{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T04:09:00Z","timestamp":1776398940340,"version":"3.51.2"},"reference-count":74,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"European Funds","award":["UIDB\/50021\/2020 (INESC-ID)"],"award-info":[{"award-number":["UIDB\/50021\/2020 (INESC-ID)"]}]},{"name":"European Funds","award":["2020.06837.BD"],"award-info":[{"award-number":["2020.06837.BD"]}]},{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","award":["952226"],"award-info":[{"award-number":["952226"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1109\/tr.2023.3336246","type":"journal-article","created":{"date-parts":[[2023,12,18]],"date-time":"2023-12-18T14:31:06Z","timestamp":1702909866000},"page":"1132-1146","source":"Crossref","is-referenced-by-count":17,"title":["Hephaestus: Modeling, Analysis, and Performance Evaluation of Cross-Chain Transactions"],"prefix":"10.1109","volume":"73","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4630-0688","authenticated-orcid":false,"given":"Rafael","family":"Belchior","sequence":"first","affiliation":[{"name":"INESC-ID, Instituto Superior T&#x00E9;cnico, Universidade de Lisboa, Lisbon, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-3268-5349","authenticated-orcid":false,"given":"Peter","family":"Somogyvari","sequence":"additional","affiliation":[{"name":"Accenture, San Francisco, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-1837-8592","authenticated-orcid":false,"given":"Jonas","family":"Pfannschmidt","sequence":"additional","affiliation":[{"name":"Blockdaemon Ltd., Dublin, Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0038-7199","authenticated-orcid":false,"given":"Andr\u00e9","family":"Vasconcelos","sequence":"additional","affiliation":[{"name":"INESC-ID, Instituto Superior T&#x00E9;cnico, Universidade de Lisboa, Lisbon, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7873-5531","authenticated-orcid":false,"given":"Miguel","family":"Correia","sequence":"additional","affiliation":[{"name":"INESC-ID, Instituto Superior T&#x00E9;cnico, Universidade de Lisboa, Lisbon, Portugal"}]}],"member":"263","reference":[{"issue":"8","key":"ref1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3471140","article-title":"A survey on blockchain interoperability: Past, present, and future trends","volume":"54","author":"Belchior","year":"2021","journal-title":"ACM Comput. Surv."},{"key":"ref2","article-title":"Is my perspective better than yours? blockchain interoperability with views","author":"Belchior","year":"2022"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3167172"},{"key":"ref4","article-title":"Survey of crosschain communications protocols","volume-title":"Comput. Netw.","volume":"200","author":"Robinson","year":"2021"},{"key":"ref5","article-title":"A brief history of blockchain interoperability","author":"Belchior","year":"2023"},{"key":"ref6","article-title":"Axelar, bridges, and blockchain globalization","author":"Qureshi","year":"2022"},{"key":"ref7","article-title":"Security of crosschain transactions and bridges","year":"2022"},{"key":"ref8","article-title":"Blockchain bridges","author":"Berenzon","year":"2021"},{"key":"ref9","article-title":"The wormhole bridge attack explained","author":"KidBold","year":"2022"},{"key":"ref10","article-title":"Wormhole cryptocurrency platform hacked for 325 million after error on GitHub","author":"Faife","year":"2022"},{"key":"ref11","article-title":"Rekt - THORChain","year":"2022"},{"key":"ref12","article-title":"Explained: The wormhole hack (February 2022)","author":"Behnke","year":"2022"},{"key":"ref13","article-title":"FYI, the hacker who exploited harmony bridge for 100 m 3 days ago has already started sending stolen ETH to tornado cash mixer","year":"2022"},{"key":"ref14","article-title":"Harmonys horizon bridge hack","author":"Barrett","year":"2022"},{"key":"ref15","article-title":"Nomad crypto bridge loses 200 million in chaotic hack","author":"Faife","year":"2022"},{"key":"ref16","article-title":"Multichain hacked for the third time - R3KT news. rekt","author":"News"},{"key":"ref17","article-title":"Largest DeFi exploits","year":"2022"},{"key":"ref18","article-title":"A year of bridge exploits","author":"Zach","year":"2022"},{"key":"ref19","article-title":"The Straits Times","year":"2022"},{"key":"ref20","article-title":"The road to recovery","author":"Team","year":"2022"},{"key":"ref21","article-title":"Vitalik buterin on cross-chain bridges","author":"Buterin","year":"2022"},{"key":"ref22","article-title":"Towards blockchain-enabled open architectures for scalable digital asset platforms","author":"Avrilionis","year":"2021"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.11.004"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1997.601332"},{"key":"ref25","article-title":"Hyperledger cactus whitepaper","author":"Montgomery","year":"2020"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1108\/bpmj-11-2020-0529"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2229156.2229157"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75183-0_13"},{"issue":"12","key":"ref30","doi-asserted-by":"crossref","first-page":"1281","DOI":"10.1016\/j.infsof.2008.02.006","article-title":"Semantics and analysis of business process models in BPMN","volume":"50","author":"Dijkman","year":"2008","journal-title":"Inf. Softw. Technol."