{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T04:19:52Z","timestamp":1743740392762,"version":"3.40.3"},"publisher-location":"Cham","reference-count":45,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031823480","type":"print"},{"value":"9783031823497","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-82349-7_17","type":"book-chapter","created":{"date-parts":[[2025,4,3]],"date-time":"2025-04-03T16:42:32Z","timestamp":1743698552000},"page":"242-259","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Offchain Runtime Verification (for The Tezos Blockchain)"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2329-3769","authenticated-orcid":false,"given":"Margarita","family":"Capretto","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4691-5831","authenticated-orcid":false,"given":"Martin","family":"Ceresa","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3478-3408","authenticated-orcid":false,"given":"Felipe","family":"Gorostiaga","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6442-6997","authenticated-orcid":false,"given":"Fernando","family":"Macias","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-5270-6992","authenticated-orcid":false,"given":"Paloma","family":"Pedregal","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3927-4773","authenticated-orcid":false,"given":"Cesar","family":"Sanchez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,2]]},"reference":[{"key":"17_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/978-3-030-61467-6_2","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation: Applications","author":"W Ahrendt","year":"2020","unstructured":"Ahrendt, W., Bubel, R.: Functional verification of smart contracts via strong data integrity. In: Margaria, T., Steffen, B. (eds.) ISoLA 2020. LNCS, vol. 12478, pp. 9\u201324. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-61467-6_2"},{"key":"17_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/978-3-030-03769-7_8","volume-title":"Runtime Verification","author":"S Azzopardi","year":"2018","unstructured":"Azzopardi, S., Ellul, J., Pace, G.J.: Monitoring smart contracts: ContractLarva and open challenges beyond. In: Colombo, C., Leucker, M. (eds.) RV 2018. LNCS, vol. 11237, pp. 113\u2013137. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03769-7_8"},{"key":"17_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-642-32759-9_9","volume-title":"FM 2012: Formal Methods","author":"H Barringer","year":"2012","unstructured":"Barringer, H., Falcone, Y., Havelund, K., Reger, G., Rydeheard, D.: Quantified event automata: towards expressive and efficient runtime monitors. In: Giannakopoulou, D., M\u00e9ry, D. (eds.) FM 2012. LNCS, vol. 7436, pp. 68\u201384. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32759-9_9"},{"key":"17_CR4","doi-asserted-by":"publisher","unstructured":"Bartocci, E., Falcone, Y. (eds.): Lectures on Runtime Verification - Introductory and Advanced Topics, LNCS, vol. 10457. Springer (2018). https:\/\/doi.org\/10.1007\/978-3-319-75632-5","DOI":"10.1007\/978-3-319-75632-5"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Bartoletti, M., Pes, B., Serusi, S.: Data mining for detecting bitcoin ponzi schemes. In: CVCBT 2018, pp. 75\u201384 (2018)","DOI":"10.1109\/CVCBT.2018.00014"},{"key":"17_CR6","unstructured":"Bernardo, B., Cauderlier, R., Hu, Z., Pesin, B., Tesson, J.: Mi-Cho-Coq, a framework for certifying Tezos smart contracts. arXiv abs\/1909.08671 (2019). http:\/\/arxiv.org\/abs\/1909.08671"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Bhargavan, K., et al.: Formal verification of smart contracts: short paper. In: Proceedings of PLAS@CCS 2016, pp. 91\u201396. ACM (2016)","DOI":"10.1145\/2993600.2993611"},{"key":"17_CR8","doi-asserted-by":"publisher","unstructured":"Capretto, M., Ceresa, M., S\u00e1nchez, C.: Transaction monitoring of smart contracts. In: Proceedings of RV 2022. LNCS, vol. 13498, pp. 162\u2013180. Springer (2022). https:\/\/doi.org\/10.1007\/978-3-031-17196-3_9","DOI":"10.1007\/978-3-031-17196-3_9"},{"key":"17_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-030-64437-6_2","volume-title":"Programming Languages and Systems","author":"M Ceresa","year":"2020","unstructured":"Ceresa, M., Gorostiaga, F., S\u00e1nchez, C.: Declarative stream runtime verification (hLola). In: Oliveira, B.C.S. (ed.) APLAS 2020. LNCS, vol. 12470, pp. 25\u201343. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-64437-6_2"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Christin, N.: Traveling the silk road: a measurement analysis of a large anonymous online marketplace. In: Proceedings of ACM WWW 2013, pp. 213\u2013224 (2013)","DOI":"10.1145\/2488388.2488408"},{"key":"17_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1007\/978-3-030-54994-7_23","volume-title":"Formal Methods. FM 2019 International Workshops","author":"S Conchon","year":"2020","unstructured":"Conchon, S., Korneva, A., Za\u00efdi, F.: Verifying smart contracts with cubicle. In: Sekerinski, E., et al. (eds.) FM 2019. LNCS, vol. 12232, pp. 312\u2013324. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-54994-7_23"},{"key":"17_CR12","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.cose.2018.08.008","volume":"79","author":"M Conti","year":"2018","unstructured":"Conti, M., Gangwal, A., Ruj, S.: On the economic significance of ransomware campaigns: a bitcoin transactions perspective. Comput. Secur. 79, 162\u2013189 (2018)","journal-title":"Comput. Secur."},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"D\u2019Angelo, B., Sankaranarayanan, S., S\u00e1nchez, C., Robinson, W., Finkbeiner, B., Sipma, H.B., Mehrotra, S., Manna, Z.: LOLA: Runtime monitoring of synchronous systems. In: Proceedingd of TIME 2005, pp. 166\u2013174. IEEE CS Press (2005)","DOI":"10.1109\/TIME.2005.26"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Ellul, J., Pace, G.J.: Runtime verification of Ethereum smart contracts. In: Proceedings of EDCC 2018, pp. 158\u2013163. IEEE Computer Society (2018)","DOI":"10.1109\/EDCC.2018.00036"},{"key":"17_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/978-3-030-25540-4_24","volume-title":"Computer Aided Verification","author":"P Faymonville","year":"2019","unstructured":"Faymonville, P., et al.: StreamLAB: stream-based monitoring of cyber-physical systems. In: Dillig, I., Tasiran, S. (eds.) CAV 2019. LNCS, vol. 11561, pp. 421\u2013431. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-25540-4_24"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Gomez, G., Moreno-Sanchez, P., Caballero, J.: Watch your back: Identifying cybercrime financial relationships in bitcoin through back-and-forth exploration. In: Proceedings of ACM CCS 2022, pp. 1291\u20131305 (2022)","DOI":"10.1145\/3548606.3560587"},{"key":"17_CR17","unstructured":"Goodman, L.M.: Tezos \u2013 A self-amending crypto-ledger (2014). https:\/\/www.tezos.com\/whitepaper.pdf"},{"key":"17_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1007\/978-3-030-03769-7_16","volume-title":"Runtime Verification","author":"F Gorostiaga","year":"2018","unstructured":"Gorostiaga, F., S\u00e1nchez, C.: Striver: stream runtime verification for real-time event-streams. In: Colombo, C., Leucker, M. (eds.) RV 2018. LNCS, vol. 11237, pp. 282\u2013298. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03769-7_16"},{"issue":"2","key":"17_CR19","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/s10009-021-00605-3","volume":"23","author":"F Gorostiaga","year":"2021","unstructured":"Gorostiaga, F., S\u00e1nchez, C.: Stream runtime verification of real-time event streams with the Striver language. Int. J. Softw. Tools Technol. Transfer 23(2), 157\u2013183 (2021). https:\/\/doi.org\/10.1007\/s10009-021-00605-3","journal-title":"Int. J. Softw. Tools Technol. Transfer"},{"key":"17_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/978-3-030-88494-9_9","volume-title":"Runtime Verification","author":"F Gorostiaga","year":"2021","unstructured":"Gorostiaga, F., S\u00e1nchez, C.: Nested monitors: monitors as expressions to build monitors. In: Feng, L., Fisman, D. (eds.) RV 2021. LNCS, vol. 12974, pp. 164\u2013183. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-88494-9_9"},{"issue":"2","key":"17_CR21","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/s10009-021-00605-3","volume":"23","author":"F Gorostiaga","year":"2021","unstructured":"Gorostiaga, F., S\u00e1nchez, C.: Stream runtime verification of real-time event streams with the Striver language. Int. J. Softw. Tools Technol. Transfer 23(2), 157\u2013183 (2021). https:\/\/doi.org\/10.1007\/s10009-021-00605-3","journal-title":"Int. J. Softw. Tools Technol. Transfer"},{"key":"17_CR22","doi-asserted-by":"publisher","unstructured":"Gorostiaga, F., S\u00e1nchez, C.: Monitorability of expressive verdicts. In: Proceedings of NFM 2022. LNCS, vol. 13260, pp. 693\u2013712. Springer (2022). https:\/\/doi.org\/10.1007\/978-3-031-06773-0_37","DOI":"10.1007\/978-3-031-06773-0_37"},{"key":"17_CR23","doi-asserted-by":"crossref","unstructured":"Huang, D.Y., Aliapoulios, M.M., Li, V.G., Invernizzi, L., Bursztein, E., McRoberts, K., Levin, J., Levchenko, K., Snoeren, A.C., McCoy, D.: Tracking ransomware end-to-end. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 618\u2013631","DOI":"10.1109\/SP.2018.00047"},{"key":"17_CR24","doi-asserted-by":"crossref","unstructured":"Lee, S., et al.: Cybercriminal minds: an investigative study of cryptocurrency abuses in the dark web. In: Proceedings of NDSS 2019","DOI":"10.14722\/ndss.2019.23055"},{"issue":"5","key":"17_CR25","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1016\/j.jlap.2008.08.004","volume":"78","author":"M Leucker","year":"2009","unstructured":"Leucker, M., Schallhart, C.: A brief account of runtime verification. J. Logic Algebr. Progr. 78(5), 293\u2013303 (2009)","journal-title":"J. Logic Algebr. Progr."},{"key":"17_CR26","doi-asserted-by":"crossref","unstructured":"Li, A., Choi, J.A., an. Long: Securing smart contract with runtime validation. In: Proceedings of ACM PLDI 2020, pp. 438\u2013453. ACM (2020)","DOI":"10.1145\/3385412.3385982"},{"key":"17_CR27","doi-asserted-by":"crossref","unstructured":"Liao, K., Zhao, Z., Doupe, A., Ahn, G.J.: Behind closed doors: measurement and analysis of cryptolocker ransoms in bitcoin. In: 2016 APWG Symposium on Electronic Crime Research (eCrime), pp. 1\u201313","DOI":"10.1109\/ECRIME.2016.7487938"},{"issue":"4","key":"17_CR28","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1145\/2896384","volume":"59","author":"S Meiklejohn","year":"2016","unstructured":"Meiklejohn, S., et al.: A fistful of bitcoins: characterizing payments among men with no names. Commun. ACM 59(4), 86\u201393 (2016)","journal-title":"Commun. ACM"},{"key":"17_CR29","doi-asserted-by":"crossref","unstructured":"M\u00f6ser, M., B\u00f6hme, R., Breuker, D.: An inquiry into money laundering tools in the bitcoin ecosystem. In: 2013 APWG eCrime Researchers Summit, pp. 1\u201314","DOI":"10.1109\/eCRS.2013.6805780"},{"key":"17_CR30","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"17_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/978-3-030-54994-7_22","volume-title":"Formal Methods. FM 2019 International Workshops","author":"Z Neha\u00ef","year":"2020","unstructured":"Neha\u00ef, Z., Bobot, F.: Deductive proof of industrial smart contracts using Why3. In: Sekerinski, E., et al. (eds.) FM 2019. LNCS, vol. 12232, pp. 299\u2013311. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-54994-7_22"},{"key":"17_CR32","unstructured":"Nomadic Labs: Protocol florence. https:\/\/tezos.gitlab.io\/protocols\/009_florence.html. Accessed 6 June 2024"},{"key":"17_CR33","doi-asserted-by":"crossref","unstructured":"Paquet-Clouston, M., Haslhofer, B., Dupont, B.: Ransomware payments in the Bitcoin ecosystem. J. Cybersecur. 