{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:23:28Z","timestamp":1774542208072,"version":"3.50.1"},"reference-count":223,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1109\/sp46215.2023.10179435","type":"proceedings-article","created":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T17:18:15Z","timestamp":1689959895000},"page":"2444-2461","source":"Crossref","is-referenced-by-count":144,"title":["SoK: Decentralized Finance (DeFi) Attacks"],"prefix":"10.1109","author":[{"given":"Liyi","family":"Zhou","sequence":"first","affiliation":[{"name":"Imperial College London"}]},{"given":"Xihan","family":"Xiong","sequence":"additional","affiliation":[{"name":"Imperial College London"}]},{"given":"Jens","family":"Ernstberger","sequence":"additional","affiliation":[{"name":"Technical University of Munich"}]},{"given":"Stefanos","family":"Chaliasos","sequence":"additional","affiliation":[{"name":"Imperial College London"}]},{"given":"Zhipeng","family":"Wang","sequence":"additional","affiliation":[{"name":"Imperial College London"}]},{"given":"Ye","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Macau"}]},{"given":"Kaihua","family":"Qin","sequence":"additional","affiliation":[{"name":"Imperial College London"}]},{"given":"Roger","family":"Wattenhofer","sequence":"additional","affiliation":[{"name":"ETH Zurich"}]},{"given":"Dawn","family":"Song","sequence":"additional","affiliation":[{"name":"University of California,Berkeley"}]},{"given":"Arthur","family":"Gervais","sequence":"additional","affiliation":[{"name":"University College London"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"DeFillama Dashboard","year":"2022"},{"key":"ref2","article-title":"Uniswap v3 core","author":"Adams","year":"2021"},{"key":"ref3","first-page":"2021","article-title":"Stableswap-efficient mechanism for stablecoin liquidity","volume":"24","author":"Egorov","year":"2019","journal-title":"Retrieved Feb"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-32415-4_16"},{"key":"ref5","article-title":"Aave","year":"2020"},{"key":"ref6","article-title":"Compound finance","year":"2019"},{"key":"ref7","article-title":"Synthetix","year":"2020"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-64322-8_1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00113"},{"key":"ref10","article-title":"Security analysis methods on ethereum smart contract vulnerabilities: a survey","author":"Praitheeshan","year":"2019"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3033665"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2020.2975999"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3391195"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3558535.3559780"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54455-6_8"},{"key":"ref16","article-title":"A survey of security vulnerabilities in ethereum smart contracts","author":"Samreen","year":"2021"},{"key":"ref17","article-title":"Smart contract and defi security: Insights from tool evaluations and practitioner surveys","author":"Chaliasos","year":"2023"},{"key":"ref18","article-title":"The blockchain imitation game","volume-title":"32th {USENIX} Security Symposium ({USENIX} Security 23)","author":"Qin"},{"key":"ref19","article-title":"A peer-to-peer electronic cash system","volume-title":"Bitcoin","volume":"4","author":"Nakamoto","year":"2008"},{"key":"ref20","article-title":"Ethereum: A secure decentralised generalised transaction ledger","volume":"151","author":"Wood","year":"2014","journal-title":"Ethereum project yellow paper"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3570639"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-78184-2_6"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-47754-6_20"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-48806-1_22"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4341346"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3419614.3423261"},{"key":"ref27","article-title":"Chainlink: A decentralized oracle network","author":"Ellis","year":"2017"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC54727.2022.9805499"},{"key":"ref29","article-title":"On how zero-knowledge proof blockchain mixers improve, and worsen user privacy","author":"Wang","year":"2022"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3222815"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-95108-5_9"},{"key":"ref32","article-title":"Auto. gov: Learning-based on-chain governance for decentralized finance (defi)","author":"Xu","year":"2023"},{"key":"ref33","article-title":"Zcash"},{"key":"ref34","article-title":"An Empirical Analysis of Monero Cross-Chain Traceability","volume-title":"CoRR","author":"Hinteregger","year":"2018"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_25"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3479722.3480800"},{"key":"ref37","article-title":"Cefi vs. defi\u2013comparing centralized to decentralized finance","author":"Qin","year":"2021"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1122"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278542"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00040"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833734"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3487553.3524201"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517585"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3488932.3517390"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3576899"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978389"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243853"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.000-5"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3319889"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3558535.3559784"},{"key":"ref51","article-title":"NOCUST\u2013A