{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T16:15:46Z","timestamp":1776183346544,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":48,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662544549","type":"print"},{"value":"9783662544556","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-662-54455-6_8","type":"book-chapter","created":{"date-parts":[[2017,3,27]],"date-time":"2017-03-27T20:44:03Z","timestamp":1490647443000},"page":"164-186","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1027,"title":["A Survey of Attacks on Ethereum Smart Contracts (SoK)"],"prefix":"10.1007","author":[{"given":"Nicola","family":"Atzei","sequence":"first","affiliation":[]},{"given":"Massimo","family":"Bartoletti","sequence":"additional","affiliation":[]},{"given":"Tiziana","family":"Cimoli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,28]]},"reference":[{"key":"8_CR1","unstructured":"Announcement of imminent hard fork for EIP150 gas cost changes. https:\/\/blog.ethereum.org\/2016\/10\/13\/announcement-imminent-hard-fork-eip150-gas-cost-changes\/"},{"key":"8_CR2","unstructured":"Bitcointalk: Hi!My name is Rubixi. https:\/\/bitcointalk.org\/index.php?topic=1400536.60"},{"key":"8_CR3","unstructured":"Ethereum Classic. https:\/\/ethereumclassic.github.io\/"},{"key":"8_CR4","unstructured":"The ethereum network is currently undergoing a dos attack. https:\/\/blog.ethereum.org\/2016\/09\/22\/ethereum-network-currently-undergoing-dos-attack\/"},{"key":"8_CR5","unstructured":"Ethereum reddit page. https:\/\/www.reddit.com\/r\/ethereum"},{"key":"8_CR6","unstructured":"Ethereum Wiki: Contract security techniques and tips. https:\/\/github.com\/ethereum\/wiki\/wiki\/Safety"},{"key":"8_CR7","unstructured":"Explaining eip 150. https:\/\/www.reddit.com\/r\/ethereum\/comments\/56f6we\/explaining_eip_150\/"},{"key":"8_CR8","unstructured":"GovernMental main page. http:\/\/governmental.github.io\/GovernMental\/"},{"key":"8_CR9","unstructured":"Hacking, Distribute: Scanning live Ethereum contracts for the \u201cunchecked-send\u201d bug. http:\/\/hackingdistributed.com\/2016\/06\/16\/scanning-live-ethereum-contracts-for-bugs\/"},{"key":"8_CR10","unstructured":"King of the Ether Throne: Post mortem investigation. https:\/\/www.kingoftheether.com\/postmortem.html"},{"key":"8_CR11","unstructured":"MAker DART: a random number generating game for Ethereum. https:\/\/github.com\/makerdao\/maker-darts"},{"key":"8_CR12","unstructured":"RANDAO: a DAO working as RNG of Ethereum. https:\/\/github.com\/randao\/randao"},{"key":"8_CR13","unstructured":"Solidity: security considerations. http:\/\/solidity.readthedocs.io\/en\/develop\/index.html"},{"key":"8_CR14","unstructured":"Understanding the DAO attack. http:\/\/www.coindesk.com\/understanding-dao-hack-journalists\/"},{"key":"8_CR15","unstructured":"Anderson, L., Holz, R., Ponomarev, A., Rimba, P., Weber, I.: New kids on the block: an analysis of modern blockchains. CoRR, abs\/1606.06530 (2016)"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Andrychowicz, M., Dziembowski, S., Malinowski, D., Mazurek, L.: Secure multiparty computations on Bitcoin. In: IEEE S&P, pp. 443\u2013458 (2014)","DOI":"10.1109\/SP.2014.35"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Bhargavan, K., Delignat-Lavaud, A., Fournet, C., Gollamudi, A., Gonthier, G., Kobeissi, N., Rastogi, A., Sibut-Pinote, T., Swamy, N., Zanella-Beguelin, S.: Formal verification of smart contracts. In: PLAS (2016)","DOI":"10.1145\/2993600.2993611"},{"key":"8_CR18","unstructured":"Bishop, M.: A taxonomy of Unix system and network vulnerabilities. Technical Report, CSE-95-10, Department of Computer Science, University of California at Davis (1995)"},{"key":"8_CR19","unstructured":"Bishop, M.: Vulnerabilities analysis. In: Proceedings of the Recent Advances in Intrusion Detection, pp. 125\u2013136 (1999)"},{"key":"8_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/3-540-44598-6_15","volume-title":"Advances in Cryptology \u2014 CRYPTO 2000","author":"D Boneh","year":"2000","unstructured":"Boneh, D., Naor, M.: Timed commitments. