{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T06:46:42Z","timestamp":1774853202221,"version":"3.50.1"},"publisher-location":"Cham","reference-count":65,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032123343","type":"print"},{"value":"9783032123350","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-12335-0_14","type":"book-chapter","created":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T07:12:26Z","timestamp":1768201946000},"page":"226-248","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Overview of\u00a0Termination in\u00a0the\u00a0Ethereum Blockchain"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8074-8980","authenticated-orcid":false,"given":"Luca","family":"Olivieri","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1036-1718","authenticated-orcid":false,"given":"Luca","family":"Pasetto","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9930-8854","authenticated-orcid":false,"given":"Luca","family":"Negrini","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4678-933X","authenticated-orcid":false,"given":"Pietro","family":"Ferrara","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,13]]},"reference":[{"key":"14_CR1","doi-asserted-by":"publisher","unstructured":"Abdrashitov, V.M., Davudov, D.A., Kolosov, N.F., Slezhenkov, V.V.: Risks of Smart Contracts Termination in the Investment Sphere, pp. 291\u2013298. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-51536-1_27","DOI":"10.1007\/978-3-031-51536-1_27"},{"key":"14_CR2","doi-asserted-by":"publisher","unstructured":"Albert, E., et al.: Object-sensitive cost analysis for concurrent objects. Softw. Test. Verif. Reliab. 25(3), 218\u2013271 (2015). https:\/\/doi.org\/10.1002\/stvr.1569","DOI":"10.1002\/stvr.1569"},{"key":"14_CR3","doi-asserted-by":"publisher","unstructured":"Albert, E., Arenas, P., Genaim, S., Puebla, G., Zanardini, D.: Cost analysis of object-oriented bytecode programs. Theor. Comput. Sci. 413(1), 142\u2013159 (2012). https:\/\/doi.org\/10.1016\/j.tcs.2011.07.009, quantitative Aspects of Programming Languages (QAPL 2010)","DOI":"10.1016\/j.tcs.2011.07.009"},{"key":"14_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2021.110923","volume":"176","author":"E Albert","year":"2021","unstructured":"Albert, E., Correas, J., Gordillo, P., Rom\u00e1n-D\u00edez, G., Rubio, A.: Don\u2019t run on fumes\u2013parametric gas bounds for smart contracts. J. Syst. Softw. 176, 110923 (2021). https:\/\/doi.org\/10.1016\/j.jss.2021.110923","journal-title":"J. Syst. Softw."},{"key":"14_CR5","unstructured":"Antonopoulos, A.M.: Mastering Bitcoin: Programming the Open Blockchain, 2nd edn. O\u2019Reilly, Sebastopol (2017)"},{"key":"14_CR6","unstructured":"Antonopoulos, A.M., Wood, G.: Mastering Ethereum: Building Smart Contracts and Dapps. O\u2019Reilly, Sebastopol (2018)"},{"key":"14_CR7","unstructured":"Ballet, G., Buterin, V., Feist, D.: EIP-6: Renaming SUICIDE opcode (2015), ethereum Improvement Proposals, no. 6, November 2015. https:\/\/eips.ethereum.org\/EIPS\/eip-6. Accessed Aug 2024"},{"key":"14_CR8","unstructured":"Ballet, G., Buterin, V., Feist, D.: EIP-4758: Deactivate SELFDESTRUCT [DRAFT] (2022), ethereum Improvement Proposals, no. 4758, February 2022. https:\/\/eips.ethereum.org\/EIPS\/eip-4758. Accessed Aug 2024"},{"key":"14_CR9","unstructured":"Ballet, G., Buterin, V., Feist, D.: EIP-6780: SELFDESTRUCT only in same transaction (2022). https:\/\/eips.ethereum.org\/EIPS\/eip-6780. Accessed Aug 2024"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Bartoletti, M., Ferrando, A., Lipparini, E., Malvone, V.: Solvent: liquidity verification of smart