{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T17:25:40Z","timestamp":1778347540652,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":116,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,9,26]],"date-time":"2021-09-26T00:00:00Z","timestamp":1632614400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSERC"},{"name":"AMF \u00f0 Finance Montr\u00e9al"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,9,26]]},"DOI":"10.1145\/3479722.3480994","type":"proceedings-article","created":{"date-parts":[[2021,11,23]],"date-time":"2021-11-23T17:35:26Z","timestamp":1637688926000},"page":"127-141","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":51,"title":["SoK"],"prefix":"10.1145","author":[{"given":"Shayan","family":"Eskandari","sequence":"first","affiliation":[{"name":"Concordia University, Montreal, QC, Canada and ConsenSys Diligence"}]},{"given":"Mehdi","family":"Salehi","sequence":"additional","affiliation":[{"name":"Concordia University, Montreal, QC, Canada"}]},{"given":"Wanyun Catherine","family":"Gu","sequence":"additional","affiliation":[{"name":"Stanford University"}]},{"given":"Jeremy","family":"Clark","sequence":"additional","affiliation":[{"name":"Concordia University, Montreal, QC, Canada"}]}],"member":"320","published-online":{"date-parts":[[2021,11,23]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"URl: https:\/\/uniswap.org\/docs","author":"Adams Hayden","year":"2019","unstructured":"Hayden Adams . 2019. Uniswap. URl: https:\/\/uniswap.org\/docs ( 2019 ). Hayden Adams. 2019. Uniswap. URl: https:\/\/uniswap.org\/docs (2019)."},{"key":"e_1_3_2_1_2_1","unstructured":"Hayden Adams Noah Zinsmeister Moody Salem River Keefer and Dan Robinson. 2021. Uniswap v3 Core. (2021).  Hayden Adams Noah Zinsmeister Moody Salem River Keefer and Dan Robinson. 2021. Uniswap v3 Core. (2021)."},{"key":"e_1_3_2_1_3_1","volume-title":"Astraea: A decentralized blockchain oracle. In 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications","author":"Adler John","year":"2018","unstructured":"John Adler , Ryan Berryhill , Andreas Veneris , Zissis Poulos , Neil Veira , and Anastasia Kastania . 2018 . Astraea: A decentralized blockchain oracle. In 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE , 1145--1152. John Adler, Ryan Berryhill, Andreas Veneris, Zissis Poulos, Neil Veira, and Anastasia Kastania. 2018. Astraea: A decentralized blockchain oracle. In 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, 1145--1152."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2992698"},{"key":"e_1_3_2_1_5_1","first-page":"15","article-title":"A survey on attacks in RFID networks","volume":"1","author":"Alizadeh Mojtaba","year":"2012","unstructured":"Mojtaba Alizadeh , Mazdak Zamani , Ali Rafiei Shahemabad , Jafar Shayan , and Ahmad Azarnik . 2012 . A survey on attacks in RFID networks . Open International Journal of Informatics (OIJI) 1 , 1 (2012), 15 -- 24 . Mojtaba Alizadeh, Mazdak Zamani, Ali Rafiei Shahemabad, Jafar Shayan, and Ahmad Azarnik. 2012. A survey on attacks in RFID networks. Open International Journal of Informatics (OIJI) 1, 1 (2012), 15--24.","journal-title":"Open International Journal of Informatics (OIJI)"},{"key":"e_1_3_2_1_6_1","volume-title":"Improved Price Oracles: Constant Function Market Makers. arXiv preprint arXiv:2003.10001","author":"Angeris Guillermo","year":"2020","unstructured":"Guillermo Angeris and Tarun Chitra . 2020. Improved Price Oracles: Constant Function Market Makers. arXiv preprint arXiv:2003.10001 ( 2020 ). Guillermo Angeris and Tarun Chitra. 2020. Improved Price Oracles: Constant Function Market Makers. arXiv preprint arXiv:2003.10001 (2020)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54455-6_8"},{"key":"e_1_3_2_1_8_1","volume-title":"A protocol for programmable liquidity. URl: https:\/\/balancer.finance\/","year":"2020","unstructured":"Balancer. 2020. A protocol for programmable liquidity. URl: https:\/\/balancer.finance\/ ( 2020 ). Balancer. 2020. A protocol for programmable liquidity. URl: https:\/\/balancer.finance\/ (2020)."},{"key":"e_1_3_2_1_9_1","unstructured":"Burak Benligiray Sa\u0161a Milic and Heikki V\u00e4nttinen. [n.d.]. Decentralized APIs for Web 3.0. ([n. d.]).  Burak Benligiray Sa\u0161a Milic and Heikki V\u00e4nttinen. [n.d.]. Decentralized APIs for Web 3.0. ([n. d.])."},{"key":"e_1_3_2_1_10_1","volume-title":"URl: https:\/\/www.oraclize.it\/","author":"Bernani T","year":"2016","unstructured":"T Bernani . 2016. Oraclize. URl: https:\/\/www.oraclize.it\/ ( 2016 ). T Bernani. 2016. Oraclize. URl: https:\/\/www.oraclize.it\/ (2016)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70278-0_28"},{"key":"e_1_3_2_1_12_1","volume-title":"A Pinar Ozisik, and Gavin Andresen.","author":"Bissias George","year":"2016","unstructured":"George Bissias , Brian Neil Levine , A Pinar Ozisik, and Gavin Andresen. 2016 . An analysis of attacks on blockchain consensus. arXiv preprint arXiv:1610.07985 (2016). George Bissias, Brian Neil Levine, A Pinar Ozisik, and Gavin Andresen. 2016. An analysis of attacks on blockchain consensus. arXiv preprint arXiv:1610.07985 (2016)."},{"key":"e_1_3_2_1_13_1","volume-title":"16 Ways to Create Dynamic Non-Fungible Tokens (NFT) Using Chainlink Oracles. URl: https:\/\/blog.chain.link\/create-dynamic-nfts-using-chainlink-oracles\/","author":"Blog Chainlink","year":"2021","unstructured":"Chainlink Blog . 2021. 