{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T16:33:07Z","timestamp":1758126787468,"version":"3.28.0"},"reference-count":73,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,31]],"date-time":"2021-10-31T00:00:00Z","timestamp":1635638400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,10,31]],"date-time":"2021-10-31T00:00:00Z","timestamp":1635638400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,31]],"date-time":"2021-10-31T00:00:00Z","timestamp":1635638400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,31]]},"DOI":"10.1109\/isncc52172.2021.9615702","type":"proceedings-article","created":{"date-parts":[[2021,11,25]],"date-time":"2021-11-25T15:32:15Z","timestamp":1637854335000},"page":"1-8","source":"Crossref","is-referenced-by-count":10,"title":["Cryptocurrency Crime: Behaviors of Malicious Smart Contracts in Blockchain"],"prefix":"10.1109","author":[{"given":"Malaw","family":"Ndiaye","sequence":"first","affiliation":[]},{"given":"Pr. Karim","family":"Konate","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Introducing Darkleaks","year":"2019","author":"zozan","key":"ref73"},{"key":"ref72","first-page":"2793","article-title":"An ever-evolving game: Evaluation of real-world attacks and defenses in ethereum ecosystem","author":"zhou","year":"2020","journal-title":"29th USENIX Security Symposium USENIX Security 20"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.12.019"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.05.061"},{"key":"ref39","article-title":"Detecting standard violation errors in smart contracts","author":"li","year":"2018","journal-title":"arXiv preprint arXiv 1812 08942"},{"key":"ref38","article-title":"Securing smart contract on the fly","author":"li","year":"2019","journal-title":"arXiv preprint arXiv 1911 12945"},{"key":"ref33","article-title":"Ransomware as a service using smart contracts andipfs","author":"karapapas","year":"2020","journal-title":"arXiv preprint arXiv 2003 07516"},{"key":"ref32","first-page":"163","article-title":"Applications and extensions of bitcoin","author":"karame","year":"2016","journal-title":"Bitcoin and Blockchain Security[J]"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23082"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.5120\/3399-4730"},{"key":"ref37","first-page":"368","article-title":"Financial risks of the blockchain industry: A survey of cyberattacks","author":"lazarenko","year":"2018","journal-title":"in Proceedings of the Future Technologies Conference"},{"journal-title":"Verifiable Computation in Practice Tools and Protocols","year":"2018","author":"kosba","key":"ref36"},{"journal-title":"CRYPTOMONNAIES ET CRIMINALIT&#x00C9; VONT-ELLES DE PAIR ?","year":"2019","author":"kevin","key":"ref35"},{"journal-title":"Bitfinex Offers $400 Million in Rewards to Get Back 120 000 Stolen Bitcoins","year":"2020","author":"kevin","key":"ref34"},{"journal-title":"Cryptoasset industry problems Smart contract security challenge","year":"2019","author":"tozex","key":"ref60"},{"journal-title":"Governmental&#x2019;s 1100 eth jackpot payout is stuck because it uses too much gas","year":"2016","author":"ethererik","key":"ref62"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243780"},{"journal-title":"Comprendre les blockchains fonctionnement et enjeux de ces nouvelles technologies","year":"2018","author":"val\u00e9ria","key":"ref63"},{"key":"ref28","first-page":"40","article-title":"The ring of gyges: Using smart contracts for crime","author":"juels","year":"2015","journal-title":"Arieso"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.10.057"},{"journal-title":"Ethereum Smart Contracts up 75% to Almost 2M in March","year":"2020","author":"joshua","key":"ref27"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.10.057"},{"key":"ref66","article-title":"Ethscope: A transaction-centric security analytics framework to detect malicious smart contracts on ethereum","author":"wu","year":"2020","journal-title":"arXiv preprint arXiv 2005 06138"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978362"},{"key":"ref67","article-title":"Harvey: A greybox fuzzer for smart contracts","author":"w\u00fcstholz","year":"2019","journal-title":"arXiv preprint arXiv 1905 00571"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1186\/s40854-016-0046-5"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2969437"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54455-6_8"},{"key":"ref1","article-title":"Methods of protecting decentralized autonomous organizations from crashes and attacks","volume":"30","author":"andryukhin","year":"2018","journal-title":"Proceedings of the Institute for System Programming RAS"},{"key":"ref20","first-page":"1","article-title":"Online detection of effectively callback free objects with applications to smart contracts","author":"grossman","year":"2017","journal-title":"Proceedings of the ACM on Programming Languages 2(POPL)"},{"journal-title":"La s&#x00E9;curit&#x00E9; des smart-contracts sur Ethereum","year":"2020","author":"guillaume","key":"ref22"},{"journal-title":"Intro to &#x00C2;&#x00BE;ternity&#x2019;s