contracts. arXiv preprint arXiv:2404.17864 (2024)","DOI":"10.1007\/978-3-031-76554-4_14"},{"key":"14_CR11","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/978-3-030-17138-4_10","volume-title":"Principles of Security and Trust","author":"M Bartoletti","year":"2019","unstructured":"Bartoletti, M., Zunino, R.: Verifying liquidity of bitcoin contracts. In: Nielson, F., Sands, D. (eds.) Principles of Security and Trust, pp. 222\u2013247. Springer, Cham (2019)"},{"key":"14_CR12","unstructured":"Beregszaszi, A.: EIP-6046: Replace SELFDESTRUCT with DEACTIVATE [DRAFT] (2022), ethereum Improvement Proposals, no. 6046, November 2022. https:\/\/eips.ethereum.org\/EIPS\/eip-6046. Accessed Aug 2024"},{"key":"14_CR13","unstructured":"Beregszaszi, A., Mushegian, N.: EIP-140: REVERT instruction (2017), ethereum Improvement Proposals, no. 140, February 2017. https:\/\/eips.ethereum.org\/EIPS\/eip-140. Accessed Aug 2024"},{"key":"14_CR14","doi-asserted-by":"publisher","unstructured":"Brent, L., Grech, N., Lagouvardos, S., Scholz, B., Smaragdakis, Y.: Ethainter: a smart contract security analyzer for composite vulnerabilities. In: Proceedings of the 41st ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2020, pp. 454\u2013469. Association for Computing Machinery, New York (2020). https:\/\/doi.org\/10.1145\/3385412.3385990","DOI":"10.1145\/3385412.3385990"},{"key":"14_CR15","unstructured":"Brent, L., et al.: Vandal: a scalable security analysis framework for smart contracts. arXiv preprint arXiv:1809.03981 (2018)"},{"key":"14_CR16","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1007\/978-3-642-39799-8_28","volume-title":"Computer Aided Verification","author":"M Brockschmidt","year":"2013","unstructured":"Brockschmidt, M., Cook, B., Fuhs, C.: Better termination proving through cooperation. In: Sharygina, N., Veith, H. (eds.) Computer Aided Verification, pp. 413\u2013429. Springer, Heidelberg (2013)"},{"key":"14_CR17","unstructured":"Buterin, V.: EIP-170: Contract code size limit (2016), ethereum Improvement Proposals, no. 170, November 2016. https:\/\/eips.ethereum.org\/EIPS\/eip-170. Accessed Aug 2024"},{"key":"14_CR18","unstructured":"Buterin, V.: Pragmatic destruction of SELFDESTRUCT (2024). https:\/\/hackmd.io\/@vbuterin\/selfdestruct#Pragmatic-destruction-of-SELFDESTRUCT. Accessed Aug 2024"},{"key":"14_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1007\/978-3-030-32409-4_18","volume-title":"Formal Methods and Software Engineering","author":"J Chang","year":"2019","unstructured":"Chang, J., Gao, B., Xiao, H., Sun, J., Cai, Y., Yang, Z.: sCompile: critical path identification and analysis for smart contracts. In: Ait-Ameur, Y., Qin, S. (eds.) ICFEM 2019. LNCS, vol. 11852, pp. 286\u2013304. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-32409-4_18"},{"key":"14_CR20","doi-asserted-by":"publisher","unstructured":"Chen, J., Xia, X., Lo, D., Grundy, J.: Why do smart contracts self-destruct? Investigating the selfdestruct function on ethereum. ACM Trans. Softw. Eng. Methodol. 31(2) (2021). https:\/\/doi.org\/10.1145\/3488245","DOI":"10.1145\/3488245"},{"key":"14_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/BFb0058022","volume-title":"Foundations of Software Technology and Theoretical Computer Science","author":"EM Clarke","year":"1997","unstructured":"Clarke, E.M.: Model checking. In: Ramesh, S., Sivakumar, G. (eds.) FSTTCS 1997. LNCS, vol. 1346, pp. 54\u201356. Springer, Heidelberg (1997). https:\/\/doi.org\/10.1007\/BFb0058022"},{"key":"14_CR22","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/11817963_37","volume-title":"Computer Aided