16 Ways to Create Dynamic Non-Fungible Tokens (NFT) Using Chainlink Oracles. URl: https:\/\/blog.chain.link\/create-dynamic-nfts-using-chainlink-oracles\/ ( 2021 ). Chainlink Blog. 2021. 16 Ways to Create Dynamic Non-Fungible Tokens (NFT) Using Chainlink Oracles. URl: https:\/\/blog.chain.link\/create-dynamic-nfts-using-chainlink-oracles\/ (2021)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96884-1_25"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(88)90005-0"},{"key":"e_1_3_2_1_16_1","volume-title":"11th {USENIX} Workshop on Offensive Technologies ({WOOT} 17).","author":"Brasser Ferdinand","unstructured":"Ferdinand Brasser , Urs M\u00fcller , Alexandra Dmitrienko , Kari Kostiainen , Srdjan Capkun , and Ahmad-Reza Sadeghi . 2017. Software grand exposure: {SGX} cache attacks are practical . In 11th {USENIX} Workshop on Offensive Technologies ({WOOT} 17). Ferdinand Brasser, Urs M\u00fcller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, and Ahmad-Reza Sadeghi. 2017. Software grand exposure: {SGX} cache attacks are practical. In 11th {USENIX} Workshop on Offensive Technologies ({WOOT} 17)."},{"key":"e_1_3_2_1_17_1","volume-title":"Chainlink Off-chain Reporting Protocol. URl: https:\/\/blog.chain.link\/off-chain-reporting-live-on-mainnet\/","author":"Breidenbach Lorenz","year":"2021","unstructured":"Lorenz Breidenbach , Christian Cachin , Alex Coventry , Ari Juels , and Andrew Miller . 2021. Chainlink Off-chain Reporting Protocol. URl: https:\/\/blog.chain.link\/off-chain-reporting-live-on-mainnet\/ ( 2021 ). Lorenz Breidenbach, Christian Cachin, Alex Coventry, Ari Juels, and Andrew Miller. 2021. Chainlink Off-chain Reporting Protocol. URl: https:\/\/blog.chain.link\/off-chain-reporting-live-on-mainnet\/ (2021)."},{"key":"e_1_3_2_1_18_1","volume-title":"Proofs-of-delay and randomness beacons in ethereum","author":"B\u00fcnz Benedikt","year":"2017","unstructured":"Benedikt B\u00fcnz , Steven Goldfeder , and Joseph Bonneau . 2017. Proofs-of-delay and randomness beacons in ethereum . IEEE Security and Privacy on the blockchain (IEEE S &B) ( 2017 ). Benedikt B\u00fcnz, Steven Goldfeder, and Joseph Bonneau. 2017. Proofs-of-delay and randomness beacons in ethereum. IEEE Security and Privacy on the blockchain (IEEE S&B) (2017)."},{"key":"e_1_3_2_1_19_1","volume-title":"UNI should become an oracle token. URl: https:\/\/gov.uniswap.org\/t\/uni-should-become-an-oracle-token\/11988","author":"Buterin Vitalik","year":"2021","unstructured":"Vitalik Buterin . 2021. UNI should become an oracle token. URl: https:\/\/gov.uniswap.org\/t\/uni-should-become-an-oracle-token\/11988 ( 2021 ). Vitalik Buterin. 2021. UNI should become an oracle token. URl: https:\/\/gov.uniswap.org\/t\/uni-should-become-an-oracle-token\/11988 (2021)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"e_1_3_2_1_21_1","volume-title":"Chainlink VRF: On-chain Verifiable Randomness. URl: https:\/\/blog.chain.link\/verifiable-random-functions-vrf-random-number-generation-rng-feature\/","year":"2020","unstructured":"Chainlink. 2020. Chainlink VRF: On-chain Verifiable Randomness. URl: https:\/\/blog.chain.link\/verifiable-random-functions-vrf-random-number-generation-rng-feature\/ ( 2020 ). Chainlink. 2020. Chainlink VRF: On-chain Verifiable Randomness. URl: https:\/\/blog.chain.link\/verifiable-random-functions-vrf-random-number-generation-rng-feature\/ (2020)."},{"key":"e_1_3_2_1_22_1","volume-title":"What is the Blockchain Oracle Problem. URl: https:\/\/blog.chain.link\/what-is-the-blockchain-oracle-problem\/","year":"2020","unstructured":"ChainLink. 2020. What is the Blockchain Oracle Problem. URl: https:\/\/blog.chain.link\/what-is-the-blockchain-oracle-problem\/ ( 2020 ). ChainLink. 2020. What is the Blockchain Oracle Problem. URl: https:\/\/blog.chain.link\/what-is-the-blockchain-oracle-problem\/ (2020)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/BLOC.2019.8751326"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3391195","article-title":"A Survey on Ethereum Systems Security: Vulnerabilities, Attacks, and Defenses","volume":"53","author":"Chen Huashan","year":"2020","unstructured":"Huashan Chen , Marcus Pendleton , Laurent Njilla , and Shouhuai Xu . 2020 . A Survey on Ethereum Systems Security: Vulnerabilities, Attacks, and Defenses . ACM Computing Surveys (CSUR) 53 , 3 (2020), 1 -- 43 . Huashan Chen, Marcus Pendleton, Laurent Njilla, and Shouhuai Xu. 2020. A Survey on Ethereum Systems Security: Vulnerabilities, Attacks, and Defenses. ACM Computing Surveys (CSUR) 53, 3 (2020), 1--43.","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"e_1_3_2_1_25_1","volume-title":"Workshop on the Economics of Information Security","author":"Clark Jeremy","year":"2014","unstructured":"Jeremy Clark , Joseph Bonneau , Edward W Felten , Joshua A Kroll , Andrew Miller , and Arvind Narayanan . 2014 . On decentralizing prediction markets and order books . In Workshop on the Economics of Information Security , State College, Pennsylvania. Jeremy Clark, Joseph Bonneau, Edward W Felten, Joshua A Kroll, Andrew Miller, and Arvind Narayanan. 2014. On decentralizing prediction markets and order books. In Workshop on the Economics of Information Security, State College, Pennsylvania."},{"key":"e_1_3_2_1_26_1","volume-title":"SoK: Demystifying Stablecoins. CACM","author":"Clark Jeremy","year":"2020","unstructured":"Jeremy Clark , Didem Demirag , and Seyedehmahsa Moosavi . 2020. SoK: Demystifying Stablecoins. CACM ( 2020 ). Jeremy Clark, Didem Demirag, and Seyedehmahsa Moosavi. 