5(1), tyz003 (2019)","DOI":"10.1093\/cybsec\/tyz003"},{"key":"17_CR34","doi-asserted-by":"crossref","unstructured":"Paquet-Clouston, M., Romiti, M., Haslhofer, B., Charvat, T.: Spams meet cryptocurrencies: sextortion in the bitcoin ecosystem. In: AFT 2019, pp. 76\u201388","DOI":"10.1145\/3318041.3355466"},{"key":"17_CR35","doi-asserted-by":"publisher","unstructured":"Pedregal, P., Gorostiaga, F., S\u00e1nchez, C.: A stream runtime verification tool with nested and retroactive parametrization. In: Proceedings of RV2023. LNCS, vol. 14245, pp. 351\u2013362. Springer (2023). https:\/\/doi.org\/10.1007\/978-3-031-44267-4_19","DOI":"10.1007\/978-3-031-44267-4_19"},{"key":"17_CR36","doi-asserted-by":"crossref","unstructured":"Permenev, A., Dimitrov, D., Tsankov, P., Drachsler-Cohen, D., Vechev, M.: VerX: Safety verification of smart contracts. In: Proceedings of S &P 2020, pp. 1661\u20131677. IEEE (2020)","DOI":"10.1109\/SP40000.2020.00024"},{"key":"17_CR37","unstructured":"Phil, D.: Analysis of the DAO exploit (2016). https:\/\/hackingdistributed.com\/2016\/06\/18\/analysis-of-the-dao-exploit\/"},{"key":"17_CR38","doi-asserted-by":"crossref","unstructured":"Pletinckx, S., Trap, C., Doerr, C.: Malware coordination using the blockchain: an analysis of the cerber ransomware. In: CNS 2018. pp.\u00a01\u20139 (2018)","DOI":"10.1109\/CNS.2018.8433199"},{"key":"17_CR39","doi-asserted-by":"crossref","unstructured":"Pnueli, A.: The temporal logic of programs. In: Proceedings of FOCS 2077, pp. 46\u201367. IEEE CS Press (1977)","DOI":"10.1109\/SFCS.1977.32"},{"key":"17_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-662-44774-1_1","volume-title":"Financial Cryptography and Data Security","author":"D Ron","year":"2014","unstructured":"Ron, D., Shamir, A.: How did dread pirate roberts acquire and protect his bitcoin wealth? In: B\u00f6hme, R., Brenner, M., Moore, T., Smith, M. (eds.) FC 2014. LNCS, vol. 8438, pp. 3\u201315. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44774-1_1"},{"key":"17_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/978-3-662-45472-5_29","volume-title":"Financial Cryptography and Data Security","author":"M Spagnuolo","year":"2014","unstructured":"Spagnuolo, M., Maggi, F., Zanero, S.: BitIodine: extracting intelligence from the bitcoin network. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 457\u2013468. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45472-5_29"},{"key":"17_CR42","doi-asserted-by":"crossref","unstructured":"Stephens, J., Ferles, K., Mariano, B., Lahiri, S., Dillig, I.: SmartPulse: automated checking of temporal properties in smart contracts. In: Proceedings of S &P 2021. IEEE (2021)","DOI":"10.1109\/SP40001.2021.00085"},{"key":"17_CR43","unstructured":"Szabo, N.: Smart contracts: building blocks for digital markets. Extropy 18, 28 (1996)"},{"key":"17_CR44","doi-asserted-by":"crossref","unstructured":"Tekiner, E., Acar, A., Uluagac, A.S., Kirda, E., Selcuk, A.A.: SOK: cryptojacking malware. In: IEEE EuroS &P 2021, pp. 120\u2013139","DOI":"10.1109\/EuroSP51992.2021.00019"},{"key":"17_CR45","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood, G.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151, 1\u201332 (2014)","journal-title":"Ethereum Project Yellow Paper"}],"container-title":["Lecture Notes in Computer Science","Computer Security. ESORICS 2024 International Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-82349-7_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,3]],"date-time":"2025-04-03T16:42:47Z","timestamp":1743698567000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-82349-7_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031823480","9783031823497"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-82349-7_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bydgoszcz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2024.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}