},{"key":"ref31","article-title":"Can we share the same perspective? blockchain interoperability with views","author":"Belchior","year":"2022"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3564532"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICPCA.2011.6106531"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24206-9_16"},{"issue":"2","key":"ref36","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1561\/1900000017","article-title":"Datalog and recursive query processing","volume":"5","author":"Green","year":"2013","journal-title":"Foundations Trends Databases"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00085"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-64331-0_1"},{"key":"ref39","article-title":"Towards a common standard framework for blockchain interoperability - A position paper","author":"Belchior","year":"2021"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain50366.2020.00046"},{"key":"ref41","article-title":"Binance hit by 100 million blockchain bridge hack","author":"Page","year":"2022"},{"key":"ref42","article-title":"Cross-chain interoperability protocol (CCIP) chainlink"},{"key":"ref43","article-title":"SoK: Not quite water under the bridge: Review of cross-chain bridge hacks","author":"Lee","year":"2022"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpa.2023.100556"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.3233\/STAL200004"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3530019.3531345"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-54455-3_38"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3209546"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-06764-8_23"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3559520"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-21280-2_6"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560652"},{"key":"ref53","article-title":"Securing cross-chain asset transfers on permissioned blockchains","author":"Pedreira","year":"2022"},{"key":"ref54","article-title":"Resilient gateway-based N-n cross-chain asset transfers","author":"Augusto","year":"2022"},{"key":"ref55","article-title":"Open digital asset protocol draft 02","author":"Hargreaves","year":"2021"},{"key":"ref56","article-title":"Gateway crash recovery mechanism draft v1","author":"Belchior","year":"2021"},{"key":"ref57","article-title":"Dune"},{"key":"ref58","article-title":"The blockchain data platform - chainalysis","year":"2022"},{"key":"ref59","article-title":"Metla - the ultimate crypto dashboard","year":"2022"},{"key":"ref60","article-title":"Moralis the Web3 development workflow","year":"2022"},{"key":"ref61","article-title":"Rokti portfolio tracker","year":"2022"},{"key":"ref62","article-title":"CertiK blockchain security leaderboard","year":"2022"},{"key":"ref63","article-title":"Token flow insights","year":"2022"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-78120-0_11"},{"key":"ref66","first-page":"134","article-title":"A detailed and real-time performance monitoring framework for blockchain systems","volume-title":"Proc. IEEE\/ACM 40th Int. Conf. Softw. Eng.: Softw. Eng. Pract. Track","author":"Zheng","year":"2018"},{"key":"ref67","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3152824.3152831","article-title":"A general framework for blockchain analytics","volume-title":"Proc. 1st Workshop Scalable Resilient Infrastructures Distrib. Ledgers","author":"Bartoletti","year":"2017"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2019.2900638"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC51069.2021.9461118"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2018.00056"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-85469-0_20"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/DAPPCON.2019.00031"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30429-4_6"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-37453-2_55"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30985-5_27"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/24\/10547161\/10363680.pdf?arnumber=10363680","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T20:00:45Z","timestamp":1733860845000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10363680\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6]]},"references-count":74,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tr.2023.3336246","relation":{"has-preprint":[{"id-type":"doi","id":"10.36227\/techrxiv.20718058.v1","asserted-by":"object"},{"id-type":"doi","id":"10.36227\/techrxiv.20718058.v2","asserted-by":"object"},{"id-type":"doi","id":"10.36227\/techrxiv.20718058","asserted-by":"object"},{"id-type":"doi","id":"10.36227\/techrxiv.20718058.v3","asserted-by":"object"}]},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"value":"0018-9529","type":"print"},{"value":"1558-1721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6]]}}}