2020. SoK: Demystifying Stablecoins. CACM (2020)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.41"},{"key":"e_1_3_2_1_28_1","volume-title":"Attack DAOs, and (De)Centralization. URl: https:\/\/medium.com\/coinmonks\/vulnerabilities-in-maker-oracle-governance-attacks-attack-daos-and-de-centralization-d943685adc2f","year":"2019","unstructured":"Coinmonk. 2019. Vulnerabilities in Maker: Oracle-Governance Attacks , Attack DAOs, and (De)Centralization. URl: https:\/\/medium.com\/coinmonks\/vulnerabilities-in-maker-oracle-governance-attacks-attack-daos-and-de-centralization-d943685adc2f ( 2019 ). Coinmonk. 2019. Vulnerabilities in Maker: Oracle-Governance Attacks, Attack DAOs, and (De)Centralization. URl: https:\/\/medium.com\/coinmonks\/vulnerabilities-in-maker-oracle-governance-attacks-attack-daos-and-de-centralization-d943685adc2f (2019)."},{"key":"e_1_3_2_1_29_1","volume-title":"URl: https:\/\/compound.finance\/docs\/prices","year":"2020","unstructured":"Compound. 2020. Open Price Feed. URl: https:\/\/compound.finance\/docs\/prices ( 2020 ). Compound. 2020. Open Price Feed. URl: https:\/\/compound.finance\/docs\/prices (2020)."},{"key":"e_1_3_2_1_30_1","unstructured":"Consensys. 2020. Ethereum Smart Contract Best Practices.  Consensys. 2020. Ethereum Smart Contract Best Practices."},{"key":"e_1_3_2_1_31_1","volume-title":"URl: https:\/\/medium.com\/tellor\/staking-disputes-and-voting-ad09c66eb7bc\/","author":"Core Tellor","year":"2019","unstructured":"Tellor Core . 2019. Staking, Disputes, and Voting. URl: https:\/\/medium.com\/tellor\/staking-disputes-and-voting-ad09c66eb7bc\/ ( 2019 ). Tellor Core. 2019. Staking, Disputes, and Voting. URl: https:\/\/medium.com\/tellor\/staking-disputes-and-voting-ad09c66eb7bc\/ (2019)."},{"key":"e_1_3_2_1_32_1","first-page":"1","article-title":"Intel SGX Explained","volume":"2016","author":"Costan Victor","year":"2016","unstructured":"Victor Costan and Srinivas Devadas . 2016 . Intel SGX Explained . IACR Cryptol. ePrint Arch. 2016 , 86 (2016), 1 -- 118 . Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. IACR Cryptol. ePrint Arch. 2016, 86 (2016), 1--118.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_33_1","volume-title":"Chainlink nodes were targeted in an attack last weekend that cost them at least 700 ETH. URl: https:\/\/www.theblockcrypto.com\/post\/76986\/chainlink-nodes-attack-eth","author":"Crypto The Block","year":"2020","unstructured":"The Block Crypto . 2020. Chainlink nodes were targeted in an attack last weekend that cost them at least 700 ETH. URl: https:\/\/www.theblockcrypto.com\/post\/76986\/chainlink-nodes-attack-eth ( 2020 ). The Block Crypto. 2020. Chainlink nodes were targeted in an attack last weekend that cost them at least 700 ETH. URl: https:\/\/www.theblockcrypto.com\/post\/76986\/chainlink-nodes-attack-eth (2020)."},{"key":"e_1_3_2_1_34_1","volume-title":"DeFi attacks: the general picture. URl: https:\/\/www.theblockcrypto.com\/research\/105472\/defi-attacks-the-general-picture","author":"Crypto The Block","year":"2021","unstructured":"The Block Crypto . 2021. DeFi attacks: the general picture. URl: https:\/\/www.theblockcrypto.com\/research\/105472\/defi-attacks-the-general-picture ( 2021 ). The Block Crypto. 2021. DeFi attacks: the general picture. URl: https:\/\/www.theblockcrypto.com\/research\/105472\/defi-attacks-the-general-picture (2021)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00040"},{"key":"e_1_3_2_1_36_1","volume-title":"On-Chain Vote Buying and the Rise of Dark DAOs. URl: https:\/\/hackingdistributed.com\/2018\/07\/02\/on-chain-vote-buying\/","author":"Daian Philip","year":"2018","unstructured":"Philip Daian , Tyler Kell , Ian Miers , and Ari Juels . 2018. On-Chain Vote Buying and the Rise of Dark DAOs. URl: https:\/\/hackingdistributed.com\/2018\/07\/02\/on-chain-vote-buying\/ ( 2018 ). Philip Daian, Tyler Kell, Ian Miers, and Ari Juels. 2018. On-Chain Vote Buying and the Rise of Dark DAOs. URl: https:\/\/hackingdistributed.com\/2018\/07\/02\/on-chain-vote-buying\/ (2018)."},{"key":"e_1_3_2_1_37_1","volume-title":"Oracle Exploit Sees $89 Million Liquidated on Compound. URl: https:\/\/decrypt.co\/49657\/oracle-exploit-sees-100-million-liquidated-on-compound","year":"2020","unstructured":"Decrypt. 2020. Oracle Exploit Sees $89 Million Liquidated on Compound. URl: https:\/\/decrypt.co\/49657\/oracle-exploit-sees-100-million-liquidated-on-compound ( 2020 ). Decrypt. 2020. Oracle Exploit Sees $89 Million Liquidated on Compound. URl: https:\/\/decrypt.co\/49657\/oracle-exploit-sees-100-million-liquidated-on-compound (2020)."},{"key":"e_1_3_2_1_38_1","unstructured":"DIA. 2020. DIA --- Transparent Oracles for a Decentralised Financial Ecosystem.  DIA. 2020. DIA --- Transparent Oracles for a Decentralised Financial Ecosystem."},{"key":"e_1_3_2_1_39_1","volume-title":"The DODO Advantage. URl: https:\/\/dodoex.github.io\/docs\/docs\/advantages","author":"DODO.","year":"2020","unstructured":"DODO. 2020. The DODO Advantage. URl: https:\/\/dodoex.github.io\/docs\/docs\/advantages ( 2020 ). DODO. 2020. The DODO Advantage. URl: https:\/\/dodoex.github.io\/docs\/docs\/advantages (2020)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687813"},{"key":"e_1_3_2_1_41_1","first-page":"2018","article-title":"Chainlink: A decentralized oracle network","volume":"11","author":"Ellis Steve","year":"2017","unstructured":"Steve Ellis , Ari Juels , and Sergey Nazarov . 2017 . Chainlink: A decentralized oracle network . Retrieved March 11 (2017), 2018 . Steve Ellis, Ari Juels, and Sergey Nazarov. 