{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:51:22Z","timestamp":1767340282077,"version":"3.40.3"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031477508"},{"type":"electronic","value":"9783031477515"}],"license":[{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-47751-5_14","type":"book-chapter","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T17:02:23Z","timestamp":1701363743000},"page":"241-258","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Forsage: Anatomy of\u00a0a\u00a0Smart-Contract Pyramid Scheme"],"prefix":"10.1007","author":[{"given":"Tyler","family":"Kell","sequence":"first","affiliation":[]},{"given":"Haaroon","family":"Yousaf","sequence":"additional","affiliation":[]},{"given":"Sarah","family":"Allen","sequence":"additional","affiliation":[]},{"given":"Sarah","family":"Meiklejohn","sequence":"additional","affiliation":[]},{"given":"Ari","family":"Juels","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,1]]},"reference":[{"key":"14_CR1","unstructured":"https:\/\/arxiv.org\/abs\/2105.04380"},{"key":"14_CR2","unstructured":"MLM law of China: \u2019Prohibition of Chuanxiao\u2019. http:\/\/www.gov.cn\/zwgk\/2005-09\/03\/content_28808.htm (2005)"},{"key":"14_CR3","unstructured":"Investor alerts and bulletins:beware of pyramid schemes posing as multi-level marketing programs. https:\/\/www.sec.gov\/oiea\/investor-alerts-bulletins\/investor-alerts-ia_pyramidhtm.html, Oct 2013"},{"key":"14_CR4","unstructured":"Hannah, A.: Nigeria\u2019s crypto ban fuels mistrust in government. Coindesk"},{"key":"14_CR5","unstructured":"Antonakakis, M., et al.: Understanding the mirai botnet. In: 26th $$\\{$$USENIX$$\\}$$ security symposium ($$\\{$$USENIX$$\\}$$ Security 17), pp. 1093\u20131110 (2017)"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Bartoletti, M., Pes, B., Serusi, S.: Data mining for detecting bitcoin ponzi schemes. In: 2018 Crypto Valley Conference on Blockchain Technology (CVCBT), pp. 75\u201384 (2018)","DOI":"10.1109\/CVCBT.2018.00014"},{"key":"14_CR7","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1016\/j.future.2019.08.014","volume":"102","author":"M Bartoletti","year":"2020","unstructured":"Bartoletti, M., Carta, S., Cimoli, T., Saia, R.: Dissecting ponzi schemes on ethereum: identification, analysis, and impact. Futur. Gener. Comput. Syst. 102, 259\u2013277 (2020)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"14_CR8","unstructured":"Nick, B.: The most famous financial pyramids in the crypto world. https:\/\/cointelegraph.com\/news\/the-most-famous-financial-pyramids-in-the-crypto-world (2020)"},{"key":"14_CR9","unstructured":"Katharina, B.: How common is crypto?. https:\/\/www.statista.com\/chart\/18345\/crypto-currency-adoption\/ Accessed 21 March 2021"},{"key":"14_CR10","unstructured":"Vitalik, B., Vitalik, B.: A next-generation smart contract and decentralized application platform. ethereum white paper (2014)"},{"key":"14_CR11","unstructured":"Weili, C., Zibin, Z., Jiahui, C., Edith, N., Peilin, Z. Yuren, Z.: Detecting ponzi schemes on ethereum. In: Proceedings of the 2018 World Wide Web Conference on World Wide Web - WWW 18 (2018)"},{"key":"14_CR12","unstructured":"Tron Foundation. Tron: advanced decentralized blockchain platform. whitepaper version: 2.0. 2018"},{"key":"14_CR13","unstructured":"Miniwatts Marketing Group. Internet world stats: Usage and population statistics. https:\/\/www.internetworldstats.com\/ (2021)"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Hamrick, J.T., et al.: The economics of cryptocurrency pump and dump schemes. SSRN Electronic Journal, 01 (2018)","DOI":"10.2139\/ssrn.3303365"},{"key":"14_CR15","unstructured":"Hootsuite and WeAreSocial. Digital in 2021: National reports. https:\/\/datareportal.com\/library (2021)"},{"key":"14_CR16","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1186\/s40163-018-0093-5","volume":"7","author":"J Kamps","year":"2018","unstructured":"Kamps, J., Kleinberg, B.: To the moon: defining and detecting cryptocurrency pump-and-dumps. Crime Sci. 7, 11 (2018)","journal-title":"Crime Sci."},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Koscher, K., et al.: Experimental security analysis of a modern automobile. In: 2010 IEEE Symposium on Security and Privacy, pp. 447\u2013462 (2010)","DOI":"10.1109\/SP.2010.34"},{"key":"14_CR18","unstructured":"Madeira, A.: Onecoin: a deep dive into crypto\u2019s most notorious ponzi scheme. https:\/\/cointelegraph.com\/news\/onecoin-a-deep-dive-into-crypto-s-most-notorious-ponzi-scheme (2020)"},{"key":"14_CR19","unstructured":"Mowery, K.:. Security analysis of a full-body scanner. In: 23rd USENIX Security Symposium (USENIX Security 14), pp. 369\u2013384, San Diego, CA, August 2014. USENIX Association"},{"key":"14_CR20","unstructured":"US Department of Justice Office of Public Affairs. Three north korean military hackers indicted in wide-ranging scheme to commit cyberattacks and financial crimes across the globe. https:\/\/www.justice.gov\/opa\/pr\/three-north-korean-military-hackers-indicted-wide-ranging-scheme-commit-cyberattacks-and (2021)"},{"key":"14_CR21","unstructured":"Republic