{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T04:08:14Z","timestamp":1769746094125,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":51,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662643211","type":"print"},{"value":"9783662643228","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-662-64322-8_2","type":"book-chapter","created":{"date-parts":[[2021,10,22]],"date-time":"2021-10-22T18:17:23Z","timestamp":1634926643000},"page":"33-52","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6992-703X","authenticated-orcid":false,"given":"Christof","family":"Ferreira Torres","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9358-7100","authenticated-orcid":false,"given":"Antonio Ken","family":"Iannillo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3565-3410","authenticated-orcid":false,"given":"Arthur","family":"Gervais","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4751-9577","authenticated-orcid":false,"given":"Radu","family":"State","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,23]]},"reference":[{"key":"2_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/978-3-662-54455-6_8","volume-title":"Principles of Security and Trust","author":"N Atzei","year":"2017","unstructured":"Atzei, N., Bartoletti, M., Cimoli, T.: A survey of attacks on ethereum smart contracts (SoK). In: Maffei, M., Ryan, M. (eds.) POST 2017. LNCS, vol. 10204, pp. 164\u2013186. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-662-54455-6_8"},{"key":"2_CR2","unstructured":"Brent, L., et al.: Vandal: a scalable security analysis framework for smart contracts (2018). arXiv preprint arXiv:1809.03981"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Chen, T., et al.: Soda: a generic online detection framework for smart contracts. In: Proceedings of the Network and Distributed System Security Symposium (NDSS\u201920) (2020)","DOI":"10.14722\/ndss.2020.24449"},{"key":"2_CR4","unstructured":"CoinMarketCap: Top 100 Cryptocurrencies by Market Capitalization (2020). https:\/\/coinmarketcap.com"},{"key":"2_CR5","unstructured":"ConsenSys Diligence: Uniswap Audit (2019). https:\/\/github.com\/ConsenSys\/Uniswap-audit-report-2018-12"},{"key":"2_CR6","unstructured":"Etherscan: The DAO (2016). https:\/\/etherscan.io\/address\/0xbb9bc244d798123fde783fcc1c72d3bb8c189413"},{"key":"2_CR7","unstructured":"Etherscan: The Dark DAO (2016). https:\/\/etherscan.io\/address\/0x304a554a310c7e546dfe434669c62820b7d83490"},{"key":"2_CR8","unstructured":"Etherscan: DSEthToken (2017). https:\/\/etherscan.io\/address\/0xd654bdd32fc99471455e86c2e7f7d7b6437e9179"},{"key":"2_CR9","unstructured":"Etherscan: HODLWallet (2018). https:\/\/etherscan.io\/address\/0x4a8d3a662e0fd6a8bd39ed0f91e4c1b729c81a38"},{"key":"2_CR10","unstructured":"Etherscan: Lendf.Me - MoneyMarket (2019). https:\/\/etherscan.io\/address\/0x0eee3e3828a45f7601d5f54bf49bb01d1a9df5ea"},{"key":"2_CR11","unstructured":"Etherscan: Uniswap: imBTC (2019). https:\/\/etherscan.io\/address\/0xffcf45b540e6c9f094ae656d2e34ad11cdfdb187"},{"key":"2_CR12","unstructured":"Etherscan: Ethereum Daily Transactions Chart (2020). https:\/\/etherscan.io\/chart\/tx"},{"key":"2_CR13","unstructured":"Etherscan: Wrapped Ether (2020). https:\/\/etherscan.io\/address\/0xc02aaa39b223fe8d0a0e5c4f27ead9083c756cc2"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Ferreira Torres, C., Baden, M., Norvill, R., Jonker, H.: \u00c6GIS: smart shielding of smart contracts. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 2589\u20132591 (2019)","DOI":"10.1145\/3319535.3363263"},{"key":"2_CR15","doi-asserted-by":"publisher","unstructured":"Ferreira Torres, C., Sch\u00fctte, J., State, R.: Osiris: hunting for integer bugs in ethereum smart contracts. In: Proceedings of the 34th Annual Computer Security Applications Conference, ACSAC \u201918, pp. 664\u2013676. ACM, New York (2018). https:\/\/doi.org\/10.1145\/3274694.3274737","DOI":"10.1145\/3274694.3274737"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Ferreira Torres, C., Steichen, M., Norvill, R., Fiz Pontiveros, B., Jonker, H.: \u00c6GIS: shielding vulnerable smart contracts against attacks. In: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS\u201920), Taipei, Taiwan, 5\u20139 October 2020 (2020)","DOI":"10.1145\/3320269.3384756"},{"key":"2_CR17","unstructured":"Ferreira Torres, C., Steichen, M., State, R.: The art of the scam: demystifying honeypots in ethereum smart contracts. In: 28th USENIX Security Symposium (USENIX Security 19), pp. 1591\u20131607. USENIX