2017. Chainlink: A decentralized oracle network. Retrieved March 11 (2017), 2018.","journal-title":"Retrieved March"},{"key":"e_1_3_2_1_42_1","volume-title":"EtherRoll Bug Thread. URl: https:\/\/twitter.com\/sbetamc\/status\/1263220679937265671","author":"Eskandari Shayan","year":"2020","unstructured":"Shayan Eskandari . 2020. EtherRoll Bug Thread. URl: https:\/\/twitter.com\/sbetamc\/status\/1263220679937265671 ( 2020 ). Shayan Eskandari. 2020. EtherRoll Bug Thread. URl: https:\/\/twitter.com\/sbetamc\/status\/1263220679937265671 (2020)."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"S Eskandari D Barrera E Stobert and J Clark. 2015. A first look at the usability of Bitcoin key management. In USEC.  S Eskandari D Barrera E Stobert and J Clark. 2015. A first look at the usability of Bitcoin key management. In USEC.","DOI":"10.14722\/usec.2015.23015"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70278-0_35"},{"key":"e_1_3_2_1_45_1","volume-title":"International Conference on Financial Cryptography and Data Security. Springer, 170--189","author":"Eskandari Shayan","year":"2019","unstructured":"Shayan Eskandari , Seyedehmahsa Moosavi , and Jeremy Clark . 2019 . Sok: Transparent dishonesty: front-running attacks on blockchain . In International Conference on Financial Cryptography and Data Security. Springer, 170--189 . Shayan Eskandari, Seyedehmahsa Moosavi, and Jeremy Clark. 2019. Sok: Transparent dishonesty: front-running attacks on blockchain. In International Conference on Financial Cryptography and Data Security. Springer, 170--189."},{"key":"e_1_3_2_1_46_1","unstructured":"Ethereum. 2015. Official Go implementation of the Ethereum protocol.  Ethereum. 2015. Official Go implementation of the Ethereum protocol."},{"key":"e_1_3_2_1_47_1","volume-title":"Ethereum casino. URl: https:\/\/etheroll.com\/","year":"2020","unstructured":"Etheroll. 2020. Ethereum casino. URl: https:\/\/etheroll.com\/ ( 2020 ). Etheroll. 2020. Ethereum casino. URl: https:\/\/etheroll.com\/ (2020)."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Aykut Firat Stuart Madnick and Benjamin Grosof. 2002. Knowledge integration to overcome ontological heterogeneity: Challenges from financial information systems. (2002).  Aykut Firat Stuart Madnick and Benjamin Grosof. 2002. Knowledge integration to overcome ontological heterogeneity: Challenges from financial information systems. (2002).","DOI":"10.2139\/ssrn.336205"},{"key":"e_1_3_2_1_49_1","volume-title":"URl: https:\/\/github.com\/flashbots\/pm","year":"2021","unstructured":"Flashbots. 2021. Flashbots. URl: https:\/\/github.com\/flashbots\/pm ( 2021 ). Flashbots. 2021. Flashbots. URl: https:\/\/github.com\/flashbots\/pm (2021)."},{"key":"e_1_3_2_1_50_1","unstructured":"Bryan Ford and Rainer B\u00f6hme. 2019. Rationality is Self-Defeating in Permissionless Systems. arXiv:1910.08820 [cs.CR]  Bryan Ford and Rainer B\u00f6hme. 2019. Rationality is Self-Defeating in Permissionless Systems. arXiv:1910.08820 [cs.CR]"},{"key":"e_1_3_2_1_51_1","volume-title":"Scientific Governance and Risk #120. URl: https:\/\/forum.makerdao.com\/t\/agenda-discussion-scientific-governance-and-risk-120-thursday-december-3-16-00-utc\/5357","author":"Forum DAO","year":"2020","unstructured":"Maker DAO Forum . 2020. Scientific Governance and Risk #120. URl: https:\/\/forum.makerdao.com\/t\/agenda-discussion-scientific-governance-and-risk-120-thursday-december-3-16-00-utc\/5357 ( 2020 ). MakerDAO Forum. 2020. Scientific Governance and Risk #120. URl: https:\/\/forum.makerdao.com\/t\/agenda-discussion-scientific-governance-and-risk-120-thursday-december-3-16-00-utc\/5357 (2020)."},{"key":"e_1_3_2_1_52_1","unstructured":"Sharon Goldberg Dimitrios Papadopoulos and Jan V\u010del\u00e1k. 2017. Verifiable Random Functions (VRFs). Internet-Draft draft-goldbe-vrf-01. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-goldbe-vrf-01 Work in Progress.  Sharon Goldberg Dimitrios Papadopoulos and Jan V\u010del\u00e1k. 2017. Verifiable Random Functions (VRFs). Internet-Draft draft-goldbe-vrf-01. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-goldbe-vrf-01 Work in Progress."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.09.023"},{"key":"e_1_3_2_1_54_1","volume-title":"Empirical Measurements on Pricing Oracles and Decentralized Governance for Stablecoins. Available at SSRN 3611231","author":"Gu Wanyun Catherine","year":"2020","unstructured":"Wanyun Catherine Gu , Anika Raghuvanshi , and Dan Boneh . 2020. Empirical Measurements on Pricing Oracles and Decentralized Governance for Stablecoins. Available at SSRN 3611231 ( 2020 ). Wanyun Catherine Gu, Anika Raghuvanshi, and Dan Boneh. 2020. Empirical Measurements on Pricing Oracles and Decentralized Governance for Stablecoins. Available at SSRN 3611231 (2020)."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/505168.505196"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022058209073"},{"key":"e_1_3_2_1_57_1","volume-title":"24th {USENIX} Security Symposium ({USENIX} Security 15). 129--144.","author":"Heilman Ethan","unstructured":"Ethan Heilman , Alison Kendler , Aviv Zohar , and Sharon Goldberg . 2015. Eclipse attacks on bitcoin's peer-to-peer network . In 24th {USENIX} Security Symposium ({USENIX} Security 15). 129--144. Ethan Heilman, Alison Kendler, Aviv Zohar, and Sharon Goldberg. 2015. Eclipse attacks on bitcoin's peer-to-peer network. In 24th {USENIX} Security Symposium ({USENIX} Security 15). 