip-1822. Accessed 07 Apr 2021"},{"key":"32_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-3-319-96145-3_4","volume-title":"Computer Aided Verification","author":"I Grishchenko","year":"2018","unstructured":"Grishchenko, I., Maffei, M., Schneidewind, C.: Foundations and tools for the static analysis of ethereum smart contracts. In: Chockler, H., Weissenbacher, G. (eds.) CAV 2018. LNCS, vol. 10981, pp. 51\u201378. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-96145-3_4"},{"key":"32_CR22","unstructured":"Hertig, A.: So, Ethereum\u2019s Blockchain is Still Under Attack.... (2016). https:\/\/www.coindesk.com\/so-ethereums-blockchain-is-still-under-attack\/. Accessed 18 June 2017"},{"key":"32_CR23","unstructured":"Ardis, I., Tang, W.: ECIP 1056: Agharta EVM and Protocol Upgrades (2020). https:\/\/ethereumclassic.org\/blog\/2020-01-11-agharta-hard-fork-upgrade. Accessed 25 May 2021"},{"key":"32_CR24","unstructured":"Jameson, H.: FAQ: Upcoming Ethereum Hard Fork (2016). https:\/\/blog.ethereum.org\/2016\/10\/18\/faq-upcoming-ethereum-hard-fork\/ Accessed 18 June 2017"},{"key":"32_CR25","unstructured":"Izquierdo, J., Araoz, M.: EIP-897: ERC DelegateProxy (2018). https:\/\/eips.ethereum.org\/EIPS\/eip-897. Accessed 07 Apr 2021"},{"key":"32_CR26","unstructured":"Joveski, B.: USDC payment processing in Coinbase Commerce (2019). https:\/\/blog.coinbase.com\/usdc-payment-processing-in-coinbase-commerce-b1af1c82fb0. Accessed 18 Nov 2021"},{"key":"32_CR27","unstructured":"Breidenbach, L., Daian, P, Tram\u00e8r, F.: GasToken.io - Cheaper Ethereum transactions, today. https:\/\/gastoken.io\/#GST2. Accessed 19 Oct 2021"},{"key":"32_CR28","unstructured":"Maurelian: Newsletter 16 - CREATE2 FAQ (2019). https:\/\/consensys.net\/diligence\/blog\/2019\/02\/smart-contract-security-newsletter-16-create2-faq\/. Accessed 08 May 2021"},{"key":"32_CR29","doi-asserted-by":"publisher","unstructured":"Mossberg, M., et al.: Manticore: a user-friendly symbolic execution framework for binaries and smart contracts. In: 2019 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 1186\u20131189. IEEE (2019). https:\/\/doi.org\/10.1109\/ASE.2019.00133","DOI":"10.1109\/ASE.2019.00133"},{"key":"32_CR30","unstructured":"1inch Network: 1inch introduces Chi Gastoken. https:\/\/blog.1inch.io\/1inch-introduces-chi-gastoken-d0bd5bb0f92b. Accessed 05 May 2021"},{"key":"32_CR31","unstructured":"OpenZeppelin: OpenZeppelin Proxy Contract Implementations. https:\/\/docs.openzeppelin.com\/contracts\/4.x\/api\/proxy. Accessed 07 Nov 2021"},{"key":"32_CR32","doi-asserted-by":"crossref","unstructured":"Palladino, S.: EIP-1967: Standard Proxy Storage Slots (2019). https:\/\/eips.ethereum.org\/EIPS\/eip-1967. Accessed 07 Apr 2021","DOI":"10.1007\/978-1-4842-5278-9"},{"key":"32_CR33","unstructured":"Murray, P., Welch, N., Messerman, J.: EIP-1167: Minimal Proxy Contract (2018). https:\/\/eips.ethereum.org\/EIPS\/eip-1167. Accessed 07 Apr 2021"},{"key":"32_CR34","doi-asserted-by":"crossref","unstructured":"P\u00e9rez, D., Livshits, B.: Broken metre: attacking resource metering in EVM. In: 27th Annual Network and Distributed System Security Symposium, NDSS. The Internet Society (2020)","DOI":"10.14722\/ndss.2020.24267"},{"key":"32_CR35","unstructured":"rajeevgopalakrishna: Potential security implications of CREATE2? (EIP-1014) (2019). https:\/\/ethereum-magicians.org\/t\/potential-security-implications-of-create2-eip-1014\/2614. Accessed 08 Apr 2021"},{"key":"32_CR36","doi-asserted-by":"crossref","unstructured":"Reijsbergen, D., Sridhar, S., Monnot, B., Leonardos, S., Skoulakis, S., Piliouras, G.: Transaction Fees on a Honeymoon: Ethereum\u2019s EIP-1559 One Month Later. arXiv preprint arXiv:2110.04753 (2021)","DOI":"10.1109\/Blockchain53845.2021.00034"},{"key":"32_CR37","unstructured":"Rodler, M., Li, W., Karame, G.O., Davi, L.: EVMPatch: timely and automated patching of ethereum smart contracts. In: 30th USENIX Security Symposium. USENIX Association (2021)"},{"key":"32_CR38","unstructured":"(((Swende))), M.H.: Testing awareness levels here. After Constantinople, can contracts that you interact suddenly change code, in-place? (2019). https:\/\/twitter.com\/mhswende\/status\/1093596010545336320. Accessed 06 Oct 2021"},{"key":"32_CR39","unstructured":"Torres, C.F., Steichen, M., et al.: The art of the scam: demystifying honeypots in ethereum smart contracts. In: 28th USENIX Security Symposium, pp. 1591\u20131607. USENIX Association (2019)"},{"key":"32_CR40","unstructured":"Wood, G.: Ethereum: A Secure Decentralised Generalised Transaction Ledger (Petersburg revision) (2021). https:\/\/ethereum.github.io\/yellowpaper\/paper.pdf. Accessed 07 Apr 2021"},{"key":"32_CR41","unstructured":"Zhou, Y., Kumar, D., Bakshi, S., Mason, J., Miller, A., Bailey, M.: Erays: reverse engineering ethereum\u2019s opaque smart contracts. In: 27th USENIX Security Symposium, pp. 1371\u20131385. USENIX Association (2018)"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security. FC 2022 International Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-32415-4_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T20:28:57Z","timestamp":1689971337000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-32415-4_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031324147","9783031324154"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-32415-4_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"22 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Grenada","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Grenada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 May 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 May 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc22.ifca.ai\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Hotcrp","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"159","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}