{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T09:52:45Z","timestamp":1761126765691,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":37,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811597381"},{"type":"electronic","value":"9789811597398"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-9739-8_15","type":"book-chapter","created":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T12:05:09Z","timestamp":1604577909000},"page":"178-196","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Evil Chaincode: APT Attacks Based on Smart Contract"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4117-8772","authenticated-orcid":false,"given":"Zhenyu","family":"Li","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0951-8880","authenticated-orcid":false,"given":"Yujue","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Sheng","family":"Wen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3571-7576","authenticated-orcid":false,"given":"Yong","family":"Ding","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,4]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Averin, A., Averina, O.: Review of blockchain technology vulnerabilities and blockchain-system attacks. In: 2019 International Multi-conference on Industrial Engineering and Modern Technologies, FarEastCon 2019, pp. 1\u20136 (2019)","key":"15_CR1","DOI":"10.1109\/FarEastCon.2019.8934243"},{"unstructured":"Hyperledger: Hyperledger Supporting Members (2020). \nhttps:\/\/www.hyperledger.org\/members","key":"15_CR2"},{"issue":"2","key":"15_CR3","doi-asserted-by":"publisher","first-page":"1851","DOI":"10.1109\/COMST.2019.2891891","volume":"21","author":"A Alshamrani","year":"2019","unstructured":"Alshamrani, A., Myneni, S., Chowdhary, A., Huang, D.: A survey on advanced persistent threats: techniques, solutions, challenges, and research opportunities. IEEE Commun. Surv. Tutor. 21(2), 1851\u20131877 (2019)","journal-title":"IEEE Commun. Surv. Tutor."},{"unstructured":"Emm, D.: APT review: what the world\u2019s threat actors got up to in 2019 (2019). \nhttps:\/\/securelist.com\/ksb-2019-review-of-the-year\/95394\/","key":"15_CR4"},{"doi-asserted-by":"crossref","unstructured":"Yamashita, K., Nomura, Y., Zhou, E., Pi, B., Jun, S.: Potential risks of hyperledger fabric smart contracts. In: 2019 IEEE 2nd International Workshop on Blockchain Oriented Software Engineering, IWBOSE 2019, pp. 1\u201310 (2019)","key":"15_CR5","DOI":"10.1109\/IWBOSE.2019.8666486"},{"unstructured":"Atzei, N., Bartoletti, M., Cimoli, T.: A survey of attacks on Ethereum smart contracts. In: International Conference on Principles of Security and Trust, pp. 1\u201324, no. July (2015)","key":"15_CR6"},{"doi-asserted-by":"crossref","unstructured":"Mense, A., Flatscher, M.: Security Vulnerabilities in Ethereum Smart Contracts (2018)","key":"15_CR7","DOI":"10.1145\/3282373.3282419"},{"doi-asserted-by":"crossref","unstructured":"Liu, C., Chen, Z., Chen, B., Roscoe, B.: ReGuard: finding reentrancy bugs in smart contracts, pp. 3\u20136 (2018)","key":"15_CR8","DOI":"10.1145\/3183440.3183495"},{"key":"15_CR9","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/j.comnet.2016.05.018","volume":"109","author":"M Marchetti","year":"2016","unstructured":"Marchetti, M., Pierazzi, F., Colajanni, M., Guido, A.: Analysis of high volumes of network traffic for advanced persistent threat detection. Comput. Netw. 109, 127\u2013141 (2016)","journal-title":"Comput. Netw."},{"unstructured":"McCusker, O., Brunza, S., Dasgupta, D.: Deriving behavior primitives from aggregate network features using support vector machines. In: 2013 5th International Cyber Conflict (CyCon) (2013)","key":"15_CR10"},{"issue":"4","key":"15_CR11","first-page":"55","volume":"10","author":"B Zhou","year":"2019","unstructured":"Zhou, B., Man, Y., Liu, N., Zhang, Y., Zhang, C.: Biological data security management based on Hyperledger Fabric. Cyberspace Secur. 10(4), 55\u201360 (2019)","journal-title":"Cyberspace Secur."},{"issue":"4","key":"15_CR12","first-page":"1","volume":"44","author":"H Pu","year":"2017","unstructured":"Pu, H., Ge, Y., Yan-feng, Z., Yu-bin, B.: Survey on blockchain technology and its application prospect. Comput. Sci. 44(4), 1\u20137 (2017)","journal-title":"Comput. Sci."},{"unstructured":"Hyperledger: Hyperledger Fabric Chaincode (2020). \nhttps:\/\/github.com\/hyperledger\/fabric\/blob\/master\/docs\/source\/chaincode.rst","key":"15_CR13"},{"unstructured":"Hyperledger: Hyperledger Fabric Policy Hierarchy (2020). \nhttps:\/\/github.com\/hyperledger\/fabric\/blob\/master\/docs\/source\/policies\/Fabric_Policy_Hierarchy.pptx","key":"15_CR14"},{"unstructured":"Hyperledger: Hyperledger Fabric Membership Service Providers (MSP) (2020). \nhttps:\/\/github.com\/hyperledger\/fabric\/blob\/master\/docs\/source\/msp.rst","key":"15_CR15"},{"issue":"23","key":"15_CR16","first-page":"5638","volume":"28","author":"W Fang","year":"2007","unstructured":"Fang, W., Guodong, H., Xin, L.: Access control list of router and research of realization. Comput. Eng. Des. 28(23), 5638\u20135640 (2007)","journal-title":"Comput. Eng. Des."