129--144."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2019.00040"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.38"},{"key":"e_1_3_2_1_60_1","volume-title":"Bancor protocol: continuous liquidity for cryptographic tokens through their smart contracts. White paper","author":"Hertzog Eyal","year":"2017","unstructured":"Eyal Hertzog , Guy Benartzi , and Galiar Benartzi . 2017. Bancor protocol: continuous liquidity for cryptographic tokens through their smart contracts. White paper ( 2017 ). Eyal Hertzog, Guy Benartzi, and Galiar Benartzi. 2017. Bancor protocol: continuous liquidity for cryptographic tokens through their smart contracts. White paper (2017)."},{"key":"e_1_3_2_1_61_1","volume-title":"Price Oracle - A Must Have Infrastructure. URl: https:\/\/www.huobidefilabs.io\/en\/Insight\/1313163603254243330\/","author":"DeFiLabs Insight Huobi","year":"2020","unstructured":"Huobi DeFiLabs Insight . 2020. Price Oracle - A Must Have Infrastructure. URl: https:\/\/www.huobidefilabs.io\/en\/Insight\/1313163603254243330\/ ( 2020 ). Huobi DeFiLabs Insight. 2020. Price Oracle - A Must Have Infrastructure. URl: https:\/\/www.huobidefilabs.io\/en\/Insight\/1313163603254243330\/ (2020)."},{"key":"e_1_3_2_1_62_1","volume-title":"Felten","author":"Kalodner Harry","year":"2018","unstructured":"Harry Kalodner , Steven Goldfeder , Xiaoqi Chen , S. Matthew Weinberg , and Edward W . Felten . 2018 . Arbitrum : Scalable, private smart contracts. In USENIX Security . Harry Kalodner, Steven Goldfeder, Xiaoqi Chen, S. Matthew Weinberg, and Edward W. Felten. 2018. Arbitrum: Scalable, private smart contracts. In USENIX Security."},{"key":"e_1_3_2_1_64_1","volume-title":"Proceedings of WEIS","volume":"2013","author":"Kroll Joshua A","year":"2013","unstructured":"Joshua A Kroll , Ian C Davey , and Edward W Felten . 2013 . The economics of Bitcoin mining, or Bitcoin in the presence of adversaries . In Proceedings of WEIS , Vol. 2013 . 11. Joshua A Kroll, Ian C Davey, and Edward W Felten. 2013. The economics of Bitcoin mining, or Bitcoin in the presence of adversaries. In Proceedings of WEIS, Vol. 2013. 11."},{"key":"e_1_3_2_1_65_1","volume-title":"Tech. Rep.","author":"Lambur Hart","year":"2019","unstructured":"Hart Lambur , Allison Lu , and Regina Cai . 2019 . Uma data verification mechanism: Adding economic guarantees to blockchain oracles. Risk Labs, Inc ., Tech. Rep. , Jul (2019). Hart Lambur, Allison Lu, and Regina Cai. 2019. Uma data verification mechanism: Adding economic guarantees to blockchain oracles. Risk Labs, Inc., Tech. Rep., Jul (2019)."},{"key":"e_1_3_2_1_66_1","volume-title":"The Stuxnet Story. URl: https:\/\/www.langner.com\/2020\/07\/the-stuxnet-story\/","year":"2020","unstructured":"Langner. 2020. The Stuxnet Story. URl: https:\/\/www.langner.com\/2020\/07\/the-stuxnet-story\/ ( 2020 ). Langner. 2020. The Stuxnet Story. URl: https:\/\/www.langner.com\/2020\/07\/the-stuxnet-story\/ (2020)."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"key":"e_1_3_2_1_68_1","volume-title":"Kleros The Justice Protocol. URl: https:\/\/kleros.io\/static\/whitepaper_en-8bd3a0480b45c39899787e17049ded26.pdf","author":"Lesaege Clement","year":"2019","unstructured":"Clement Lesaege , Federico Ast , and William George . 2019. Kleros The Justice Protocol. URl: https:\/\/kleros.io\/static\/whitepaper_en-8bd3a0480b45c39899787e17049ded26.pdf ( 2019 ). Clement Lesaege, Federico Ast, and William George. 2019. Kleros The Justice Protocol. URl: https:\/\/kleros.io\/static\/whitepaper_en-8bd3a0480b45c39899787e17049ded26.pdf (2019)."},{"key":"e_1_3_2_1_69_1","first-page":"653","article-title":"A survey of blockchain security issues and challenges","volume":"19","author":"Lin Iuon-Chang","year":"2017","unstructured":"Iuon-Chang Lin and Tzu-Chun Liao . 2017 . A survey of blockchain security issues and challenges . IJ Network Security 19 , 5 (2017), 653 -- 659 . Iuon-Chang Lin and Tzu-Chun Liao. 2017. A survey of blockchain security issues and challenges. IJ Network Security 19, 5 (2017), 653--659.","journal-title":"IJ Network Security"},{"key":"e_1_3_2_1_70_1","volume-title":"A First Look into DeFi Oracles. arXiv preprint arXiv:2005.04377","author":"Liu Bowen","year":"2020","unstructured":"Bowen Liu and Pawel Szalachowski . 2020. A First Look into DeFi Oracles. arXiv preprint arXiv:2005.04377 ( 2020 ). Bowen Liu and Pawel Szalachowski. 2020. A First Look into DeFi Oracles. arXiv preprint arXiv:2005.04377 (2020)."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2020.106582"},{"key":"e_1_3_2_1_72_1","volume-title":"Flash Loans and securing the Maker Protocol. URl: https:\/\/forum.makerdao.com\/t\/urgent-flash-loans-and-securing-the-maker-protocol\/4901","year":"2020","unstructured":"LongForWisdom. 2020. Flash Loans and securing the Maker Protocol. URl: https:\/\/forum.makerdao.com\/t\/urgent-flash-loans-and-securing-the-maker-protocol\/4901 ( 2020 ). LongForWisdom. 2020. Flash Loans and securing the Maker Protocol. URl: https:\/\/forum.makerdao.com\/t\/urgent-flash-loans-and-securing-the-maker-protocol\/4901 (2020)."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2005.10.001"},{"key":"e_1_3_2_1_74_1","unstructured":"MakerDAO. 2019. Introducing Oracles V2 and DeFi Feeds.  MakerDAO. 2019. Introducing Oracles V2 and DeFi Feeds."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00038"},{"key":"e_1_3_2_1_76_1","volume-title":"40th annual symposium on foundations of computer science (cat. No. 99CB37039)","author":"Micali Silvio","unstructured":"Silvio Micali , Michael Rabin , and Salil Vadhan . 