{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T07:09:55Z","timestamp":1766732995043,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031757563"},{"type":"electronic","value":"9783031757570"}],"license":[{"start":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T00:00:00Z","timestamp":1729123200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T00:00:00Z","timestamp":1729123200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-75757-0_1","type":"book-chapter","created":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T11:03:12Z","timestamp":1729594992000},"page":"3-22","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["The Formal Verification of\u00a0Aptos Coin"],"prefix":"10.1007","author":[{"given":"Kundu","family":"Chen","sequence":"first","affiliation":[]},{"given":"Jie","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Zhongyun","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Wenbo","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xudong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Pan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,17]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Amani, S., B\u00e9gel, M., Bortin, M., Staples, M.: Towards verifying ethereum smart contract bytecode in Isabelle\/HOL. In: Proceedings of the 7th ACM SIGPLAN International Conference on Certified Programs and Proofs, pp. 66\u201377 (2018)","DOI":"10.1145\/3176245.3167084"},{"key":"1_CR2","doi-asserted-by":"publisher","unstructured":"Bauer, D.P.: ERC-20: fungible tokens. In: Getting Started with Ethereum: A Step-by-Step Guide to Becoming a Blockchain Developer, pp. 17\u201348. Apress, Berkeley, CA (2022). https:\/\/doi.org\/10.1007\/978-1-4842-8045-4_3","DOI":"10.1007\/978-1-4842-8045-4_3"},{"key":"1_CR3","unstructured":"Blackshear, S., et al.: Move: a language with programmable resources. Libra Assoc., 1 (2019)"},{"key":"1_CR4","unstructured":"Diem.: The move book (2024)"},{"key":"1_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/978-3-030-99524-9_10","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"D Dill","year":"2022","unstructured":"Dill, D., Grieskamp, W., Park, J., Qadeer, S., Xu, M., Zhong, E.: Fast and reliable formal verification of smart contracts with the move prover. In: TACAS 2022. LNCS, vol. 13243, pp. 183\u2013200. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-99524-9_10"},{"issue":"5","key":"1_CR6","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1109\/MNET.001.1900656","volume":"34","author":"D He","year":"2020","unstructured":"He, D., Deng, Z., Zhang, Y., Chan, S., Cheng, Y., Guizani, N.: Smart contract vulnerability analysis and security audit. IEEE Netw. 34(5), 276\u2013282 (2020)","journal-title":"IEEE Netw."},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Luu, L., Chu, D. H., Olickel, H., Saxena, P., Hobor, A.: Making smart contracts smarter. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 254\u2013269 (2016)","DOI":"10.1145\/2976749.2978309"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Nehai, Z., Piriou, P.Y., Daumas, F.: Model-checking of smart contracts. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 980\u2013987. IEEE (2018)","DOI":"10.1109\/Cybermatics_2018.2018.00185"},{"key":"1_CR9","doi-asserted-by":"publisher","first-page":"101129","DOI":"10.1016\/j.pmcj.2020.101129","volume":"63","author":"T Osterland","year":"2020","unstructured":"Osterland, T., Rose, T.: Model checking smart contracts for ethereum. Pervasive Mob. Comput. 63, 101129 (2020)","journal-title":"Pervasive Mob. Comput."},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Pierro, G.A., Ibba, G., Tonelli, R.: A study on diem and Aptos distributed ledger technology. Int. J. Parallel Emergent Distrib. Syst., 1\u201317 (2023)","DOI":"10.1080\/17445760.2023.2217486"},{"key":"1_CR11","unstructured":"Qian, P., Liu, Z., He, Q., Huang, B., Tian, D., Wang, X.: Smart contract vulnerability detection technique: a survey. arXiv preprint arXiv:2209.05872 (2022)"},{"key":"1_CR12","series-title":"Blockchain Technologies","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-981-15-4542-9_12","volume-title":"IC-BCT 2019","author":"M Shirole","year":"2020","unstructured":"Shirole, M., Darisi, M., Bhirud, S.: Cryptocurrency token: an overview. In: Patel, D., et al. (eds.) IC-BCT 2019. BT, pp. 133\u2013140. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-15-4542-9_12"},{"key":"1_CR13","unstructured":"Shuwei, S., et al.: Sui Move: modern blockchain programming with objects (2024)"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Singh, A., Parizi, R.M., Zhang, Q., Choo, K.K.R., Dehghantanha, A.: Blockchain smart contracts formalization: approaches and challenges to address vulnerabilities. Comput. Secur. 88, 101654 (2020)","DOI":"10.1016\/j.cose.2019.101654"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Tikhomirov, S., Voskresenskaya, E., Ivanitskiy, I., Takhaviev, R., Marchenko, E., Alexandrov, Y.: SmartCheck: static analysis of ethereum smart contracts. In: Proceedings of the 1st International Workshop on Emerging Trends in Software Engineering for Blockchain, pp. 9\u201316 (2018)","DOI":"10.1145\/3194113.3194115"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Wang, G., Nixon, M.: SoK: tokenization on blockchain. In: Proceedings of the 14th IEEE\/ACM International Conference on Utility and Cloud Computing Companion, pp. 1\u20139 (2021)","DOI":"10.1145\/3492323.3495577"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Welc, A., Blackshear, S.: Sui Move: modern blockchain programming with objects. In: Companion Proceedings of the 2023 ACM SIGPLAN International Conference on Systems, Programming, Languages, and Applications: Software for Humanity, pp. 53\u201355 (2023)","DOI":"10.1145\/3618305.3623605"},{"key":"1_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/978-3-030-53288-8_7","volume-title":"Computer Aided Verification","author":"JE Zhong","year":"2020","unstructured":"Zhong, J.E., et al.: The move prover. In: Lahiri, S.K., Wang, C. (eds.) CAV 2020. LNCS, vol. 12224, pp. 137\u2013150. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-53288-8_7"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-75757-0_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T11:03:26Z","timestamp":1729595006000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-75757-0_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,17]]},"ISBN":["9783031757563","9783031757570"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-75757-0_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,10,17]]},"assertion":[{"value":"17 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Arlington, VA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isw2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/isc24.cs.gmu.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}