Securely Scalable Commit-Chain","author":"Khalil","year":"2018"},{"key":"ref52","first-page":"1353","article-title":"Arbitrum: Scalable, private smart contracts","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Kalodner"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51280-4_12"},{"key":"ref54","article-title":"Eip-20: Erc-20 token standard","author":"Vogelsteller","year":"2015"},{"key":"ref55","article-title":"Ampleforth: A new synthetic commodity","author":"Kuo","year":"2019"},{"key":"ref56","article-title":"Eip-777: Erc777 token standard","author":"Dafflon","year":"2017"},{"key":"ref57","article-title":"Home - alpha finance lab"},{"key":"ref58","article-title":"Harvest finance"},{"key":"ref59","article-title":"Behavior of Liquidity Providers in Decentralized Exchanges","volume-title":"2021 Crypto Valley Conference on Blockchain Technology (CVCBT)","author":"Heimbach"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/3558535.3559772"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813655"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_28"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.20955\/r.103.153-74"},{"key":"ref64","article-title":"Coingecko yield farming survey 2020"},{"key":"ref65","first-page":"1371","article-title":"Erays: reverse engineering ethereum\u2019s opaque smart contracts","volume-title":"27th {USENIX} Security Symposium ({USENIX} Security 18)","author":"Zhou"},{"key":"ref66","article-title":"Evmpatch: timely and automated patching of ethereum smart contracts","volume-title":"30th {USENIX} Security Symposium ({USENIX} Security 21)","author":"Rodler"},{"key":"ref67","first-page":"2757","article-title":"{ETHBMC}: A bounded model checker for smart contracts","volume-title":"29th {USENIX} Security Symposium ({USENIX} Security 20)","author":"Frank"},{"key":"ref68","first-page":"1335","article-title":"Enter the hydra: Towards principled bug bounties and exploit-resistant smart contracts","volume-title":"27th {USENIX} Security Symposium ({USENIX} Security 18)","author":"Breidenbach"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.2307\/1882925"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-5957.1992.tb00643.x"},{"key":"ref71","article-title":"Smartest: Effectively hunting vulnerable transaction sequences in smart contracts through language model-guided symbolic execution","volume-title":"30th USENIX Security Symposium ({USENIX} Security 21)","author":"So"},{"key":"ref72","first-page":"2775","article-title":"{TXSPECTOR}: Uncovering attacks in ethereum from transactions","volume-title":"29th {USENIX} Security Symposium ({USENIX} Security 20)","author":"Zhang"},{"key":"ref73","first-page":"2793","article-title":"An ever-evolving game: Evaluation of real-world attacks and defenses in ethereum ecosystem","volume-title":"29th{USENIX} Security Symposium ({USENIX} Security 20)","author":"Zhou"},{"key":"ref74","first-page":"1317","article-title":"teether: Gnawing at ethereum to automatically exploit smart contracts","volume-title":"27th {USENIX} Security Symposium ({USENIX} Security 18)","author":"Krupp"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833721"},{"key":"ref76","article-title":"Sguard: Smart contracts made vulnerability-free","author":"Nguyen","year":"2021"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00085"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00024"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00032"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417250"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363230"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243780"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24188"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24449"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23413"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23082"},{"key":"ref87","first-page":"778","article-title":"sfuzz: An efficient adaptive fuzzer for solidity smart contracts","volume-title":"Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering","author":"Nguyen"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00120"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678888"},{"key":"ref90","first-page":"1141","article-title":"Summary-based symbolic evaluation for smart contracts","volume-title":"2020 35th IEEE\/ACM International Conference on Automated Software Engineering (ASE).","author":"Feng"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238177"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3240728"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"ref94","article-title":"Vandal: A scalable security analysis framework for smart contracts","author":"Brent","year":"2018"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01090-4_30"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274743"},{"key":"ref97","article-title":"Defiranger: Detecting price manipulation attacks on defi applications","author":"Wu","year":"2021"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2017.7884650"},{"key":"ref99","article-title":"Evil under the sun: Understanding and discovering attacks on ethereum decentralized applications","volume-title":"30th {USENIX} Security Symposium ({USENIX} Security 21)","author":"Su"},{"key":"ref100","article-title":"Smart contract vulnerabilities: Vulnerable does not imply exploited","volume-title":"30th {USENIX} Security