1999. Verifiable random functions . In 40th annual symposium on foundations of computer science (cat. No. 99CB37039) . IEEE , 120--130. Silvio Micali, Michael Rabin, and Salil Vadhan. 1999. Verifiable random functions. In 40th annual symposium on foundations of computer science (cat. No. 99CB37039). IEEE, 120--130."},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"crossref","unstructured":"Amani Moin Kevin Sekniqi and Emin Gun Sirer. 2020. SoK: A Classification Framework for Stablecoin Designs. In Financial Cryptography.  Amani Moin Kevin Sekniqi and Emin Gun Sirer. 2020. SoK: A Classification Framework for Stablecoin Designs. In Financial Cryptography.","DOI":"10.1007\/978-3-030-51280-4_11"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2907658"},{"key":"e_1_3_2_1_79_1","first-page":"273","article-title":"Weather derivatives: a risk management tool for weather-sensitive industries. The Geneva Papers on Risk and Insurance","volume":"25","author":"M\u00fcller Andreas","year":"2000","unstructured":"Andreas M\u00fcller and Marcel Grandi . 2000 . Weather derivatives: a risk management tool for weather-sensitive industries. The Geneva Papers on Risk and Insurance . Issues and Practice 25 , 2 (2000), 273 -- 287 . Andreas M\u00fcller and Marcel Grandi. 2000. Weather derivatives: a risk management tool for weather-sensitive industries. The Geneva Papers on Risk and Insurance. Issues and Practice 25, 2 (2000), 273--287.","journal-title":"Issues and Practice"},{"key":"e_1_3_2_1_80_1","volume-title":"Responsible Vulnerability Disclosure. URl: https:\/\/medium.com\/nexus-mutual\/responsible-vulnerability-disclosure-ece3fe3bcefa","author":"Mutual Nexus","year":"2020","unstructured":"Nexus Mutual . 2020. Responsible Vulnerability Disclosure. URl: https:\/\/medium.com\/nexus-mutual\/responsible-vulnerability-disclosure-ece3fe3bcefa ( 2020 ). Nexus Mutual. 2020. Responsible Vulnerability Disclosure. URl: https:\/\/medium.com\/nexus-mutual\/responsible-vulnerability-disclosure-ece3fe3bcefa (2020)."},{"key":"e_1_3_2_1_81_1","volume-title":"NEST Protocol: A Distributed Price Oracle Network. URl: https:\/\/nestprotocol.org\/doc\/ennestwhitepaper.pdf","author":"NEST.","year":"2020","unstructured":"NEST. 2020. NEST Protocol: A Distributed Price Oracle Network. URl: https:\/\/nestprotocol.org\/doc\/ennestwhitepaper.pdf ( 2020 ). NEST. 2020. NEST Protocol: A Distributed Price Oracle Network. URl: https:\/\/nestprotocol.org\/doc\/ennestwhitepaper.pdf (2020)."},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140490"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32101-7_6"},{"key":"e_1_3_2_1_84_1","volume-title":"Explicit Staking in Chainlink 2.0: An Overview. URl: https:\/\/blog.chain.link\/explicit-staking-in-chainlink-2-0\/","author":"Oracle ChainLink","year":"2021","unstructured":"ChainLink Oracle . 2021. Explicit Staking in Chainlink 2.0: An Overview. URl: https:\/\/blog.chain.link\/explicit-staking-in-chainlink-2-0\/ ( 2021 ). ChainLink Oracle. 2021. Explicit Staking in Chainlink 2.0: An Overview. URl: https:\/\/blog.chain.link\/explicit-staking-in-chainlink-2-0\/ (2021)."},{"key":"e_1_3_2_1_85_1","unstructured":"PeckShield. 2020. bZx Hack II Full Disclosure (With Detailed Profit Analysis).  PeckShield. 2020. bZx Hack II Full Disclosure (With Detailed Profit Analysis)."},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"crossref","unstructured":"Ingolf G A Pernice Sebastian Henningsen Roman Proskalovich Martin Florian and Hermann Elendner. 2019. Monetary Stabilization in Cryptocurrencies: Design Approaches and Open Questions. In CVCBT.  Ingolf G A Pernice Sebastian Henningsen Roman Proskalovich Martin Florian and Hermann Elendner. 2019. Monetary Stabilization in Cryptocurrencies: Design Approaches and Open Questions. In CVCBT.","DOI":"10.1109\/CVCBT.2019.00011"},{"key":"e_1_3_2_1_87_1","volume-title":"Augur: a decentralized, open-source platform for prediction markets. arXiv preprint arXiv: 1501.01042","author":"Peterson Jack","year":"2015","unstructured":"Jack Peterson and Joseph Krug . 2015. Augur: a decentralized, open-source platform for prediction markets. arXiv preprint arXiv: 1501.01042 ( 2015 ). Jack Peterson and Joseph Krug. 2015. Augur: a decentralized, open-source platform for prediction markets. arXiv preprint arXiv: 1501.01042 (2015)."},{"key":"e_1_3_2_1_88_1","volume-title":"PoolTogether is a no-loss, audited savings game powered by blockchain technology. URl: https:\/\/www.pooltogether.com\/","year":"2020","unstructured":"PoolTogether. 2020. PoolTogether is a no-loss, audited savings game powered by blockchain technology. URl: https:\/\/www.pooltogether.com\/ ( 2020 ). PoolTogether. 2020. PoolTogether is a no-loss, audited savings game powered by blockchain technology. URl: https:\/\/www.pooltogether.com\/ (2020)."},{"key":"e_1_3_2_1_89_1","volume-title":"URl: https:\/\/docs.bandchain.org\/whitepaper\/system-overview.html","author":"Protocol Band","year":"2020","unstructured":"Band Protocol . 2020. BandChain Whitepaper . URl: https:\/\/docs.bandchain.org\/whitepaper\/system-overview.html ( 2020 ). Band Protocol. 2020. BandChain Whitepaper. URl: https:\/\/docs.bandchain.org\/whitepaper\/system-overview.html (2020)."},{"key":"e_1_3_2_1_90_1","volume-title":"Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit. arXiv preprint arXiv:2003.03810","author":"Qin Kaihua","year":"2020","unstructured":"Kaihua Qin , Liyi Zhou , Benjamin Livshits , and Arthur Gervais . 