{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T06:43:25Z","timestamp":1765262605392,"version":"3.46.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T00:00:00Z","timestamp":1741046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T00:00:00Z","timestamp":1741046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,3,4]]},"DOI":"10.1109\/saner-c66551.2025.00022","type":"proceedings-article","created":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T18:38:52Z","timestamp":1765219132000},"page":"106-109","source":"Crossref","is-referenced-by-count":0,"title":["Instrumenting Transaction Trace Properties in Smart Contracts: Extending EVM for Real-Time Security"],"prefix":"10.1109","author":[{"given":"Zhiyang","family":"Chen","sequence":"first","affiliation":[{"name":"Zircuit,Toronto,Canada"}]},{"given":"Jan","family":"Gorzny","sequence":"additional","affiliation":[{"name":"Zircuit,Toronto,Canada"}]},{"given":"Martin","family":"Derka","sequence":"additional","affiliation":[{"name":"Zircuit,Waterloo,Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/sp46215.2023.10179435"},{"year":"2024","key":"ref2","article-title":"DeFiLlama"},{"year":"2024","key":"ref3","article-title":"DeFiLlama"},{"volume-title":"Dforce network - rekt","year":"2023","key":"ref4"},{"volume-title":"Forta Network Bots","year":"2024","author":"Forta","key":"ref5"},{"volume-title":"Major Product Release: Extractor Integrates Forta Attack Detector","year":"2024","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3660786"},{"key":"ref8","first-page":"2793","article-title":"An ever-evolving game: Evaluation of real-world attacks and defenses in ethereum ecosystem","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Zhou"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3556962"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534372"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/DAPPS61106.2024.00008"},{"key":"ref12","first-page":"2399","article-title":"Opentracer: A dynamic transaction trace analyzer for smart contract invariant generation and beyond","volume-title":"Proceedings of the 39th IEEE\/ACM International Conference on Automated Software Engineering","author":"Chen"},{"key":"ref13","first-page":"2775","article-title":"{TXSPECTOR}: Uncovering attacks in ethereum from transactions","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Zhang"},{"key":"ref14","first-page":"33","article-title":"The eye of Horus: Spotting and analyzing attacks on Ethereum smart contracts","volume-title":"Financial Cryptography and Data Security - 25th International Conference, FC 2021, Virtual Event, March 1 - 5, 2021, Revised Selected Papers, Part I","volume":"12674","author":"Torres"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3505263"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/EEBDA60612.2024.10485831"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2020.650"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3341173"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3185089.3185138"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17138-4_10"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SC2.2018.00018"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/567446.567462"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-51803-7_36"},{"key":"ref24","first-page":"201","article-title":"SoK: Layer-two blockchain protocols","volume-title":"Financial Cryptography and Data Security - 24th International Conference, FC 2020, Kota Kinabalu, Malaysia, February 10 - 14, 2020 Revised Selected Papers","volume":"12059","author":"Gudgeon"},{"key":"ref25","article-title":"Sequencer level security","volume-title":"CoRR","author":"Derka","year":"2024"}],"event":{"name":"2025 IEEE International Conference on Software Analysis, Evolution and Reengineering - Companion (SANER-C)","start":{"date-parts":[[2025,3,4]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2025,3,4]]}},"container-title":["2025 IEEE International Conference on Software Analysis, Evolution and Reengineering - Companion (SANER-C)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11272146\/11272056\/11272163.pdf?arnumber=11272163","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T06:38:55Z","timestamp":1765262335000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11272163\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,4]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/saner-c66551.2025.00022","relation":{},"subject":[],"published":{"date-parts":[[2025,3,4]]}}}