{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T17:30:38Z","timestamp":1774978238434,"version":"3.50.1"},"reference-count":108,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372218"],"award-info":[{"award-number":["62372218"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U24A6009"],"award-info":[{"award-number":["U24A6009"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172301"],"award-info":[{"award-number":["62172301"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Hong Kong RGC Projects","award":["PolyU15224121"],"award-info":[{"award-number":["PolyU15224121"]}]},{"name":"Hong Kong RGC Projects","award":["PolyU15231223"],"award-info":[{"award-number":["PolyU15231223"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1109\/tse.2025.3543280","type":"journal-article","created":{"date-parts":[[2025,2,18]],"date-time":"2025-02-18T18:20:44Z","timestamp":1739902844000},"page":"1188-1204","source":"Crossref","is-referenced-by-count":4,"title":["Understanding Security Issues in the DAO Governance Process"],"prefix":"10.1109","volume":"51","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9845-6062","authenticated-orcid":false,"given":"Junjie","family":"Ma","sequence":"first","affiliation":[{"name":"Research Institute of Trustworthy Autonomous Systems, Southern University of Science and Technology, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2196-6894","authenticated-orcid":false,"given":"Muhui","family":"Jiang","sequence":"additional","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2065-9211","authenticated-orcid":false,"given":"Jinan","family":"Jiang","sequence":"additional","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9082-3208","authenticated-orcid":false,"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-5132-3284","authenticated-orcid":false,"given":"Yufeng","family":"Hu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7610-4736","authenticated-orcid":false,"given":"Yajin","family":"Zhou","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9780-5443","authenticated-orcid":false,"given":"Qi","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Southern University of Science and Technology, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3365-2526","authenticated-orcid":false,"given":"Fengwei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Southern University of Science and Technology, Shenzhen, China"}]}],"member":"263","reference":[{"issue":"37","key":"ref1","first-page":"2","article-title":"A next-generation smart contract and decentralized application platform","volume":"3","author":"Buterin","year":"2014","journal-title":"White Paper"},{"key":"ref2","article-title":"Uniswap","year":"2023"},{"key":"ref3","article-title":"CoinMarketCap","year":"2023"},{"key":"ref4","article-title":"XDAO","year":"2023"},{"key":"ref5","article-title":"Aragon","year":"2023"},{"key":"ref6","article-title":"Daohaus","year":"2023"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1186\/s13174-021-00139-6"},{"key":"ref8","article-title":"Deepdao","year":"2023"},{"key":"ref9","article-title":"Yam attack analysis","year":"2023"},{"key":"ref10","article-title":"Potential curve dao attack","year":"2023"},{"key":"ref11","article-title":"Audius dao attack","year":"2023"},{"key":"ref12","article-title":"Fortress protocol attack","year":"2023"},{"key":"ref13","article-title":"Attacker hijacks Tornado Cash governance via malicious proposal","year":"2024"},{"key":"ref14","article-title":"True seigniorage dollar attack","year":"2023"},{"key":"ref15","article-title":"Pride punks dao attack","year":"2023"},{"key":"ref16","article-title":"Build Finance suffers from governance attack","year":"2023"},{"key":"ref17","article-title":"Yuan.finance attack report","year":"2023"},{"key":"ref18","article-title":"Beanstalk exploit\u2014A simplified post-mortem analysis","year":"2023"},{"key":"ref19","article-title":"VPANDA DAO Rug Pull","year":"2023"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3451755"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3412569.3412579"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3605768.3623539"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4441178"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-48806-1_11"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/icbc59979.2024.10634404"},{"key":"ref26","article-title":"An empirical study on snapshot DAOs","author":"Wang","year":"2022"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.bcra.2024.100208"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2021.102556"},{"key":"ref29","first-page":"24824","article-title":"Chain-of-thought prompting elicits reasoning in large language models","volume":"35","author":"Wei","year":"2022","journal-title":"Proc. Adv. Neural Inf. Process. Syst."},{"key":"ref30","article-title":"DAO Model Law","year":"2023"},{"key":"ref31","article-title":"Compound documents","year":"2023"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s11245-018-9626-5"},{"key":"ref33","article-title":"Governance of blockchain systems: Governance of and by Distributed Infrastructure","author":"Filippi","year":"2018"},{"key":"ref34","article-title":"The Model Law","year":"2023"},{"key":"ref35","article-title":"Synthetify governance attack","year":"2024"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3500868.3559707"},{"key":"ref37","article-title":"Daostack","year":"2023"},{"key":"ref38","article-title":"Tally","year":"2023"},{"key":"ref39","article-title":"Ethereum","year":"2024"},{"key":"ref40","article-title":"BSC","year":"2024"},{"key":"ref41","article-title":"Polygon","year":"2024"},{"key":"ref42","article-title":"Fantom","year":"2024"},{"key":"ref43","article-title":"Gnosis","year":"2024"},{"key":"ref44","article-title":"Avalanche","year":"2024"},{"key":"ref45","article-title":"Arbitrum","year":"2024"},{"key":"ref46","article-title":"Cronos","year":"2024"},{"key":"ref47","article-title":"Optimism","year":"2024"},{"key":"ref48","article-title":"Curve","year":"2023"},{"key":"ref49","article-title":"MakerDAO","year":"2023"},{"key":"ref50","article-title":"Public