{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:04:10Z","timestamp":1740099850521,"version":"3.37.3"},"reference-count":45,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T00:00:00Z","timestamp":1606176000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T00:00:00Z","timestamp":1606176000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T00:00:00Z","timestamp":1606176000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","award":["822404"],"award-info":[{"award-number":["822404"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,24]]},"DOI":"10.1109\/nca51143.2020.9306738","type":"proceedings-article","created":{"date-parts":[[2021,1,5]],"date-time":"2021-01-05T23:22:37Z","timestamp":1609888957000},"page":"1-9","source":"Crossref","is-referenced-by-count":0,"title":["Recoverable Token: Recovering from Intrusions against Digital Assets in Ethereum"],"prefix":"10.1109","author":[{"given":"Filipe F.","family":"Martins","sequence":"first","affiliation":[]},{"given":"David R.","family":"Matos","sequence":"additional","affiliation":[]},{"given":"Miguel L.","family":"Pardal","sequence":"additional","affiliation":[]},{"given":"Miguel","family":"Correia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3135974.3135978"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2010.5544951"},{"key":"ref33","article-title":"Empirical review of automated analysis tools on 47,587 Ethereum smart contracts","author":"durieux","year":"2019","journal-title":"42nd International Conference on Software Engineering (ICSE 2020)"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32101-7_27"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"journal-title":"EIP 170 Contract Size Limit","year":"0","author":"buterin","key":"ref30"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.52"},{"key":"ref36","first-page":"7","author":"liu","year":"2000","journal-title":"Rewriting Histories Recovering from Malicious Transactions"},{"journal-title":"A Formal Approach to Recovery by Compensating Transactions","year":"1990","author":"korth","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/WETSEB.2019.00010"},{"key":"ref10","first-page":"70","article-title":"Rewind, repair, replay:three r's to dependability","author":"brown","year":"2002","journal-title":"Proceedings of the 10th ACM SIGOPS European Workshop"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3274808.3274817"},{"key":"ref11","first-page":"1","article-title":"Undo for operators: Building an undoable e-mail store","author":"brown","year":"2003","journal-title":"USENIX Annual Technical Conference"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2015.72"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2016.7778616"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095826"},{"key":"ref15","first-page":"89","article-title":"Intrusion recovery using selective re-execution","author":"kim","year":"2010","journal-title":"Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.37"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00039"},{"journal-title":"Reversecoin Worlds First Cryptocur-rency With Reversible Transactions","year":"0","author":"challa","key":"ref19"},{"journal-title":"Kleroterion a decentralized court for the internet","year":"2017","author":"lesaege","key":"ref28"},{"key":"ref4","article-title":"Factom: Business processes secured by immutable audit trails on the blockchain","author":"snow","year":"2014","journal-title":"Whitepaper"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.2307\/1120097"},{"key":"ref3","article-title":"Patientory: A healthcare peer-to-peer EMR storage network v1","author":"mcfarlane","year":"2017","journal-title":"Entrust Inc"},{"journal-title":"EIP 20 ERC-20 Token Standard","year":"0","author":"vogelsteller","key":"ref6"},{"key":"ref29","first-page":"2018","article-title":"Aragon network: A decentralized infrastructure for value exchange","volume":"24","author":"cuende","year":"2017","journal-title":"Whitepaper"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/BRAINS49436.2020.9223305"},{"journal-title":"Mastering Ethereum Building Smart Contracts and Dapps","year":"2018","author":"antonopoulos","key":"ref8"},{"journal-title":"EIP 721 ERC-721 Non-Fungible Token Standard","year":"0","author":"entriken","key":"ref7"},{"key":"ref2","article-title":"Ethereum: A secure decentralised generalised transaction ledger","author":"wood","year":"2014","journal-title":"Ethereum Project Yellow Paper"},{"journal-title":"Deterministic wallets their advantages and their understated flaws","year":"0","author":"buterin","key":"ref9"},{"key":"ref1","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"nakamoto","year":"2008","journal-title":"Online"},{"journal-title":"Blockd co In-Depth Features and Future","year":"0","author":"forster","key":"ref20"},{"journal-title":"Mattereum protocol Turning code into law","year":"2018","key":"ref45"},{"journal-title":"Ethereum Improvement Proposal 1080 Recoverable Token","year":"0","author":"leatherwood","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1201\/9780429674457-3"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043567"},{"journal-title":"EIP 1497 ERC-1497 Evidence Standard","year":"0","author":"vitello","key":"ref24"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2002.1033782"},{"journal-title":"EIP 792 ERC-792 Arbitration Standard","year":"0","author":"lesaege","key":"ref23"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.18662\/eljpa\/11"},{"journal-title":"How Arbitration Works","year":"1973","author":"elkouri","key":"ref26"},{"key":"ref43","article-title":"Decentralized autonomous organization to automate governance","author":"jentzsch","year":"2016","journal-title":"Whitepaper"},{"journal-title":"IPFS - Content Addressed Versioned P2P File System","year":"2014","author":"benet","key":"ref25"}],"event":{"name":"2020 IEEE 19th International Symposium on Network Computing and Applications (NCA)","start":{"date-parts":[[2020,11,24]]},"location":"Cambridge, MA, USA","end":{"date-parts":[[2020,11,27]]}},"container-title":["2020 IEEE 19th International Symposium on Network Computing and Applications (NCA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9306506\/9306688\/09306738.pdf?arnumber=9306738","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:51:29Z","timestamp":1656453089000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9306738\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,24]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/nca51143.2020.9306738","relation":{},"subject":[],"published":{"date-parts":[[2020,11,24]]}}}