Verification","author":"B Cook","year":"2006","unstructured":"Cook, B., Podelski, A., Rybalchenko, A.: Terminator: beyond safety. In: Ball, T., Jones, R.B. (eds.) Computer Aided Verification, pp. 415\u2013418. Springer, Heidelberg (2006)"},{"key":"14_CR23","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1007\/978-3-662-54577-5_8","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"N Courant","year":"2017","unstructured":"Courant, N., Urban, C.: Precise widening operators for proving termination by abstract interpretation. In: Legay, A., Margaria, T. (eds.) Tools and Algorithms for the Construction and Analysis of Systems, pp. 136\u2013152. Springer, Heidelberg (2017)"},{"key":"14_CR24","doi-asserted-by":"publisher","unstructured":"Cousot, P., Cousot, R.: An abstract interpretation framework for termination. In: Proceedings of the 39th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2012, pp. 245\u2013258. Association for Computing Machinery, New York (2012). https:\/\/doi.org\/10.1145\/2103656.2103687","DOI":"10.1145\/2103656.2103687"},{"key":"14_CR25","doi-asserted-by":"publisher","unstructured":"Crosara, M., Olivieri, L., Spoto, F., Tagliaferro, F.: Re-engineering ERC-20 smart contracts with efficient snapshots for the java virtual machine. In: 2021 Third International Conference on Blockchain Computing and Applications (BCCA), pp. 187\u2013194 (2021). https:\/\/doi.org\/10.1109\/BCCA53669.2021.9657047","DOI":"10.1109\/BCCA53669.2021.9657047"},{"key":"14_CR26","doi-asserted-by":"publisher","unstructured":"Crosara, M., Olivieri, L., Spoto, F., Tagliaferro, F.: Fungible and non-fungible tokens with snapshots in java. Cluster Comput. 26(5), 2701\u20132718 (2023). https:\/\/doi.org\/10.1007\/s10586-022-03756-3","DOI":"10.1007\/s10586-022-03756-3"},{"key":"14_CR27","unstructured":"David, E.C.: The Hidden Dangers of Using Selfdestruct in Upgradable Smart Contracts (2025). https:\/\/coinsbench.com\/the-hidden-dangers-of-using-selfdestruct-in-upgradable-smart-contracts--832466bf6b95. Accessed July 2025"},{"key":"14_CR28","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/978-3-319-21668-3_16","volume-title":"Computer Aided Verification","author":"V D\u2019Silva","year":"2015","unstructured":"D\u2019Silva, V., Urban, C.: Conflict-driven conditional termination. In: Kroening, D., P\u0103s\u0103reanu, C.S. (eds.) Computer Aided Verification, pp. 271\u2013286. Springer, Cham (2015)"},{"key":"14_CR29","unstructured":"Entriken, W.: EIP-6049: Deprecate selfdestruct (2022), ethereum Improvement Proposals, no. 6049, November 2022. https:\/\/eips.ethereum.org\/EIPS\/eip-6046. Accessed Aug 2024"},{"key":"14_CR30","unstructured":"European Parliament and the Council: Regulation (EU) 2023\/2854 of the European Parliament and of the Council of 13 December 2023 on harmonised rules on fair access to and use of data and amending Regulation (EU) 2017\/2394 and Directive (EU) 2020\/1828 (Data Act) (2023), document 32023R2854. PE\/49\/2023\/REV\/1 OJ L, 2023\/2854, 22.12.2023, ELI: http:\/\/data.europa.eu\/eli\/reg\/2023\/2854\/oj"},{"key":"14_CR31","doi-asserted-by":"publisher","first-page":"147327","DOI":"10.1109\/ACCESS.2019.2947146","volume":"7","author":"M Fu","year":"2019","unstructured":"Fu, M., Wu, L., Hong, Z., Zhu, F., Sun, H., Feng, W.: A critical-path-coverage-based vulnerability detection method for smart contracts. IEEE Access 7, 147327\u2013147344 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2947146","journal-title":"IEEE Access"},{"key":"14_CR32","unstructured":"Gamma, E., Helm, R., Johnson, R., Vlissides, J.: Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley, United