{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:16:31Z","timestamp":1755839791437,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031692307"},{"type":"electronic","value":"9783031692314"}],"license":[{"start":{"date-parts":[[2024,11,30]],"date-time":"2024-11-30T00:00:00Z","timestamp":1732924800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,30]],"date-time":"2024-11-30T00:00:00Z","timestamp":1732924800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-69231-4_13","type":"book-chapter","created":{"date-parts":[[2024,11,29]],"date-time":"2024-11-29T08:25:05Z","timestamp":1732868705000},"page":"189-206","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Scam Token Detection Based on\u00a0Static Analysis Before Contract Deployment"],"prefix":"10.1007","author":[{"given":"Taichi","family":"Igarashi","sequence":"first","affiliation":[]},{"given":"Kanta","family":"Matsuura","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,30]]},"reference":[{"key":"13_CR1","unstructured":"Ethereum Improvement Proposals. ERC-20: Token Standard. [Online] Available: https:\/\/eips.ethereum.org\/EIPS\/eip-20 . Accessed 19 Sept 2023"},{"key":"13_CR2","unstructured":"Solidus Lab. The Rug Pull Report. [Online] Avalilable: https:\/\/www.soliduslabs.com\/reports\/rug-pull-report . Accessed 19 Sept 2023"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Luu, L., Chu, D.H., Olicke, H., Saxena, P., Hobor, A.: Making smart contracts smarter. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, pp. 254-269 (2016)","DOI":"10.1145\/2976749.2978309"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Yuan, Q., Huang, B., Zhang, J., Wu, J., Zhang, H., Zhang, X.: Detecting phishing scams on ethereum based on transaction records. In: 2020 IEEE International Symposium on Circuits and Systems, pp. 1-5. IEEE (2022 )","DOI":"10.1109\/ISCAS45731.2020.9180815"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Ibrahim, R.F., Elian, A.M., Ababneh, M.: Illicit account detection in the ethereum blockchain using machine learning. In: Proceedings of 2021 International Conference on Information Technology, pp. 488-493 (2021)","DOI":"10.1109\/ICIT52682.2021.9491653"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Wen, H., Fang, J., Wu, J., Zheng, Z.: Transaction-based hidden strategies against general phishing detection framework on ethereum. In: Proceedings of IEEE International Symposium on Circuits and Systems, pp. 1\u20135 (2021)","DOI":"10.1109\/ISCAS51556.2021.9401091"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Duan, X., Yan, B., Dong, A., Zhang, L., Yu, J.: Phishing frauds detection based on graph neural network on ethereum. In: International Conference on Wireless Algorithms, Systems, and Applications, Springer Nature Switzerland, pp. 351-363 (2022)","DOI":"10.1007\/978-3-031-19208-1_29"},{"key":"13_CR8","unstructured":"Etherscan. The Ethereum Blockchain Explorer. [Online] Available: https:\/\/etherscan.io . Accessed 19 Sept 2023"},{"issue":"1","key":"13_CR9","doi-asserted-by":"publisher","first-page":"1023","DOI":"10.32604\/csse.2023.039569","volume":"47","author":"M Wang","year":"2023","unstructured":"Wang, M., Huang, J.: Detecting ethereum ponzi schemes through opcode context analysis and oversampling-based adaboost algorithm. Comput. Syst. Sci. Eng. 47(1), 1023\u20131042 (2023)","journal-title":"Comput. Syst. Sci. Eng."},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Fan, S., Fu, S., Luo, Y., Xu, H., Zhang, X., Xu, M.: Smart contract scams detection with topological data analysis on account interaction. In: Proceedings of the 31st ACM International Conference on Information and Knowledge Management, pp. 468-477 (2022)","DOI":"10.1145\/3511808.3557454"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Aljofey, A., Rasool, A., Jiang, Q., Qu, Q.: A feature-based robust method for abnormal contracts detection in ethereum blockchain. Electronics 11(18), 2937 (2022)","DOI":"10.3390\/electronics11182937"},{"key":"13_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/math10060949","volume":"10","author":"B Mazorra","year":"2022","unstructured":"Mazorra, B., Adan, V., Daza, V.: Do not rug on me: leveraging machine learning techniques for automated scam detection. Mathematics 10, 1\u201324 (2022)","journal-title":"Mathematics"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Nguyen, M.H., Dau, S.H., Li, X.: Rug-pull malicious token detection on blockchain using supervised learning with feature engineering. In: Proceedings of the 2023 Australasian Computer Science Week, pp. 72\u201381 (2023)","DOI":"10.1145\/3579375.3579385"},{"key":"13_CR14","unstructured":"Xia, P., et al.: Demystifying Scam Tokens on Uniswap Decentralized Exchange. In: arXiv 2021, arXiv:2109.00229"},{"key":"13_CR15","unstructured":"pyevmasm. API Reference. [Online] Available: https:\/\/pyevmasm.readthedocs.io\/en\/latest\/api.html . Accessed 19 Sept 2023"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"He, N., Wu, L., Wang, H., Guo, Y., Jiang, X.: Characterizing code clones in the ethereum smart contract ecosystem. In: Financial Cryptography and Data Security: 24th International Conference, FC 2020, 2020 Revised Selected Papers 24, pp. 654-675 (2020). Springer International Publishing","DOI":"10.1007\/978-3-030-51280-4_35"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security. FC 2024 International Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-69231-4_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,29]],"date-time":"2024-11-29T09:05:01Z","timestamp":1732871101000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-69231-4_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,30]]},"ISBN":["9783031692307","9783031692314"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-69231-4_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,11,30]]},"assertion":[{"value":"30 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Willemstad","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cura\u00e7ao","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 March 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 March 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc24.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}