Symposium ({USENIX} Security 21)","author":"Perez"},{"key":"ref101","article-title":"Frontrunner jones and the raiders of the dark forest: An empirical study of frontrunning on the ethereum blockchain","author":"Torres","year":"2021"},{"key":"ref102","first-page":"819","article-title":"Strongchain: Transparent and collaborative proof-of-work consensus","volume-title":"28th {USENIX} Security Symposium ({USENIX} Security 19)","author":"Szalachowski"},{"key":"ref103","first-page":"1591","article-title":"The art of the scam: Demystifying honeypots in ethereum smart contracts","volume-title":"28th {USENIX} Security Symposium ({USENIX} Security 19)","author":"Torres"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00027"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00084"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00066"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00086"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484561"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484752"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484807"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485369"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484568"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417247"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3345664"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354236"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243737"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243814"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.23108"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.23095"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24267"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00127"},{"key":"ref122","first-page":"530","article-title":"Empirical review of automated analysis tools on 47,587 ethereum smart contracts","volume-title":"Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering","author":"Durieux"},{"key":"ref123","first-page":"542","article-title":"Gap between theory and practice: An empirical study of security patches in solidity","volume-title":"Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering","author":"Hwang"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678597"},{"key":"ref125","first-page":"1029","article-title":"Cross-contract static analysis for detecting practical reentrancy vulnerabilities in smart contracts","volume-title":"2020 35th IEEE\/ACM International Conference on Automated Software Engineering (ASE).","author":"Xue"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1145\/3158136"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385982"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385990"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3386022"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978341"},{"key":"ref131","article-title":"Ethereum eclipse attacks","author":"W\u00fcst","year":"2016","journal-title":"ETH Zurich, Tech. Rep."},{"key":"ref132","first-page":"236","article-title":"Low-resource eclipse attacks on ethereum\u2019s peer-to-peer network","volume":"2018","author":"Marcus","year":"2018","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref133","article-title":"Tokenhook: Secure erc-20 smart contract","author":"Rahimian","year":"2021"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/CVCBT50464.2020.00005"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29959-0_37"},{"key":"ref136","article-title":"Chainlink 2.0: Next steps in the evolution of decentralized oracle networks","author":"Breidenbach","year":"2021"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616674"},{"key":"ref138","article-title":"Wakaswap audit","year":"2021"},{"key":"ref139","article-title":"Sato audit","year":"2021"},{"key":"ref140","article-title":"Pinecone audit","year":"2021"},{"key":"ref141","volume-title":"Ctoken audit","year":"2021"},{"key":"ref142","volume-title":"Beatsqure audit","year":"2021"},{"key":"ref143","article-title":"Rabbit.fi audit","year":"2021"},{"key":"ref144","article-title":"Hegic audit","year":"2021"},{"key":"ref145","article-title":"Deri v2 audit","year":"2021"},{"key":"ref146","article-title":"Coin98 audit","year":"2021"},{"key":"ref147","article-title":"Angrymining audit","year":"2021"},{"key":"ref149","article-title":"Supremex audit","year":"2021"},{"key":"ref150","article-title":"Solyard audit","year":"2021"},{"key":"ref151","article-title":"Cook finance audit","year":"2021"},{"key":"ref152","article-title":"Defi saver audit","year":"2021"},{"key":"ref153","article-title":"Fei tribechief audit","year":"2021"},{"key":"ref154","article-title":"Gitcoin audit","year":"2021"},{"key":"ref155","article-title":"Wheat audit","year":"2021"},{"key":"ref156","article-title":"Umbra audit","year":"2021"},{"key":"ref157","article-title":"Zoo audit","year":"2021"},{"key":"ref158","article-title":"Trister\u2019s lend audit","year":"2021"},{"key":"ref159","article-title":"Rezerve audit","year":"2021"},{"key":"ref160","article-title":"Lfw audit","year":"2021"},{"key":"ref161","article-title":"gamedao audit","year":"2021"},{"key":"ref162","article-title":"Complifi audit","year":"2021"},{"key":"ref163","article-title":"Frax finance audit","year":"2021"},{"key":"ref164","article-title":"Yearnv2 audit","year":"2021"},{"key":"ref165","article-title":"Alpha homora audit","year":"2021"},{"key":"ref166","article-title":"Celo audit","year":"2021"},{"key":"ref167","article-title":"Fei audit","year":"2021"},{"key":"ref168","article-title":"Defi plus"},{"key":"ref169","article-title":"Circuit breaker