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 236\u2013254. Springer, Heidelberg (2000). doi:10.1007\/3-540-44598-6_15"},{"key":"8_CR21","unstructured":"Bonneau, J., Clark, J., Goldfeder, S.: On Bitcoin as a public randomness source. IACR Cryptology ePrint Archive 2015, 1015 (2015)"},{"key":"8_CR22","unstructured":"Brown, R.G., Carlyle, J., Grigg, I., Hearn, M.: Corda: an introduction (2016). http:\/\/r3cev.com\/s\/corda-introductory-whitepaper-final.pdf"},{"key":"8_CR23","unstructured":"Buterin, V.: Ethereum: a next generation smart contract and decentralized application platform (2013). https:\/\/github.com\/ethereum\/wiki\/wiki\/White-Paper"},{"key":"8_CR24","unstructured":"Churyumov, A.: Byteball: a decentralized system for transfer of value (2016). https:\/\/byteball.org\/Byteball.pdf"},{"key":"8_CR25","unstructured":"Clack, C.D., Bakshi, V.A., Braine, L.: Smart contract templates: foundations, design landscape and research directions. CoRR abs\/1608.00771 (2016)"},{"key":"8_CR26","doi-asserted-by":"crossref","unstructured":"Delmolino, K., Arnett, M., Kosba, A.M.A., Shi, E.: Step by step towards creating a safe smart contract: lessons and insights from a crypto currency lab (2016)","DOI":"10.1007\/978-3-662-53357-4_6"},{"key":"8_CR27","unstructured":"Etherscripter. http:\/\/etherscripter.com"},{"key":"8_CR28","doi-asserted-by":"crossref","unstructured":"Eyal, I., Sirer, E.: Majority is not enough: bitcoin mining is vulnerable. In: Financial Cryptography and Data Security, pp. 436\u2013454 (2014)","DOI":"10.1007\/978-3-662-45472-5_28"},{"key":"8_CR29","doi-asserted-by":"crossref","unstructured":"Frantz, C.K., Nowostawski, M.: From institutions to code: towards automated generation of smart contracts. In: Workshop on Engineering Collective Adaptive Systems (eCAS) (2016)","DOI":"10.1109\/FAS-W.2016.53"},{"key":"8_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/978-3-662-46803-6_10","volume-title":"Advances in Cryptology - EUROCRYPT 2015","author":"J Garay","year":"2015","unstructured":"Garay, J., Kiayias, A., Leonardos, N.: The bitcoin backbone protocol: analysis and applications. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9057, pp. 281\u2013310. Springer, Heidelberg (2015). doi:10.1007\/978-3-662-46803-6_10"},{"key":"8_CR31","doi-asserted-by":"crossref","unstructured":"Gervais, A., Karame, G.O., W\u00fcst, K., Glykantzis, V., Ritzdorf, H., Capkun, S.: On the security and performance of proof of work blockchains. In: ACM CCS, pp. 3\u201316 (2016)","DOI":"10.1145\/2976749.2978341"},{"key":"8_CR32","unstructured":"Hirai, Y.: Formal verification of Deed contract in Ethereum name service. https:\/\/yoichihirai.com\/deed.pdf"},{"issue":"3","key":"8_CR33","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1145\/185403.185412","volume":"26","author":"CE Landwehr","year":"1994","unstructured":"Landwehr, C.E., Bull, A.R., McDermott, J.P., Choi, W.S.: A taxonomy of computer program security flaws. ACM Comput. Surv. 26(3), 211\u2013254 (1994)","journal-title":"ACM Comput. Surv."