name tags","year":"2023"},{"key":"ref51","article-title":"Selenium","year":"2023"},{"key":"ref52","article-title":"Event logs","year":"2023"},{"key":"ref53","article-title":"How to set up on-chain governance","year":"2023"},{"key":"ref54","article-title":"EVM CFG builder","year":"2023"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3570639"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179435"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-48806-1_30"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3560264"},{"key":"ref59","article-title":"Ethereum Constantinople\/St. Petersburg Upgrade Announcement","year":"2023"},{"key":"ref60","article-title":"Eip-1014: Skinny create2","year":"2023"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-32415-4_32"},{"key":"ref62","article-title":"Proxy contracts","year":"2023"},{"key":"ref63","article-title":"Tenderly","year":"2023"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4503234"},{"key":"ref65","article-title":"ChatGPT","year":"2023"},{"key":"ref66","article-title":"Evaluation of ChatGPT as a question answering system for answering complex questions","author":"Tan","year":"2023"},{"key":"ref67","article-title":"ChatGPT is a knowledgeable but inexperienced solver: An investigation of commonsense problem in large language models","author":"Bian","year":"2023"},{"key":"ref68","article-title":"Can ChatGPT understand too? A comparative study on ChatGPT and fine-tuned BERT","author":"Zhong","year":"2023"},{"key":"ref69","article-title":"ChatGPT versus traditional question answering for knowledge graphs: Current status and future directions towards knowledge graph chatbots","author":"Omar","year":"2023"},{"key":"ref70","article-title":"Why does chatgpt fall short in answering questions faithfully?","author":"Zheng","year":"2023"},{"key":"ref71","article-title":"Claude","year":"2023"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559342"},{"key":"ref73","volume-title":"Natural Language Processing With Python: Analyzing Text With the Natural Language Toolkit","author":"Bird","year":"2009"},{"key":"ref74","article-title":"BERT: Pre-training of deep bidirectional transformers for language understanding","author":"Devlin","year":"2018"},{"key":"ref75","article-title":"Spacy","year":"2023"},{"key":"ref76","article-title":"Synonym","year":"2023"},{"key":"ref77","article-title":"Contract ABI Specification","year":"2023"},{"key":"ref78","article-title":"Ethereum Signature Database","year":"2023"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1410"},{"key":"ref80","article-title":"Official sentence-BERT examples","year":"2023"},{"key":"ref81","article-title":"ERC-20 Token Standard","year":"2023"},{"key":"ref82","article-title":"SlowMist","year":"2023"},{"key":"ref83","article-title":"CryptoSec","year":"2023"},{"key":"ref84","article-title":"rekt","year":"2023"},{"key":"ref85","article-title":"Twitter","year":"2023"},{"key":"ref86","article-title":"Venus protocol prevented hostile takeover attempt","year":"2023"},{"key":"ref87","article-title":"Defunct swerve finance still subject of 1.3 million live governance hack","year":"2023"},{"key":"ref88","article-title":"Atlantis loans hack analysis","year":"2023"},{"key":"ref89","article-title":"Indexed finance dao attack","year":"2024"},{"key":"ref90","article-title":"Bigcap dao attack","year":"2024"},{"key":"ref91","article-title":"Total value locked all chains","year":"2023"},{"key":"ref92","article-title":"The ins and outs of decentralized autonomous organizations (DAOs)","author":"Rikken","year":"2018"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1002\/joom.1179"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1016\/j.bcra.2023.100127"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS.2021.3072661"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3188374"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59638-5_3"},{"issue":"54","key":"ref98","first-page":"4","article-title":"Smashing ethereum smart contracts for fun and real profit","volume":"9","author":"Mueller","year":"2018","journal-title":"HITB SECCONF Amsterdam"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00133"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00120"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2886875"},{"key":"ref103","first-page":"585","article-title":"$\\{${PolicyLint$\\}$}: Investigating internal privacy policy contradictions on Google play","volume-title":"Proc. 28th USENIX Secur. Symp. (USENIX Secur.)","author":"Andow","year":"2019"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/RE48521.2020.00025"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509523"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.11"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2872971"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3556963"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/32\/10969500\/10891888.pdf?arnumber=10891888","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,18]],"date-time":"2025-04-18T17:37:53Z","timestamp":1744997873000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10891888\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4]]},"references-count":108,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tse.2025.3543280","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4]]}}}