{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:57:45Z","timestamp":1774540665041,"version":"3.50.1"},"reference-count":45,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,1]]},"DOI":"10.1109\/icbc56567.2023.10174993","type":"proceedings-article","created":{"date-parts":[[2023,7,12]],"date-time":"2023-07-12T17:20:50Z","timestamp":1689182450000},"page":"1-14","source":"Crossref","is-referenced-by-count":40,"title":["SoK: Not Quite Water Under the Bridge: Review of Cross-Chain Bridge Hacks"],"prefix":"10.1109","author":[{"given":"Sung-Shine","family":"Lee","sequence":"first","affiliation":[{"name":"Quantstamp, Inc."}]},{"given":"Alexandr","family":"Murashkin","sequence":"additional","affiliation":[{"name":"Quantstamp, Inc."}]},{"given":"Martin","family":"Derka","sequence":"additional","affiliation":[{"name":"Quantstamp, Inc."}]},{"given":"Jan","family":"Gorzny","sequence":"additional","affiliation":[{"name":"Quantstamp, Inc."}]}],"member":"263","reference":[{"key":"ref13","article-title":"Trustless, privacy-preserving blockchain bridges","volume":"abs 2102 4660","author":"stone","year":"2021","journal-title":"CoRR"},{"key":"ref35","author":"mccorry","year":"2021","journal-title":"Sok Validating bridges as a scaling solution for blockchains"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3184726"},{"key":"ref34","author":"gangji","year":"2021","journal-title":"Post-mortem-Polygon bridge vulnerability"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/DAPPS52256.2021.00013"},{"key":"ref37","author":"zamyatin","year":"2019","journal-title":"SoK Communication across dis-tributed ledgers"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109378"},{"key":"ref36","author":"kiepuszewski","year":"2022","journal-title":"L2Bridge risk framework"},{"key":"ref31","author":"lundfall","year":"2020","journal-title":"EIP-2612 permit-712-signed approvals"},{"key":"ref30","year":"0","journal-title":"Crypto"},{"key":"ref11","author":"entriken","year":"2018","journal-title":"ERC-721 Token Standard"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03329-3_15"},{"key":"ref10","author":"vogel steller","year":"2015","journal-title":"ERC-20 Token Standard"},{"key":"ref32","author":"smaragdakis","year":"2022","journal-title":"Phantom functions and the billion-dollar no-op"},{"key":"ref2","author":"wood","year":"2014","journal-title":"Ethereum A Secure Decentralised Generalised Transaction Ledger"},{"key":"ref1","author":"nakamoto","year":"2008","journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System"},{"key":"ref17","year":"2021","journal-title":"Contract ABI specification (revision e14f2714)"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC51069.2021.9461152"},{"key":"ref16","author":"moriya","year":"2018","journal-title":"How to get ethereum encoded function signatures"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3366626.3368129"},{"key":"ref19","author":"menezes","year":"1996","journal-title":"Handbook of Applied Cryptography"},{"key":"ref18","author":"bertoni","year":"2015","journal-title":"Keccak Cryptology ePrint Archive"},{"key":"ref24","author":"adams","year":"2022","journal-title":"Breaking down the Mete hack"},{"key":"ref23","article-title":"Verification of a Merkle Patricia tree library using F","volume":"abs 2106 4826","author":"sato","year":"2021","journal-title":"CoRR"},{"key":"ref45","year":"0","journal-title":"Secure Asset Transfer Protocol"},{"key":"ref26","year":"2021","journal-title":"pNetwork post mortem pBTC-on-BSC exploit"},{"key":"ref25","author":"goodin","year":"2022","journal-title":"How 323m in crypto was stolen from a blockchain bridge called wormhole"},{"key":"ref20","author":"hu","year":"2021","journal-title":"The initial analysis of the Poly Network attack"},{"key":"ref42","first-page":"537","article-title":"SoK: Exploring blockchains interoperability","author":"wang","year":"2021","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref41","author":"wood","year":"0","journal-title":"Polkadot Vision for a heterogeneous multi-chain framework"},{"key":"ref22","author":"wagner","year":"2021","journal-title":"Polygon double-spend bugfix review-$2m bounty"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3530019.3531345"},{"key":"ref21","author":"hu","year":"2021","journal-title":"The further analysis of the Poly Network attack"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3573896"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2969706"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"ref29","author":"ma","year":"2019","journal-title":"Fundamentals of Smart Contract Security"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3081998"},{"key":"ref7","first-page":"21","article-title":"Proof-of-work sidechains","volume":"11599","author":"kiayias","year":"2019","journal-title":"Financial Cryp-tography and Data Security - FC 2019 International Workshops VOTING and WTSC"},{"key":"ref9","author":"newman","year":"2022","journal-title":"Blockchains have a &#x2018;bridge&#x2019; problem and hackers know it"},{"key":"ref4","author":"gudgeon","year":"2019","journal-title":"SoK Layer-Two Blockchain Protocols"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.7250\/csimq.2021-26.03"},{"key":"ref6","author":"poon","year":"2017","journal-title":"Plasma Scalable autonomous smart contracts"},{"key":"ref5","author":"khalil","year":"2018","journal-title":"Commit-Chains Secure Scalable Off-Chain Payments"},{"key":"ref40","author":"kwon","year":"2019","journal-title":"Cosmos whitepaper A network of distribtued ledgers"}],"event":{"name":"2023 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","location":"Dubai, United Arab Emirates","start":{"date-parts":[[2023,5,1]]},"end":{"date-parts":[[2023,5,5]]}},"container-title":["2023 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10174862\/10174863\/10174993.pdf?arnumber=10174993","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T17:57:56Z","timestamp":1690912676000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10174993\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,1]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/icbc56567.2023.10174993","relation":{},"subject":[],"published":{"date-parts":[[2023,5,1]]}}}