Smart Contracts","year":"2018","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363230"},{"journal-title":"A hacker stole $31M of Ether - how it happened and what it means for Ethereum 2017","year":"2020","author":"haseeb","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238177"},{"journal-title":"How many Ethereum smart contracts are there","year":"2020","author":"james","key":"ref25"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-36945-3_2"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00024"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274737"},{"journal-title":"Cyber crime costs projected to reach $2 trillion by 2019","year":"2016","author":"steve","key":"ref58"},{"journal-title":"Crypto-criminalit&#x00E9; d&#x00E9;j&#x00E0; 1 4 milliard de dollars vol&#x00E9;s en 2020","year":"2020","author":"stanislas","key":"ref57"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00032"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2970495"},{"journal-title":"Ethereum Smart Contracts Vulnerable to Hacks $4 Million in Ether at Risk","year":"2019","author":"samantha","key":"ref54"},{"key":"ref53","article-title":"Sereum: Protecting existing smart contracts against re-entrancy attacks","author":"rodler","year":"2018","journal-title":"arXiv preprint arXiv 1812 08942"},{"journal-title":"Analysis of the dao exploit","year":"2018","author":"phil","key":"ref52"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2019.8661914"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-16181-1_51"},{"key":"ref40","first-page":"653","article-title":"A survey of blockchain security issues and challenges","volume":"19","author":"lin","year":"2017","journal-title":"IJ Network Security"},{"journal-title":"Ethereum Attacks","year":"2018","author":"ethan","key":"ref12"},{"journal-title":"Ethereum by the Numbers","year":"2020","author":"everett","key":"ref13"},{"key":"ref14","article-title":"Precise attack synthesis for smart contracts","author":"feng","year":"2019","journal-title":"arXiv preprint arXiv 1902 06673"},{"key":"ref15","article-title":"&#x00C6;gis: Shielding vulnerable smart contracts against attacks","author":"torres","year":"2020","journal-title":"In Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS&#x2019;20)"},{"journal-title":"Amid pandemic crypto crime surges in first 5 months CipherTrace","year":"2020","author":"gertrude","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2017.05.007"},{"journal-title":"The DAO Hack Explained Unfortunate Take-off Smart Contracts","year":"2018","author":"gazi g\u00e3\u00bc\u00e3\u00a7l\u00e3\u00bct\u00e3\u00bcrk","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.14488\/BJOPM.2018.v15.n3.a4"},{"journal-title":"Regulators Step in as Bitcoin Breaks Below $10 000 Weekly Crypto Market Update","year":"2019","author":"berger","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.08.014"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3391195"},{"key":"ref5","article-title":"Vandal: A scalable security analysis framework for smart contracts","author":"brent","year":"2018","journal-title":"arXiv preprint arXiv 1809 03981"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186046"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24449"},{"journal-title":"WHEN Smart Contract Allows Theft Of Tokens","year":"2019","author":"nirvan","key":"ref49"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/IWBOSE.2018.8327567"},{"journal-title":"A Summary of the Attack on Lendf Me","year":"2020","author":"mindao","key":"ref46"},{"journal-title":"How EOS Casinos Lost $562 000 to Smart Contract Vulnerabilities","year":"2018","author":"mihail","key":"ref45"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274743"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380334"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"journal-title":"An in-depth look at the parity multisig bug","year":"2017","author":"lorenz","key":"ref41"},{"journal-title":"Management apis","year":"2020","author":"van der","key":"ref44"},{"key":"ref43","first-page":"554","article-title":"Evm?: from offline detection to online reinforcement for ethereum virtual machine","author":"ma","year":"2019","journal-title":"In 2019 IEEE 26th International Conference on Software Analysis Evolution and Reengineering (SANER)"}],"event":{"name":"2021 International Symposium on Networks, Computers and Communications (ISNCC)","start":{"date-parts":[[2021,10,31]]},"location":"Dubai, United Arab Emirates","end":{"date-parts":[[2021,11,2]]}},"container-title":["2021 International Symposium on Networks, Computers and Communications (ISNCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9615623\/9615626\/09615702.pdf?arnumber=9615702","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T12:52:45Z","timestamp":1652187165000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9615702\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,31]]},"references-count":73,"URL":"https:\/\/doi.org\/10.1109\/isncc52172.2021.9615702","relation":{},"subject":[],"published":{"date-parts":[[2021,10,31]]}}}