},{"key":"8_CR34","unstructured":"Luu, L., Chu, D.H., Olickel, H., Saxena, P., Hobor, A.: Making smart contracts smarter. In: ACM CCS (2016). http:\/\/eprint.iacr.org\/2016\/633"},{"key":"8_CR35","doi-asserted-by":"crossref","unstructured":"Luu, L., Teutsch, J., Kulkarni, R., Saxena, P.: Demystifying incentives in the consensus computer. In: ACM CCS, pp. 706\u2013719 (2015)","DOI":"10.1145\/2810103.2813659"},{"key":"8_CR36","doi-asserted-by":"crossref","unstructured":"Marino, B., Juels, A.: Setting standards for altering and undoing smart contracts. In: RuleML, pp. 151\u2013166 (2016)","DOI":"10.1007\/978-3-319-42019-6_10"},{"key":"8_CR37","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"8_CR38","series-title":"Lecture Notes in Computer Science","volume-title":"Isabelle\/HOL: A Proof Assistant for Higherorder","year":"2002","unstructured":"Nipkow, T., Wenzel, M., Paulson, L.C. (eds.): Isabelle\/HOL: A Proof Assistant for Higherorder. LNCS, vol. 2283. Springer, Heidelberg (2002)"},{"key":"8_CR39","unstructured":"Nomura Research Institute: Survey on blockchain technologies and related services. http:\/\/www.meti.go.jp\/english\/press\/2016\/pdf\/0531_01f.pdf"},{"key":"8_CR40","unstructured":"Pierrot, C., Wesolowski, B.: Malleability of the blockchain\u2019s entropy. IACR Cryptology ePrint Archive 2016, 370 (2016)"},{"key":"8_CR41","unstructured":"Piessens, F.: A taxonomy of causes of software vulnerabilities in internet software. In: International Symposium on Software Reliability Engineering, pp. 47\u201352 (2002)"},{"key":"8_CR42","unstructured":"Popejoy, S.: The Pact smart contract language (2016). http:\/\/kadena.io\/pact"},{"key":"8_CR43","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1007\/978-3-662-47854-7_32","volume-title":"Financial Cryptography and Data Security","author":"Y Sompolinsky","year":"2015","unstructured":"Sompolinsky, Y., Zohar, A.: Secure high-rate transaction processing in bitcoin. In: B\u00f6hme, R., Okamoto, T. (eds.) FC 2015. LNCS, vol. 8975, pp. 507\u2013527. Springer, Heidelberg (2015). doi:10.1007\/978-3-662-47854-7_32"},{"key":"8_CR44","doi-asserted-by":"crossref","unstructured":"Swamy, N., Hritcu, C., Keller, C., Rastogi, A., Delignat-Lavaud, A., Forest, S., Bhargavan, K., Fournet, C., Strub, P., Kohlweiss, M., Zinzindohoue, J.K., B\u00e9guelin, S.Z.: Dependent types and multi-monadic effects in F*. In: POPL (2016)","DOI":"10.1145\/2837614.2837655"},{"key":"8_CR45","unstructured":"Szabo, N.: Formalizing and securing relationships on public networks. First Monday 2(9) (1997). http:\/\/firstmonday.org\/htbin\/cgiwrap\/bin\/ojs\/index.php\/fm\/article\/view\/548"},{"key":"8_CR46","unstructured":"UK Government Chief Scientific Adviser: Distributed ledger technology: beyond block chain. https:\/\/www.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/492972\/gs-16-1-distributed-ledger-technology.pdf"},{"key":"8_CR47","unstructured":"Wood, G.: Ethereum: a secure decentralised generalised transaction ledger (2014). gavwood.com\/paper.pdf"},{"key":"8_CR48","unstructured":"W\u00fcst, K., Gervais, A.: Ethereum Eclipse Attacks. Technical report, ETH-Z\u00fcrich (2016)"}],"container-title":["Lecture Notes in Computer Science","Principles of Security and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-54455-6_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,21]],"date-time":"2021-04-21T01:55:17Z","timestamp":1618970117000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-54455-6_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783662544549","9783662544556"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-54455-6_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"28 March 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"POST","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Principles of Security and Trust","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Uppsala","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 April 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 April 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"post2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.etaps.org\/index.php\/2017\/post","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}