{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:33:12Z","timestamp":1771468392905,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":61,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,24]],"date-time":"2017-10-24T00:00:00Z","timestamp":1508803200000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS-1314857 CNS-1330599 CNS-1453634 CNS-1514261 CNS-1514163"],"award-info":[{"award-number":["CNS-1314857 CNS-1330599 CNS-1453634 CNS-1514261 CNS-1514163"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"The David and Lucile Packard Foundation"},{"name":"Google"},{"name":"VMWare"},{"name":"Alfred P. Sloan Foundation"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2978362","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T08:46:35Z","timestamp":1477385195000},"page":"283-295","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":131,"title":["The Ring of Gyges"],"prefix":"10.1145","author":[{"given":"Ari","family":"Juels","sequence":"first","affiliation":[{"name":"Cornell Tech, Jacobs Institute, New York, NY, USA"}]},{"given":"Ahmed","family":"Kosba","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"given":"Elaine","family":"Shi","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"http:\/\/www.smartcontract.com."},{"key":"e_1_3_2_1_2_1","unstructured":"http:\/\/koinify.com."},{"key":"e_1_3_2_1_3_1","unstructured":"https:\/\/github.com\/darkwallet\/darkleaks."},{"key":"e_1_3_2_1_4_1","unstructured":"Amazon EC2 pricing. http:\/\/aws.amazon.com\/ec2\/pricing\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Augur. http:\/\/www.augur.net\/."},{"key":"e_1_3_2_1_6_1","unstructured":"Bitcoin ransomware now spreading via spam campaigns. http:\/\/www.coindesk.com\/bitcoin-ransomware-now-spreading-via-spam-campaigns\/."},{"key":"e_1_3_2_1_7_1","unstructured":"bitoinj. https:\/\/bitcoinj.github.io\/."},{"key":"e_1_3_2_1_8_1","unstructured":"CRL issued bby Symantec Class 3 EV SSL CA - G3. http:\/\/ss.symcb.com\/sr.crl."},{"key":"e_1_3_2_1_9_1","unstructured":"NIST randomness beacon. https:\/\/beacon.nist.gov\/home."},{"key":"e_1_3_2_1_10_1","unstructured":"Serpent. https:\/\/github.com\/ethereum\/wiki\/wiki\/Serpent."},{"key":"e_1_3_2_1_11_1","unstructured":"Skuchain. http:\/\/www.skuchain.com\/."},{"key":"e_1_3_2_1_12_1","unstructured":"Verisign revoked certificate test page. https:\/\/test-sspev.verisign.com:2443\/test-SPPEV-revoked-verisign.html. Accessed: 2015-05--15."},{"key":"e_1_3_2_1_13_1","unstructured":"Zcash. Referenced Aug. 2016 at z.cash."},{"key":"e_1_3_2_1_14_1","volume-title":"Gox thinks it's the Fed. freezes acc based on \"tainted\" coins. (unlocked now). https:\/\/bitcointalk.org\/index.php?topic=73385.0","year":"2012","unstructured":"Mt. Gox thinks it's the Fed. freezes acc based on \"tainted\" coins. (unlocked now). https:\/\/bitcointalk.org\/index.php?topic=73385.0, 2012."},{"key":"e_1_3_2_1_15_1","volume-title":"www.blockchainalliance.org","author":"Alliance Blockchain","year":"2016","unstructured":"Blockchain Alliance. www.blockchainalliance.org, 2016."},{"key":"e_1_3_2_1_16_1","volume-title":"Forum post at Reddit","author":"Ethereum","year":"2015","unstructured":"Ethereum and evil. Forum post at Reddit; url: http:\/\/tinyurl.com\/k8awj2j, Accessed May 2015."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.35"},{"key":"e_1_3_2_1_18_1","first-page":"3","volume-title":"Virus Bulletin","author":"Bates J.","year":"1990","unstructured":"J. Bates. Trojan horse: AIDS information introductory diskette version 2.0,. In E. Wilding and F. Skulason, editors, Virus Bulletin, pages 3--6. 1990."},{"key":"e_1_3_2_1_19_1","unstructured":"J. Bell. Assassination politics. http:\/\/www.outpost-of-freedom.com\/jimbellap.htm 1995--6."},{"key":"e_1_3_2_1_20_1","volume-title":"Zerocash: Decentralized anonymous payments from Bitcoin","author":"Ben-Sasson E.","year":"2014","unstructured":"E. Ben-Sasson, A. Chiesa, C. Garman, M. Green, I. Miers, E. Tromer, and M. Virza. Zerocash: Decentralized anonymous payments from Bitcoin. In S & P. IEEE, 2014."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.25"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/2671225.2671275"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44381-1_24"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382284"},{"key":"e_1_3_2_1_25_1","volume-title":"ZDNet","author":"Blue V.","year":"2013","unstructured":"V. Blue. Cryptolocker's crimewave: A trail of millions in laundered Bitcoin. ZDNet, 22 December 2013."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/313651.313790"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_8"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/874063.875553"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/646757.705670"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488408"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/12130.12168"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517872.2517878"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"K. Delmolino M. Arnett A. Kosba A. Miller and E. Shi. Step by step towards creating a safe smart contract: Lessons and insights from a cryptocurrency lab. https:\/\/eprint.iacr.org\/2015\/460.","DOI":"10.1007\/978-3-662-53357-4_6"},{"key":"e_1_3_2_1_35_1","unstructured":"P. T. et al. Darkwallet on twitter: \"DARK LEAKS coming soon. http:\/\/t.co\/k4ubs16scr\". Reddit: http:\/\/bit.ly\/1A9UShY."