2020. Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit. arXiv preprint arXiv:2003.03810 ( 2020 ). Kaihua Qin, Liyi Zhou, Benjamin Livshits, and Arthur Gervais. 2020. Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit. arXiv preprint arXiv:2003.03810 (2020)."},{"key":"e_1_3_2_1_91_1","volume-title":"Introducing CoFiX: a Next-Generation AMM. URl: https:\/\/medium.com\/dragonfly-research\/introducing-cofix-a-next-generation-amm-199aea686b6b","author":"Qureshi Haseeb","year":"2020","unstructured":"Haseeb Qureshi . 2020. Introducing CoFiX: a Next-Generation AMM. URl: https:\/\/medium.com\/dragonfly-research\/introducing-cofix-a-next-generation-amm-199aea686b6b ( 2020 ). Haseeb Qureshi. 2020. Introducing CoFiX: a Next-Generation AMM. URl: https:\/\/medium.com\/dragonfly-research\/introducing-cofix-a-next-generation-amm-199aea686b6b (2020)."},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/3369752"},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"crossref","unstructured":"Mehdi Salehi Jeremy Clark and Mohammad Mannan. 2021. Red-Black Coins: Dai without liquidations. In Financial Cryptography: DeFi.  Mehdi Salehi Jeremy Clark and Mohammad Mannan. 2021. Red-Black Coins: Dai without liquidations. In Financial Cryptography: DeFi.","DOI":"10.1007\/978-3-662-63958-0_12"},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1109\/TENCON.2018.8650352"},{"key":"e_1_3_2_1_95_1","volume-title":"Uniswap and automated market makers, explained. URl: https:\/\/cointelegraph.com\/explained\/uniswap-and-automated-market-makers-explained","author":"Shevchenko Andrey","year":"2020","unstructured":"Andrey Shevchenko . 2020. Uniswap and automated market makers, explained. URl: https:\/\/cointelegraph.com\/explained\/uniswap-and-automated-market-makers-explained ( 2020 ). Andrey Shevchenko. 2020. Uniswap and automated market makers, explained. URl: https:\/\/cointelegraph.com\/explained\/uniswap-and-automated-market-makers-explained (2020)."},{"key":"e_1_3_2_1_96_1","first-page":"58","article-title":"A survey: DDOS attack on Internet of Things","volume":"10","author":"Sonar Krushang","year":"2014","unstructured":"Krushang Sonar and Hardik Upadhyay . 2014 . A survey: DDOS attack on Internet of Things . International Journal of Engineering Research and Development 10 , 11 (2014), 58 -- 63 . Krushang Sonar and Hardik Upadhyay. 2014. A survey: DDOS attack on Internet of Things. International Journal of Engineering Research and Development 10, 11 (2014), 58--63.","journal-title":"International Journal of Engineering Research and Development"},{"key":"e_1_3_2_1_97_1","volume-title":"Synthetix Response to Oracle Incident. URl: https:\/\/blog.synthetix.io\/response-to-oracle-incident\/","year":"2019","unstructured":"Synthetix. 2019. Synthetix Response to Oracle Incident. URl: https:\/\/blog.synthetix.io\/response-to-oracle-incident\/ ( 2019 ). Synthetix. 2019. Synthetix Response to Oracle Incident. URl: https:\/\/blog.synthetix.io\/response-to-oracle-incident\/ (2019)."},{"key":"e_1_3_2_1_98_1","volume-title":"A derivatives liquidity protocol. URl: https:\/\/www.synthetix.io\/","year":"2020","unstructured":"Synthetix. 2020. A derivatives liquidity protocol. URl: https:\/\/www.synthetix.io\/ ( 2020 ). Synthetix. 2020. A derivatives liquidity protocol. URl: https:\/\/www.synthetix.io\/ (2020)."},{"key":"e_1_3_2_1_99_1","unstructured":"Paul Sztorc. 2015. Truthcoin. peer-to-peer oracle system and prediction marketplace. (2015).  Paul Sztorc. 2015. Truthcoin. peer-to-peer oracle system and prediction marketplace. (2015)."},{"key":"e_1_3_2_1_100_1","unstructured":"Tellor. [n.d.]. A decentralized Oracle. https:\/\/tellor.io\/storage\/TellorWhitepaper.pdf  Tellor. [n.d.]. A decentralized Oracle. https:\/\/tellor.io\/storage\/TellorWhitepaper.pdf"},{"key":"e_1_3_2_1_101_1","volume-title":"EIP-2362: Pull Oracle Interface. URl: https:\/\/github.com\/tellor-io\/EIP-2362","year":"2020","unstructured":"Tellor-io. 2020. EIP-2362: Pull Oracle Interface. URl: https:\/\/github.com\/tellor-io\/EIP-2362 ( 2020 ). Tellor-io. 2020. EIP-2362: Pull Oracle Interface. URl: https:\/\/github.com\/tellor-io\/EIP-2362 (2020)."},{"key":"e_1_3_2_1_102_1","volume-title":"2016 13th international conference on service systems and service management (ICSSSM). IEEE, 1--6.","author":"Tian Feng","year":"2016","unstructured":"Feng Tian . 2016 . An agri-food supply chain traceability system for China based on RFID & blockchain technology . In 2016 13th international conference on service systems and service management (ICSSSM). IEEE, 1--6. Feng Tian. 2016. An agri-food supply chain traceability system for China based on RFID & blockchain technology. In 2016 13th international conference on service systems and service management (ICSSSM). IEEE, 1--6."},{"key":"e_1_3_2_1_103_1","volume-title":"A mechanism for independently audited https sessions. URl: https:\/\/tlsnotary.org\/TLSNotary.pdf","year":"2014","unstructured":"TLSnotary. 2014. A mechanism for independently audited https sessions. URl: https:\/\/tlsnotary.org\/TLSNotary.pdf ( 2014 ). TLSnotary. 2014. A mechanism for independently audited https sessions. URl: https:\/\/tlsnotary.org\/TLSNotary.pdf (2014)."