},{"key":"15_CR17","first-page":"41","volume":"2","author":"W Wei","year":"2001","unstructured":"Wei, W., Jie, D., Yin, L.: Network security and LAN security solutions. Tech. Autom. Appl. 2, 41\u201344 (2001)","journal-title":"Tech. Autom. Appl."},{"doi-asserted-by":"crossref","unstructured":"Wang, X., He, J., Xie, Z., Zhao, G., Cheung, S.C.: ContractGuard: defend ethereum smart contracts with embedded intrusion detection. IEEE Trans. Serv. Comput. 1\u201314 (2019)","key":"15_CR18","DOI":"10.1109\/TSC.2019.2949561"},{"unstructured":"FireEye: Red Team Cyber Security Assessments (2020). \nhttps:\/\/www.fireeye.com\/services\/red-team-assessments.html","key":"15_CR19"},{"doi-asserted-by":"crossref","unstructured":"Bohara, A., Noureddine, M.A., Fawaz, A., Sanders, W.H.: An unsupervised multi-detector approach for identifying malicious lateral movement. In: Proceedings of the IEEE Symposium on Reliable Distributed Systems 2017-Septe(Lm), pp. 224\u2013233 (2017)","key":"15_CR20","DOI":"10.1109\/SRDS.2017.31"},{"unstructured":"MITRE: Command and control (2020). \nhttps:\/\/attack.mitre.org\/tactics\/TA0011\/","key":"15_CR21"},{"unstructured":"Hyperledger: Chaincode for Developers (2018). \nhttps:\/\/hyperledger-fabric.readthedocs.io\/en\/release-1.4\/chaincode4ade.html","key":"15_CR22"},{"unstructured":"Mandiant: The Advanced Persistent Threat. FireEye (2010). \nhttps:\/\/content.fireeye.com\/m-trends\/rpt-m-trends-2010","key":"15_CR23"},{"unstructured":"MANDIANT: 2013 threat report. FireEye (2013). \nhttps:\/\/content.fireeye.com\/m-trends\/rpt-m-trends-2013","key":"15_CR24"},{"unstructured":"FireEye: M-Trends 2015: A View from the Front Lines Threa. FireEye (2015). \nhttps:\/\/content.fireeye.com\/m-trends\/rpt-m-trends-2015","key":"15_CR25"},{"unstructured":"FireEye: Mandiant consulting 2016. FireEye (2016). \nhttps:\/\/content.fireeye.com\/m-trends\/rpt-m-trends-2016","key":"15_CR26"},{"unstructured":"Li, M., Huang, W., Wang, Y., Fan, W.: The optimized attribute attack graph based on APT attack stage model. In: Proceedings of the 2016 2nd IEEE International Conference on Computer and Communications, ICCC 2016, pp. 2781\u20132785 (2017)","key":"15_CR27"},{"doi-asserted-by":"crossref","unstructured":"Lu, G., Guo, R., Wang, J.: An analysis of the behavior of APT attack in the Ngay campaign. In: 2018 18th IEEE International Conference on Communication Technology 2019-Octob, pp. 1115\u20131122 (2019)","key":"15_CR28","DOI":"10.1109\/ICCT.2018.8600114"},{"unstructured":"MITRE: MITRE ATT&CK\u2122 Remote Services - Enterprise (2020). \nhttps:\/\/attack.mitre.org\/techniques\/T1021\/","key":"15_CR29"},{"unstructured":"Hyperledger: Hyperledger Fabric application SDKs (2020). \nhttps:\/\/hyperledger-fabric.readthedocs.io\/en\/latest\/getting_started.html#hyperledger-fabric-application-sdks","key":"15_CR30"},{"unstructured":"R3: Getting set up for CorDapp development (2020). \nhttps:\/\/docs.corda.net\/docs\/corda-os\/4.5\/getting-set-up.html","key":"15_CR31"},{"unstructured":"Ethereum: The Solidity Contract-Oriented Programming Language (2020). \nhttps:\/\/github.com\/ethereum\/solidity","key":"15_CR32"},{"unstructured":"Ethereum: A Python implementation of the Ethereum Virtual Machine (2020). \nhttps:\/\/github.com\/ethereum\/py-evm","key":"15_CR33"},{"unstructured":"Hyperledger: peer chaincode (2020). \nhttps:\/\/hyperledger-fabric.readthedocs.io\/en\/latest\/commands\/peerchaincode.html","key":"15_CR34"},{"unstructured":"R3: Building and installing a CorDapp (2020). \nhttps:\/\/docs.corda.net\/docs\/corda-os\/4.5\/cordapp-build-systems.html","key":"15_CR35"},{"unstructured":"Yohanes.gultom: Compiling, deploying and calling Ethereum smartcontract using Python (2020). \nhttps:\/\/yohanes.gultom.me\/2018\/11\/28\/compiling-deploying-and-calling-ethereum-smartcontract-using-python\/","key":"15_CR36"},{"issue":"10","key":"15_CR37","first-page":"2304","volume":"50","author":"Y Yi","year":"2017","unstructured":"Yi, Y., Han, G., Yi-jun, W., Zhi, X.: Darknet resource exploring based on tor. Commun. Technol. 50(10), 2304\u20132309 (2017)","journal-title":"Commun. Technol."}],"container-title":["Communications in Computer and Information Science","Frontiers in Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-9739-8_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T12:12:18Z","timestamp":1604578338000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-9739-8_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811597381","9789811597398"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-9739-8_15","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"4 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Frontiers in Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tianjin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fcs2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.icfcs.com.cn\/fcs2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}