States (1994)"},{"key":"14_CR33","doi-asserted-by":"publisher","unstructured":"Genet., T., Jensen., T., Sauvage., J.: Termination of ethereum\u2019s smart contracts. In: Proceedings of the 17th International Joint Conference on e-Business and Telecommunications - SECRYPT, pp. 39\u201351. INSTICC, SciTePress (2020). https:\/\/doi.org\/10.5220\/0009564100390051","DOI":"10.5220\/0009564100390051"},{"key":"14_CR34","doi-asserted-by":"crossref","unstructured":"Giesl, J., Schneider-Kamp, P., Thiemann, R.: Aprove 1.2: automatic termination proofs in the dependency pair framework. In: Furbach, U., Shankar, N. (eds.) Automated Reasoning, pp. 281\u2013286. Springer, Heidelberg (2006)","DOI":"10.1007\/11814771_24"},{"key":"14_CR35","doi-asserted-by":"publisher","unstructured":"Grech, N., Kong, M., Jurisevic, A., Brent, L., Scholz, B., Smaragdakis, Y.: Madmax: surviving out-of-gas conditions in ethereum smart contracts. Proc. ACM Program. Lang. 2(OOPSLA) (2018). https:\/\/doi.org\/10.1145\/3276486","DOI":"10.1145\/3276486"},{"issue":"1","key":"14_CR36","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1109\/TR.2023.3233999","volume":"73","author":"T Hu","year":"2024","unstructured":"Hu, T., Li, B., Pan, Z., Qian, C.: Detect defects of solidity smart contract based on the knowledge graph. IEEE Trans. Reliab. 73(1), 186\u2013202 (2024). https:\/\/doi.org\/10.1109\/TR.2023.3233999","journal-title":"IEEE Trans. Reliab."},{"key":"14_CR37","doi-asserted-by":"publisher","unstructured":"Huang, Y., et al.: The sword of damocles: upgradeable smart contract in ethereum. In: Proceedings of the 32nd IEEE\/ACM International Conference on Program Comprehension, ICPC 2024, pp. 333\u2013345. Association for Computing Machinery, New York (2024). https:\/\/doi.org\/10.1145\/3643916.3644426","DOI":"10.1145\/3643916.3644426"},{"key":"14_CR38","unstructured":"EU Crypto Initiative: Europe\u2019s Data Act: Implications for the Future of Innovation in Europe (2024). https:\/\/eu.ci\/the-data-act-implications-for-the-future-of-smart-contracts-in-europe-annex\/. Accessed Aug 2024"},{"key":"14_CR39","unstructured":"Kwesili, O.: The Incompatibility of Self-Destruct Mechanisms in Upgradeable Smart Contract Architectures (2025). https:\/\/coinsbench.com\/the-incompatibility-of-self-destruct-mechanisms-in-upgradeable-smart--contract-architectures-979f846f9265. Accessed July 2025"},{"key":"14_CR40","doi-asserted-by":"publisher","unstructured":"Le, T.C., Qin, S., Chin, W.N.: Termination and non-termination specification inference. In: Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2015, pp. 489\u2013498. Association for Computing Machinery, New York (2015). https:\/\/doi.org\/10.1145\/2737924.2737993","DOI":"10.1145\/2737924.2737993"},{"key":"14_CR41","doi-asserted-by":"publisher","unstructured":"Le, T.C., Xu, L., Chen, L., Shi, W.: Proving conditional termination for smart contracts. In: Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, BCC 2018, pp. 57\u201359. Association for Computing Machinery, New York (2018). https:\/\/doi.org\/10.1145\/3205230.3205239","DOI":"10.1145\/3205230.3205239"},{"key":"14_CR42","doi-asserted-by":"publisher","unstructured":"Li, X., Yang, J., Chen, J., Tang, Y., Gao, X.: Characterizing ethereum upgradable smart contracts and their security implications. In: Proceedings of the ACM on Web Conference 2024, WWW 2024, pp. 1847\u20131858. Association for Computing Machinery, New York (2024). https:\/\/doi.org\/10.1145\/3589334.3645640","DOI":"10.1145\/3589334.3645640"},{"key":"14_CR43","doi-asserted-by":"crossref","unstructured":"Marino, B., Juels, A.: Setting standards for altering and undoing smart contracts. In: Alferes, J.J., Bertossi, L., Governatori, G., Fodor, P., Roman, D. (eds.) Rule Technologies. Research, Tools, and Applications, pp. 151\u2013166. Springer, Cham (2016)","DOI":"10.1007\/978-3-319-42019-6_10"},{"key":"14_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1007\/978-3-030-32101-7_27","volume-title":"Financial Cryptography and Data Security","author":"A Mavridou","year":"2019","unstructured":"Mavridou, A., Laszka, A., Stachtiari, E., Dubey, A.: VeriSolid: correct-by-design smart contracts for ethereum. In: Goldberg, I., Moore, T. (eds.) FC 2019. LNCS, vol. 11598, pp. 446\u2013465. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-32101-7_27"},{"key":"14_CR45","unstructured":"Mudge, N.: ERC-2535: Diamonds, multi-facet proxy (2020), ethereum Improvement Proposals, no. 2535, February 2020. https:\/\/eips.ethereum.org\/EIPS\/eip-2535. Accessed Aug 2024"},{"key":"14_CR46","unstructured":"Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008). https:\/\/bitcoin.org\/bitcoin.pdf. Accessed June 2023"},{"key":"14_CR47","doi-asserted-by":"publisher","unstructured":"Nikoli\u0107, I., Kolluri, A., Sergey, I., Saxena, P., Hobor, A.: Finding the greedy, prodigal, and suicidal contracts at scale. In: Proceedings of the 34th Annual Computer Security Applications Conference, ACSAC 2018, pp. 653\u2013663. Association for Computing Machinery, New York (2018). https:\/\/doi.org\/10.1145\/3274694.3274743","DOI":"10.1145\/3274694.3274743"},{"key":"14_CR48","unstructured":"Olivieri, L., Mukherjee, A., Chaki, N., Cortesi, A.: Cross-chain Smart Contracts and dApps Verification by Static Analysis: Limits and Challenges, vol.\u00a03962 (2025). https:\/\/ceur-ws.org\/Vol-3962\/paper16.pdf"},{"key":"14_CR49","unstructured":"Olivieri, L., Pasetto, L.: Towards compliance of smart contracts with the european union data act. In: CEUR Workshop Proceedings, vol.\u00a03629, pp. 61\u201366 (2024). https:\/\/ceur-ws.org\/Vol-3629"},{"key":"14_CR50","unstructured":"Olivieri, L., Pasetto, L., Negrini, L., Ferrara, P.: European union data act and blockchain technology: challenges and new directions. In: CEUR Workshop Proceedings, vol.\u00a03791. CEUR-WS (2024). https:\/\/ceur-ws.org\/Vol-3791\/paper30.pdf"},{"key":"14_CR51","doi-asserted-by":"publisher","unstructured":"Olivieri, L., Spoto, F.: Software verification challenges in the blockchain ecosystem. Int. J. Softw. Tools Technol. Transfer (2024). https:\/\/doi.org\/10.1007\/s10009-024-00758-x","DOI":"10.1007\/s10009-024-00758-x"},{"key":"14_CR52","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/978-3-662-63958-0_28","volume-title":"Financial Cryptography and Data Security. FC 2021 International Workshops","author":"L Olivieri","year":"2021","unstructured":"Olivieri, L., Spoto, F., Tagliaferro, F.: On-chain smart contract verification over tendermint. In: Bernhard, M., et al. (eds.) FC 2021. LNCS, vol. 12676, pp. 333\u2013347. Springer, Heidelberg (2021). https:\/\/doi.org\/10.1007\/978-3-662-63958-0_28"},{"key":"14_CR53","unstructured":"OpenZeppelin: Erc-20 pausable (2024). https:\/\/docs.openzeppelin.com\/contracts\/4.x\/api\/token\/erc20#ERC20Pausable. Accessed Aug 2024"},{"key":"14_CR54","unstructured":"OpenZeppelin: Erc-20 snapshot (2024). https:\/\/docs.openzeppelin.com\/contracts\/4.x\/api\/token\/erc20#ERC20Snapshot. Accessed Aug 2024"},{"key":"14_CR55","unstructured":"OpenZeppelin: Erc-721 pausable (2024). https:\/\/docs.openzeppelin.com\/contracts\/4.x\/api\/token\/erc721#ERC721Pausable. Accessed Aug 2024"},{"key":"14_CR56","unstructured":"Patrick, C.: Principles of Abstract Interpretation. MIT Press Academic, Cambridge (2021)"},{"key":"14_CR57","unstructured":"Popper, N.: A Hacking of More Than \\$50 Million Dashes Hopes in the World of Virtual Currency. The New York Times (2016)"},{"key":"14_CR58","doi-asserted-by":"crossref","unstructured":"Rajasekar, V., Sondhi, S., Saad, S., Mohammed, S.: Emerging design patterns for blockchain applications. In: ICSOFT, pp. 242\u2013249 (2020)","DOI":"10.5220\/0009892702420249"},{"key":"14_CR59","doi-asserted-by":"crossref","unstructured":"Ressi, D., Span\u00f2, A., Benetollo, L., Piazza, C., Bugliesi, M., Rossi, S.: Vulnerability detection in ethereum smart contracts via machine learning: a qualitative analysis. arXiv preprint arXiv:2407.18639 (2024)","DOI":"10.1016\/j.bcra.2025.100390"},{"key":"14_CR60","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1090\/s0002-9947-1953-0053041-6","volume":"74","author":"HG Rice","year":"1953","unstructured":"Rice, H.G.: Classes of recursively enumerable sets and their decision problems. Trans. Am. Math. Soc. 74, 358\u2013366 (1953). https:\/\/doi.org\/10.1090\/s0002-9947-1953-0053041-6","journal-title":"Trans. Am. Math. Soc."},{"key":"14_CR61","doi-asserted-by":"publisher","unstructured":"Seneviratne, O.: The feasibility of a smart contract \u201ckill switch\u201d. In: 2024 6th International Conference on Blockchain Computing and Applications (BCCA), pp. 473\u2013480 (2024). https:\/\/doi.org\/10.1109\/BCCA62388.2024.10844477","DOI":"10.1109\/BCCA62388.2024.10844477"},{"key":"14_CR62","first-page":"302","volume-title":"Static Analysis","author":"C Urban","year":"2014","unstructured":"Urban, C., Min\u00e9, A.: A decision tree abstract domain for proving conditional termination. In: M\u00fcller-Olm, M., Seidl, H. (eds.) Static Analysis, pp. 302\u2013318. Springer, Cham (2014)"},{"key":"14_CR63","unstructured":"Wasiu, A.: Mastering Solidity: require and Custom Errors in Ethereum Contracts (2023). https:\/\/medium.com\/coinmonks\/mastering-solidity-require-and-custom-errors-in-ethereum-contracts--b491565f1592. Accessed May 2025"},{"key":"14_CR64","doi-asserted-by":"publisher","unstructured":"Wohrer, M., Zdun, U.: Smart contracts: security patterns in the ethereum ecosystem and solidity. In: 2018 International Workshop on Blockchain Oriented Software Engineering (IWBOSE), pp.\u00a02\u20138 (2018). https:\/\/doi.org\/10.1109\/IWBOSE.2018.8327565","DOI":"10.1109\/IWBOSE.2018.8327565"},{"issue":"2014","key":"14_CR65","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood, G., et al.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151(2014), 1\u201332 (2014)","journal-title":"Ethereum Project Yellow Paper"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Blockchain Technology and Emerging Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-12335-0_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T05:23:28Z","timestamp":1774848208000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-12335-0_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032123343","9783032123350"],"references-count":65,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-12335-0_14","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"13 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Blocktea","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Blockchain Technology and Emerging Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Venice","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"blocktea2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/blocktea.eai-conferences.org\/2025","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}