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_28"},{"key":"e_1_3_2_1_37_1","volume-title":"August","author":"Foundation E. F.","year":"2010","unstructured":"E. F. Foundation. EFF SSL observatory. URL: https:\/\/www.eff.org\/observatory, August 2010."},{"key":"e_1_3_2_1_38_1","unstructured":"A. Greenberg. 'Dark Wallet' is about to make Bitcoin money laundering easier than ever. http:\/\/www.wired.com\/2014\/04\/dark-wallet\/."},{"key":"e_1_3_2_1_39_1","volume-title":"Forbes","author":"Greenberg A.","year":"2013","unstructured":"A. Greenberg. Alleged silk road boss Ross Ulbricht now accused of six murders-for-hire, denied bail. Forbes, 21 November 2013."},{"key":"e_1_3_2_1_40_1","volume-title":"October","year":"2014","unstructured":"Intel. Intel software guard extensions programming reference. Whitepaper ref. 329298-002US, October 2014."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC3447"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","unstructured":"A. Juels A. Kosba and E. Shi. The ring of gyges: Investigating the future of criminal smart contracts. Cryptology ePrint Archive Report 2016\/358 2016. http:\/\/eprint.iacr.org\/2016\/358.","DOI":"10.1145\/2976749.2978362"},{"key":"e_1_3_2_1_43_1","volume-title":"Hawk: The blockchain model of cryptography and privacy-preserving smart contracts","author":"Kosba A.","year":"2016","unstructured":"A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou. Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In S & P. IEEE, 2016."},{"key":"e_1_3_2_1_44_1","volume-title":"Understanding crypto-ransomware. Bromium whitepaper","author":"Kotov V.","year":"2014","unstructured":"V. Kotov and M. Rajpal. Understanding crypto-ransomware. Bromium whitepaper, 2014."},{"key":"e_1_3_2_1_45_1","volume-title":"January","author":"Krellenstein A.","year":"2014","unstructured":"A. Krellenstein, R. Dermody, and O. Slama. Counterparty announcement. https:\/\/bitcointalk.org\/index.php?topic=395761.0, January 2014."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660380"},{"key":"e_1_3_2_1_47_1","volume-title":"A call for a temporary moratorium on \"The DAO\" (v0.3.2). Referenced","author":"Mark D.","year":"2016","unstructured":"D. Mark, V. Zamfir, and E. G. Sirer. A call for a temporary moratorium on \"The DAO\" (v0.3.2). Referenced Aug. 2016 at http:\/\/bit.ly\/2aWDhyY, 30 May 2016."},{"key":"e_1_3_2_1_48_1","volume-title":"CoinDesk","author":"Matonis J.","year":"2013","unstructured":"J. Matonis. Why Bitcoin fungibility is essential. CoinDesk, 1 Dec. 2013."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504747"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.34"},{"key":"e_1_3_2_1_51_1","volume-title":"An inquiry into money laundering tools in the bitcoin ecosystem. In eCRS","author":"Moser M.","year":"2013","unstructured":"M. Moser, R. Bohme, and D. Breuker. An inquiry into money laundering tools in the bitcoin ecosystem. In eCRS, 2013."},{"key":"e_1_3_2_1_52_1","unstructured":"S. Nakamoto. Bitcoin: A Peer-to-Peer Electronic Cash System. http:\/\/bitcoin.org\/bitcoin.pdf 2009."},{"key":"e_1_3_2_1_53_1","unstructured":"R. Pass and a. shelat. Micropayments for peer-to-peer currencies. Manuscript."},{"key":"e_1_3_2_1_54_1","volume-title":"IEEE Spectrum","author":"Peck M.","year":"2016","unstructured":"M. Peck. Ethereum developer explores the dark side of Bitcoin-inspired technology. IEEE Spectrum, 19 May 2016."},{"key":"e_1_3_2_1_55_1","volume-title":"Cybercrime supersite 'DarkMarket' was FBI sting, documents confirm. Wired","author":"Poulsen K.","year":"2008","unstructured":"K. Poulsen. Cybercrime supersite 'DarkMarket' was FBI sting, documents confirm. Wired, 13 Oct. 2008."},{"key":"e_1_3_2_1_56_1","volume-title":"How did Dread Pirate Roberts acquire and protect his bitcoin wealth? In FC","author":"Ron D.","year":"2014","unstructured":"D. Ron and A. Shamir. How did Dread Pirate Roberts acquire and protect his bitcoin wealth? In FC. 2014."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(92)90193-U"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.5555\/1755009.1755032"},{"key":"e_1_3_2_1_59_1","unstructured":"G. Wood. Ethereum: A secure decentralized transaction ledger. http:\/\/gavwood.com\/paper.pdf 2014."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.5555\/1947337.1947357"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978326"}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","location":"Vienna Austria","acronym":"CCS'16","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978362","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978362","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978362","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:23:31Z","timestamp":1763457811000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978362"}},"subtitle":["Investigating the Future of Criminal Smart Contracts"],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":61,"alternative-id":["10.1145\/2976749.2978362","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2978362","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}