Association, Santa Clara (2019)"},{"key":"2_CR18","unstructured":"Frank, J., Aschermann, C., Holz, T.: ETHBMC: a bounded model checker for smart contracts. In: 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, Boston (2020)"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Grossman, S., et al.: Online detection of effectively callback free objects with applications to smart contracts. In: Proceedings of the ACM on Programming Languages, vol. 2, no. POPL, p. 48 (2017)","DOI":"10.1145\/3158136"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Hildenbrandt, E., et al.: Kevm: a complete formal semantics of the ethereum virtual machine. In: 2018 IEEE 31st Computer Security Foundations Symposium (CSF), pp. 204\u2013217 (2018)","DOI":"10.1109\/CSF.2018.00022"},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Jiang, B., Liu, Y., Chan, W.: Contractfuzzer: fuzzing smart contracts for vulnerability detection. In: Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering, pp. 259\u2013269. ACM (2018)","DOI":"10.1145\/3238147.3238177"},{"key":"2_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1007\/978-3-319-41540-6_23","volume-title":"Computer Aided Verification","author":"H Jordan","year":"2016","unstructured":"Jordan, H., Scholz, B., Suboti\u0107, P.: Souffl\u00e9: on synthesis of program analyzers. In: Chaudhuri, S., Farzan, A. (eds.) CAV 2016. LNCS, vol. 9780, pp. 422\u2013430. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-41540-6_23"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Kalra, S., Goel, S., Dhawan, M., Sharma, S.: Zeus: analyzing safety of smart contracts. In: NDSS, pp. 1\u201312 (2018)","DOI":"10.14722\/ndss.2018.23082"},{"key":"2_CR24","unstructured":"Finley, K.: A \\$50 million hack just showed that the DAO was all too human (2016). https:\/\/www.wired.com\/2016\/06\/50-million-hack-just-showed-dao-human\/"},{"key":"2_CR25","unstructured":"Krupp, J., Rossow, C.: teether: Gnawing at ethereum to automatically exploit smart contracts. In: 27th USENIX Security Symposium (USENIX Security 18), pp. 1317\u20131333 (2018)"},{"key":"2_CR26","doi-asserted-by":"publisher","unstructured":"Luu, L., Chu, D.H., Olickel, H., Saxena, P., Hobor, A.: Making smart contracts smarter. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS\u201916, pp. 254\u2013269. ACM Press, New York (2016). https:\/\/doi.org\/10.1145\/2976749.2978309","DOI":"10.1145\/2976749.2978309"},{"key":"2_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/978-3-319-89722-6_11","volume-title":"Principles of Security and Trust","author":"A Mavridou","year":"2018","unstructured":"Mavridou, A., Laszka, A.: Tool demonstration: FSolidM for designing secure ethereum smart contracts. In: Bauer, L., K\u00fcsters, R. (eds.) POST 2018. LNCS, vol. 10804, pp. 270\u2013277. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-89722-6_11"},{"key":"2_CR28","unstructured":"Evgeny, M.: Ethereum ETL v1.3.0 (2019). https:\/\/github.com\/blockchain-etl\/ethereum-etl"},{"key":"2_CR29","unstructured":"Mueller, B.: Smashing ethereum smart contracts for fun and real profit. In: The 9th annual HITB Security Conference (2018)"},{"key":"2_CR30","unstructured":"NCC Group: Decentralized Application Security Project (or DASP) Top 10 of 2018 (2018). https:\/\/dasp.co"},{"key":"2_CR31","doi-asserted-by":"crossref","unstructured":"Nikoli\u0107, I., Kolluri, A., Sergey, I., Saxena, P., Hobor, A.: Finding the greedy, prodigal, and suicidal contracts at scale. In: Proceedings of the 34th Annual Computer Security Applications Conference, pp. 653\u2013663. ACM (2018)","DOI":"10.1145\/3274694.3274743"},{"key":"2_CR32","unstructured":"PeckShield - batchOverflow Bug: ALERT: New batchOverflow Bug in Multiple ERC20 Smart Contracts (CVE-2018-10299) (2018). https:\/\/blog.peckshield.com\/2018\/04\/22\/batchOverflow\/"},{"key":"2_CR33","unstructured":"PeckShield - proxyOverflow Bug : New proxyOverflow Bug in Multiple ERC20 Smart Contracts (CVE-2018-10376) (2018). https:\/\/blog.peckshield.com\/2018\/04\/25\/proxyOverflow\/"},{"key":"2_CR34","unstructured":"Perez, D., Livshits, B.: Smart contract vulnerabilities: vulnerable does not imply exploited. In: 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, Vancouver (2021)"},{"key":"2_CR35","unstructured":"Petrov, S.: Another parity wallet hack explained (2017). https:\/\/medium.com\/@Pr0Ger\/another-parity-wallet-hack-explained-847ca46a2e1c"},{"key":"2_CR36","doi-asserted-by":"crossref","unstructured":"Rodler, M., Li, W., Karame, G., Davi, L.: Sereum: protecting existing smart contracts against re-entrancy attacks. In: Proceedings of the Network and Distributed System Security Symposium (NDSS\u201919) (2019)","DOI":"10.14722\/ndss.2019.23413"},{"key":"2_CR37","unstructured":"Ryan Sean Adams (2020). https:\/\/twitter.com\/RyanSAdams\/status\/1252574107159408640"},{"key":"2_CR38","doi-asserted-by":"crossref","unstructured":"Schneidewind, C., Grishchenko, I., Scherer, M., Maffei, M.: ethor: practical and provably sound static analysis of ethereum smart contracts (2020). arXiv preprint arXiv:2005.06227","DOI":"10.1145\/3372297.3417250"},{"key":"2_CR39","doi-asserted-by":"crossref","unstructured":"So, S., Lee, M., Park, J., Lee, H., Oh, H.: Verismart: a highly precise safety verifier for ethereum smart contracts. In: 2020 IEEE Symposium on Security and Privacy (SP), pp. 1678\u20131694. IEEE (2020)","DOI":"10.1109\/SP40000.2020.00032"},{"key":"2_CR40","unstructured":"StackExchange: Why is my node synchronization stuck\/extremely slow at block 2,306,843? (2016). https:\/\/ethereum.stackexchange.com\/questions\/9883\/why-is-my-node-synchronization-stuck-extremely-slow-at-block-2-306-843"},{"key":"2_CR41","doi-asserted-by":"crossref","unstructured":"Szabo, N.: Formalizing and securing relationships on public networks. First Monday 2(9) (1997)","DOI":"10.5210\/fm.v2i9.548"},{"key":"2_CR42","unstructured":"Szil\u00e1gyi, P.: Go-Ethereum Management APIs - JavaScript-based tracing (2020). https:\/\/github.com\/ethereum\/go-ethereum\/wiki\/Management-APIs#javascript-based-tracing"},{"key":"2_CR43","doi-asserted-by":"crossref","unstructured":"Tikhomirov, S., Voskresenskaya, E., Ivanitskiy, I., Takhaviev, R., Marchenko, E., Alexandrov, Y.: Smartcheck: static analysis of ethereum smart contracts. In: 2018 IEEE\/ACM 1st International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB), pp. 9\u201316. IEEE (2018)","DOI":"10.1145\/3194113.3194115"},{"key":"2_CR44","doi-asserted-by":"crossref","unstructured":"Tsankov, P., Dan, A., Drachsler-Cohen, D., Gervais, A., Buenzli, F., Vechev, M.: Securify: practical security analysis of smart contracts. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 67\u201382. ACM (2018)","DOI":"10.1145\/3243734.3243780"},{"key":"2_CR45","unstructured":"Wang, Y., et al.: Formal specification and verification of smart contracts for azure blockchain (2019). https:\/\/www.microsoft.com\/en-us\/research\/publication\/formal-specification-and-verification-of-smart-contracts-for-azure-blockchain"},{"key":"2_CR46","unstructured":"Wood, G.: Solidity 0.6.8 documentation (2020). https:\/\/solidity.readthedocs.io\/en\/v0.6.8\/"},{"issue":"2014","key":"2_CR47","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood, G., et al.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Proj. Yellow Paper 151(2014), 1\u201332 (2014)","journal-title":"Ethereum Proj. Yellow Paper"},{"key":"2_CR48","unstructured":"Wu, L., et al.: Ethscope: a transaction-centric security analytics framework to detect malicious smart contracts on ethereum (2020). arXiv preprint arXiv:2005.08278"},{"key":"2_CR49","unstructured":"Zhang, M., Zhang, X., Zhang, Y., Lin, Z.: TXSPECTOR: uncovering attacks in ethereum from transactions. In: 29th USENIX Security Symposium (USENIX Security 20), pp. 2775\u20132792. USENIX Association (2020)"},{"key":"2_CR50","unstructured":"Zhao, W.: \\$30 Million: Ether Reported Stolen Due to Parity Wallet Breach (2017). https:\/\/www.coindesk.com\/30-million-ether-reported-stolen-parity-wallet-breach"},{"key":"2_CR51","unstructured":"Zhou, S., Yang, Z., Xiang, J., Cao, Y., Yang, Z., Zhang, Y.: An ever-evolving game: evaluation of real-world attacks and defenses in ethereum ecosystem. In: 29th USENIX Security Symposium (USENIX Security 20), pp. 2793\u20132810. USENIX Association (2020)"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-64322-8_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,22]],"date-time":"2021-10-22T18:25:25Z","timestamp":1634927125000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-64322-8_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783662643211","9783662643228"],"references-count":51,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-64322-8_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"23 October 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 March 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 March 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc21.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}