},{"key":"e_1_3_2_1_104_1","volume-title":"UMA Data Verification Mechanism: Adding Economic Guarantees to Blockchain Oracles. URl: https:\/\/github.com\/UMAprotocol\/whitepaper\/blob\/master\/UMA-DVM-oracle-whitepaper.pdf","author":"UMA.","year":"2020","unstructured":"UMA. 2020. UMA Data Verification Mechanism: Adding Economic Guarantees to Blockchain Oracles. URl: https:\/\/github.com\/UMAprotocol\/whitepaper\/blob\/master\/UMA-DVM-oracle-whitepaper.pdf ( 2020 ). UMA. 2020. UMA Data Verification Mechanism: Adding Economic Guarantees to Blockchain Oracles. URl: https:\/\/github.com\/UMAprotocol\/whitepaper\/blob\/master\/UMA-DVM-oracle-whitepaper.pdf (2020)."},{"key":"e_1_3_2_1_105_1","volume-title":"URl: https:\/\/uniswap.org\/docs\/v2\/core-concepts\/oracles","author":"Oracle Uniswap","year":"2020","unstructured":"Uniswap. 2020. Uniswap Oracle . URl: https:\/\/uniswap.org\/docs\/v2\/core-concepts\/oracles ( 2020 ). Uniswap. 2020. Uniswap Oracle. URl: https:\/\/uniswap.org\/docs\/v2\/core-concepts\/oracles (2020)."},{"key":"e_1_3_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44774-1_5"},{"key":"e_1_3_2_1_107_1","volume-title":"Automated Market Makers for Decentralized Finance (DeFi). arXiv preprint arXiv:2009.01676","author":"Wang Yongge","year":"2020","unstructured":"Yongge Wang . 2020. Automated Market Makers for Decentralized Finance (DeFi). arXiv preprint arXiv:2009.01676 ( 2020 ). Yongge Wang. 2020. Automated Market Makers for Decentralized Finance (DeFi). arXiv preprint arXiv:2009.01676 (2020)."},{"key":"e_1_3_2_1_108_1","unstructured":"whiterabbit. 2020. Black Thursday for MakerDAO: $8.32 million was liquidated for 0 DAI.  whiterabbit. 2020. Black Thursday for MakerDAO: $8.32 million was liquidated for 0 DAI."},{"key":"e_1_3_2_1_109_1","volume-title":"Decentralized Common Knowledge Oracles. arXiv preprint arXiv:1912.01215","author":"Williams Austin K","year":"2019","unstructured":"Austin K Williams and Jack Peterson . 2019. Decentralized Common Knowledge Oracles. arXiv preprint arXiv:1912.01215 ( 2019 ). Austin K Williams and Jack Peterson. 2019. Decentralized Common Knowledge Oracles. arXiv preprint arXiv:1912.01215 (2019)."},{"key":"e_1_3_2_1_110_1","volume-title":"Denial of service in sensor networks. computer 35, 10","author":"Wood Anthony D","year":"2002","unstructured":"Anthony D Wood and John A Stankovic . 2002. Denial of service in sensor networks. computer 35, 10 ( 2002 ), 54--62. Anthony D Wood and John A Stankovic. 2002. Denial of service in sensor networks. computer 35, 10 (2002), 54--62."},{"key":"e_1_3_2_1_111_1","volume-title":"Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151","author":"Gavin Wood","year":"2014","unstructured":"Gavin Wood et al. 2014 . Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151 , 2014 (2014), 1--32. Gavin Wood et al. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151, 2014 (2014), 1--32."},{"key":"e_1_3_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1145\/141356.141366"},{"key":"e_1_3_2_1_113_1","volume-title":"CoFiX: A Computable Trading System. URl: https:\/\/cofix.io\/doc\/Trading_Compensation_CoFiX.pdf","year":"2020","unstructured":"Zaugust. 2020. CoFiX: A Computable Trading System. URl: https:\/\/cofix.io\/doc\/Trading_Compensation_CoFiX.pdf ( 2020 ). Zaugust. 2020. CoFiX: A Computable Trading System. URl: https:\/\/cofix.io\/doc\/Trading_Compensation_CoFiX.pdf (2020)."},{"key":"e_1_3_2_1_114_1","volume-title":"IIoT, and Blockchain technologies on supply chain transparency. Journal of Manufacturing Technology Management","author":"Zelbst Pamela J","year":"2019","unstructured":"Pamela J Zelbst , Kenneth W Green , Victor E Sower , and Philip L Bond . 2019. The impact of RFID , IIoT, and Blockchain technologies on supply chain transparency. Journal of Manufacturing Technology Management ( 2019 ). Pamela J Zelbst, Kenneth W Green, Victor E Sower, and Philip L Bond. 2019. The impact of RFID, IIoT, and Blockchain technologies on supply chain transparency. Journal of Manufacturing Technology Management (2019)."},{"key":"e_1_3_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978326"},{"key":"e_1_3_2_1_116_1","volume-title":"Harjasleen Malvai, Steven Goldfeder, and Ari Juels.","author":"Zhang Fan","year":"2019","unstructured":"Fan Zhang , Sai Krishna Deepak Maram , Harjasleen Malvai, Steven Goldfeder, and Ari Juels. 2019 . DECO : Liberating Web Data Using Decentralized Oracles for TLS. arXiv preprint arXiv:1909.00938 (2019). Fan Zhang, Sai Krishna Deepak Maram, Harjasleen Malvai, Steven Goldfeder, and Ari Juels. 2019. DECO: Liberating Web Data Using Decentralized Oracles for TLS. arXiv preprint arXiv:1909.00938 (2019)."},{"key":"e_1_3_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2921566"}],"event":{"name":"AFT '21: 3rd ACM Conference on Advances in Financial Technologies","location":"Arlington Virginia","acronym":"AFT '21","sponsor":["ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 3rd ACM Conference on Advances in Financial Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3479722.3480994","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3479722.3480994","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:19:00Z","timestamp":1750191540000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3479722.3480994"}},"subtitle":["oracles from the ground truth to market manipulation"],"short-title":[],"issued":{"date-parts":[[2021,9,26]]},"references-count":116,"alternative-id":["10.1145\/3479722.3480994","10.1145\/3479722"],"URL":"https:\/\/doi.org\/10.1145\/3479722.3480994","relation":{},"subject":[],"published":{"date-parts":[[2021,9,26]]},"assertion":[{"value":"2021-11-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}