{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T21:34:06Z","timestamp":1777152846126,"version":"3.51.4"},"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T00:00:00Z","timestamp":1716768000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T00:00:00Z","timestamp":1716768000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,27]]},"DOI":"10.1109\/icbc59979.2024.10634335","type":"proceedings-article","created":{"date-parts":[[2024,8,21]],"date-time":"2024-08-21T22:53:39Z","timestamp":1724280819000},"page":"293-295","source":"Crossref","is-referenced-by-count":1,"title":["Incident Analysis of Decentralized Finance"],"prefix":"10.1109","author":[{"given":"Cheng-Chieh","family":"Lin","sequence":"first","affiliation":[{"name":"National Cheng Kung University,Department of Computer Science and Information Engineering"}]},{"given":"Chia-Cheng","family":"Tsai","sequence":"additional","affiliation":[{"name":"National Taiwan University,Department of Computer Science and Information Engineering"}]},{"given":"Shih-Wei","family":"Liao","sequence":"additional","affiliation":[{"name":"National Taiwan University,Department of Computer Science and Information Engineering"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179435"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain55522.2022.00075"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"841","DOI":"10.1016\/j.future.2017.08.020","article-title":"A survey on the security of blockchain systems","volume":"107","author":"Li","year":"2020","journal-title":"Future Generation Computer Systems"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3140091"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2019.2895123"},{"key":"ref6","volume-title":"Decoding Jimbo\u2019s Protocol $7.5M Exploit \u2014 QuillAudits \u2014 quillaudits. medium.com","year":"2023"},{"key":"ref7","volume-title":"Decoding Swaprum Finance $3 Million Rug Pull \u2014 QuillAudits \u2014 quillaudits.medium.com","year":"2023"},{"key":"ref8","volume-title":"Rekt - Level Finance - REKT \u2014 rekt.news","year":"2023"},{"key":"ref9","volume-title":"Decoding Ovix Protocol\u2019s $2 Million Exploit \u2014 QuillAudits \u2014 quillaudits.medium.com","year":"2023"},{"key":"ref10","volume-title":"Rekt - Merlin DEX - REKT \u2014 rekt.news","year":"2023"},{"key":"ref11","volume-title":"Rekt - Hundred Finance - REKT 2 \u2014 rekt.news","year":"2023"},{"key":"ref12","volume-title":"Rekt - Yearn - REKT 2 \u2014 rekt.news","year":"2023"},{"key":"ref13","volume-title":"Rekt - SushiSwap - REKT \u2014 rekt.news","year":"2023"},{"key":"ref14","volume-title":"Rekt - Safemoon - REKT \u2014 rekt.news","year":"2023"},{"key":"ref15","volume-title":"Rekt - Kokomo Finance - REKT \u2014 rekt.news","year":"2023"},{"key":"ref16","volume-title":"Euler Finance Incident Post-Mortem \u2014 omniscia.io","year":"2023"},{"key":"ref17","volume-title":"Analysis & Remediation of the Precompile Attack on the Hedera Network \u2014 Hedera \u2014 hedera.com","author":"Joe Blanchard","year":"2023"},{"key":"ref18","volume-title":"Rekt - Hope Finance - REKT \u2014 rekt.news","year":"2023"},{"key":"ref19","volume-title":"Rekt - Dexible - REKT \u2014 rekt.news","year":"2023"},{"key":"ref20","volume-title":"Rekt - Platypus Finance - REKT \u2014 rekt.news","year":"2023"},{"key":"ref21","volume-title":"Rekt - dForce Network - REKT \u2014 rekt.news","year":"2023"},{"key":"ref22","volume-title":"Rekt - Orion Protocol - REKT \u2014 rekt.news","year":"2023"},{"key":"ref23","volume-title":"How Was Rubic Protocol Hacked? \u2014 neptunemutual. com","year":"2022"},{"key":"ref24","volume-title":"Rekt - Raydium - REKT \u2014 rekt.news","year":"2022"},{"key":"ref25","volume-title":"Post Mortem Summary \u2014 blog.lodestarfinance.io","year":"2022"},{"key":"ref26","volume-title":"V2 Vulnerability Post Mortem \u2014 dfxfinance","year":"2022"},{"key":"ref27","volume-title":"Decoding Skyward Finance Smart Contract Vulnerability \u2014 medium.com","year":"2022"},{"key":"ref28","volume-title":"Rekt - Team Finance - REKT \u2014 rekt.news","year":"2022"},{"key":"ref29","volume-title":"Rekt - Mango Markets - REKT \u2014 rekt.news","year":"2022"},{"key":"ref30","volume-title":"Rekt - Transit Swap - REKT \u2014 rekt.news","year":"2022"},{"key":"ref31","volume-title":"Rekt - Wintermute - REKT 2 \u2014 rekt.news","year":"2022"},{"key":"ref32","volume-title":"Rekt - Acala Network - REKT \u2014 rekt.news","year":"2022"},{"key":"ref33","volume-title":"Nomad Bridge\u2019s $200 Million Exploit Postmortem \u2014 sm4rty.medium.com","year":"2022"},{"key":"ref34","volume-title":"Reaper Farm Just Lost US$1.7 Million From Exploit - ChainDebrief \u2014 chaindebrief.com","author":"Sieng","year":"2022"},{"key":"ref35","volume-title":"Nirvana Finance Incident Analysis \u2014 certik.com","year":"2022"},{"key":"ref36","volume-title":"Crema Finance Exploit \u2014 certik.com","year":"2022"},{"key":"ref37","volume-title":"Harmony Incident Analysis \u2014 certik.com","year":"2022"},{"key":"ref38","volume-title":"Inverse Finance Incident Analysis \u2014 certik.com","year":"2022"},{"key":"ref39","volume-title":"Rekt - Gym Network - REKT \u2014 rekt.news","year":"2022"},{"key":"ref40","volume-title":"Rekt - Wintermute - REKT\u2014rekt.news","year":"2022"},{"key":"ref41","first-page":"1349","article-title":"Smartbugs: A framework to analyze solidity smart contracts","volume-title":"Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering","author":"Ferreira"}],"event":{"name":"2024 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","location":"Dublin, Ireland","start":{"date-parts":[[2024,5,27]]},"end":{"date-parts":[[2024,5,31]]}},"container-title":["2024 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10634319\/10634334\/10634335.pdf?arnumber=10634335","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T04:49:04Z","timestamp":1725338944000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10634335\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,27]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/icbc59979.2024.10634335","relation":{},"subject":[],"published":{"date-parts":[[2024,5,27]]}}}