definition"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1002\/j.2333-8504.1970.tb00783.x"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1177\/002224378101800313"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.2307\/3151714"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1002\/0471667196.ess1481"},{"key":"ref174","volume-title":"Structural equation modeling: Concepts, issues, and applications","author":"Hoyle","year":"1995"},{"key":"ref175","article-title":"The structural equation modeling approach: Basic concepts and fundamental issues","author":"Hoyle","year":"1995"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.00407"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.4324\/9781410610904"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1002\/9781118133880.hop202023"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.4324\/9780203807644"},{"key":"ref180","volume-title":"Principles and practice of structural equation modeling","author":"Kline","year":"2015"},{"key":"ref181","volume-title":"Confirmatory factor analysis","author":"Harrington"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1002\/9781118356258.ch2"},{"key":"ref183","volume-title":"Confirmatory factor analysis for applied research","author":"Brown"},{"key":"ref184","article-title":"Structural equation modeling","author":"Wolf","year":"1996","journal-title":"The Oxford Handbook of Research Strategies for Clinical Psychology"},{"key":"ref185","article-title":"semopy 2: A structural equation modeling package with random effects in python","author":"Meshcheryakov","year":"2021"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/sp40001.2021.00053"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1201\/9781420010435"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1016\/0370-2693(80)90590-0"},{"key":"ref189","article-title":"Corrections to test statistics and standard errors in covariance structure analysis","author":"Satorra","year":"1994"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1037\/\/0033-2909.107.2.238"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.88.3.588"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.2307\/270754"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1080\/07481756.2005.11909764"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2006.09.018"},{"key":"ref195","volume-title":"DeFiYield","year":"2022"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278575"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51280-4_35"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.2971482"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1109\/CISAI54367.2021.00113"},{"key":"ref200","article-title":"On the linkability of zcash transactions","author":"Quesnelle","year":"2017"},{"key":"ref201","first-page":"463","article-title":"An empirical analysis of anonymity in zcash","volume-title":"27th {USENIX} Security Symposium ({USENIX} Security 18)","author":"Kappos"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274750"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-64322-8_6"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004377"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1145\/1314257.1314273"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1145\/1854099.1854130"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1080\/13669877.2017.1351467"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2009.02.007"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1145\/3446371"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1995.514697"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1998.738528"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47764-0_3"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1999.792593"},{"key":"ref214","first-page":"87","article-title":"Deep learning code fragments for code clone detection","volume-title":"2016 31st IEEE\/ACM International Conference on Automated Software Engineering (ASE).","author":"White"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1145\/3313290"},{"issue":"115","key":"ref216","first-page":"64","article-title":"A survey on software clone detection research","volume":"541","author":"Roy","year":"2007","journal-title":"Queen\u2019s School of computing TR"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2019.00024"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1109\/SANER50967.2021.00050"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-020-09852-5"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11040597"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_4"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504747"},{"key":"ref223","first-page":"837","article-title":"Tracing transactions across cryptocurrency ledgers","volume-title":"28th {USENIX} Security Symposium ({USENIX} Security 19)","author":"Yousaf"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51280-4_33"}],"event":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","location":"San Francisco, CA, USA","start":{"date-parts":[[2023,5,21]]},"end":{"date-parts":[[2023,5,25]]}},"container-title":["2023 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10179215\/10179280\/10179435.pdf?arnumber=10179435","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,20]],"date-time":"2024-07-20T05:16:28Z","timestamp":1721452588000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10179435\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5]]},"references-count":223,"URL":"https:\/\/doi.org\/10.1109\/sp46215.2023.10179435","relation":{},"subject":[],"published":{"date-parts":[[2023,5]]}}}