of the Philippines Securities and Exchange Commission. Forsage. https:\/\/www.sec.gov.ph\/advisories-2020\/forsage\/ (2020)"},{"key":"14_CR22","unstructured":"Republic of the Philippines Securities and Exchange Commission. Sec warns against forsage, other schemes. https:\/\/www.sec.gov.ph\/pr-2020\/sec-warns-against-forsage-other-schemes\/ (2020)"},{"key":"14_CR23","unstructured":"FORSAGE Official. Forsage overview: Earn ethereum daily! https:\/\/www.youtube.com\/watch?v=m0NzYwFfGH4 (2020)"},{"key":"14_CR24","unstructured":"Palmer, D. https:\/\/www.coindesk.com\/chinese-authorities-have-seized-a-massive-4-billion-in-crypto-from-plustoken-scam (2020)"},{"key":"14_CR25","doi-asserted-by":"crossref","unstructured":"Paquet-Clouston, M., Romiti, M., Haslhofer, B., Charvat, T.: Spams meet cryptocurrencies: Sextortion in the bitcoin ecosystem. In: Proceedings of the 1st ACM Conference on Advances in Financial Technologies, AFT \u201919, pp. 76\u201388, New York, NY, USA (2019). Association for Computing Machinery","DOI":"10.1145\/3318041.3355466"},{"key":"14_CR26","doi-asserted-by":"crossref","unstructured":"Pearce, P., et al.: Characterizing large-scale click fraud in zeroaccess. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 141\u2013152 (2014)","DOI":"10.1145\/2660267.2660369"},{"key":"14_CR27","doi-asserted-by":"crossref","unstructured":"Phillips, R., Wilder, H.: Tracing cryptocurrency scams: clustering replicated advance-fee and phishing websites (2020)","DOI":"10.1109\/ICBC48266.2020.9169433"},{"key":"14_CR28","unstructured":"United States Securities and Exchanges Commission. Sec charges eleven individuals in $300 million crypto pyramid scheme"},{"key":"14_CR29","unstructured":"Torres, C.F., Steichen, M.: Radu state. the art of the scam: demystifying honeypots in ethereum smart contracts. In: 28th USENIX Security Symposium (USENIX Security 19), pp. 1591\u20131607, Santa Clara, CA (2019). USENIX Association"},{"key":"14_CR30","unstructured":"U.S. Securities and Exchange Commission (SEC). SEC charges eleven individuals in \\$300 million crypto pyramid scheme. SEC Press Release. https:\/\/www.sec.gov\/news\/press-release\/2022-134 (2022)"},{"key":"14_CR31","doi-asserted-by":"crossref","unstructured":"Vasek, M., Moore, T.: There\u2019s no free lunch, even using bitcoin: tracking the popularity and profits of virtual currency scams. In: Financial Cryptography (2015)","DOI":"10.1007\/978-3-662-47854-7_4"},{"key":"14_CR32","unstructured":"Wood, G.: Ethereum: a secure decentralized generalized transaction ledger (2020)"},{"key":"14_CR33","doi-asserted-by":"crossref","unstructured":"Xia, P., et al.: Don\u2019t fish in troubled waters! characterizing coronavirus-themed cryptocurrency scams (2020)","DOI":"10.1109\/eCrime51433.2020.9493255"},{"key":"14_CR34","unstructured":"Xu, J., Livshits, B.: The anatomy of a cryptocurrency pump-and-dump scheme. In: 28th USENIX Security Symposium (USENIX Security 19), pp. 1609\u20131625, Santa Clara, CA, August 2019. USENIX Association (2019)"},{"key":"14_CR35","unstructured":"Yousaf, H., Kappos, G., Meiklejohn, S.: Tracing transactions across cryptocurrency ledgers. In: 28th USENIX Security Symposium (USENIX Security 19), pp. 837\u2013850, Santa Clara, CA, August 2019. USENIX Association (2019)"},{"key":"14_CR36","doi-asserted-by":"crossref","unstructured":"Yu, S., Jin, J., Xie, Y., Shen, J., Xuan, Q.: Ponzi scheme detection in ethereumtransaction network (2021)","DOI":"10.1007\/978-981-16-7993-3_14"},{"key":"14_CR37","unstructured":"Zhang-Kennedy, L., Assal, H., Rocheleau, J., Mohamed, R., Baig, K., Chiasson, S.: The aftermath of a crypto-ransomware attack at a large academic institution. In: 27th USENIX Security Symposium (USENIX Security 18), pp. 1061\u20131078, Baltimore, MD, August 2018. USENIX Association (2018)"},{"key":"14_CR38","doi-asserted-by":"crossref","unstructured":"Zhao, X., Chen, Z., Chen, X., Wang, Y., Tang, C.: The dao attack paradoxes in propositional logic, pp. 1743\u20131746 (2017)","DOI":"10.1109\/ICSAI.2017.8248566"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-47751-5_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T17:03:49Z","timestamp":1701363829000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-47751-5_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,1]]},"ISBN":["9783031477508","9783031477515"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-47751-5_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023,12,1]]},"assertion":[{"value":"1 December 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bol, Bra\u010d","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Croatia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 May 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 May 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc23.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"HotCRP","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"182","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"For the workshops 7 full papers have been accepted from 18 submissions.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}