{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:19:01Z","timestamp":1750220341038,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T00:00:00Z","timestamp":1639526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,12,15]]},"DOI":"10.1145\/3508072.3508225","type":"proceedings-article","created":{"date-parts":[[2022,4,13]],"date-time":"2022-04-13T17:01:56Z","timestamp":1649869316000},"page":"803-807","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy Breaches in Smart Contract due to Solidity Language and its Protection"],"prefix":"10.1145","author":[{"given":"Nazia","family":"Abrar","sequence":"first","affiliation":[{"name":"PAF-Karachi Institute of Economics and Technology, Pakistan"}]},{"given":"Muhammad Faraz","family":"Hyder","sequence":"additional","affiliation":[{"name":"NED University of Engineering and Technology, Pakistan"}]},{"given":"Muhammad","family":"Kamran","sequence":"additional","affiliation":[{"name":"NED University of Engineering and Technology, Pakistan"}]},{"given":"Muhammad Mubashir","family":"Khan","sequence":"additional","affiliation":[{"name":"NED University of Engineering and Technology, Pakistan"}]}],"member":"320","published-online":{"date-parts":[[2022,4,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.35"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44381-1_24"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88313-5_13"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00050"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00023"},{"key":"e_1_3_2_1_6_1","volume-title":"Arbitrum: Scalable, private smart contracts. In 27th {USENIX} Security Symposium ({USENIX} Security 18). 1353\u20131370.","author":"Kalodner Harry","year":"2018","unstructured":"Harry Kalodner , Steven Goldfeder , Xiaoqi Chen , S\u00a0Matthew Weinberg , and Edward\u00a0 W Felten . 2018 . Arbitrum: Scalable, private smart contracts. In 27th {USENIX} Security Symposium ({USENIX} Security 18). 1353\u20131370. Harry Kalodner, Steven Goldfeder, Xiaoqi Chen, S\u00a0Matthew Weinberg, and Edward\u00a0W Felten. 2018. Arbitrum: Scalable, private smart contracts. In 27th {USENIX} Security Symposium ({USENIX} Security 18). 1353\u20131370."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_25"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.55"},{"volume-title":"22nd {USENIX} Security Symposium ({USENIX} Security 13). 321\u2013336.","author":"Kreuter Ben","key":"e_1_3_2_1_9_1","unstructured":"Ben Kreuter , Abhi Shelat , Benjamin Mood , and Kevin Butler . 2013. {PCF} : A Portable Circuit Format for Scalable Two-Party Secure Computation . In 22nd {USENIX} Security Symposium ({USENIX} Security 13). 321\u2013336. Ben Kreuter, Abhi Shelat, Benjamin Mood, and Kevin Butler. 2013. {PCF}: A Portable Circuit Format for Scalable Two-Party Secure Computation. In 22nd {USENIX} Security Symposium ({USENIX} Security 13). 321\u2013336."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.29"},{"key":"e_1_3_2_1_11_1","volume-title":"International Conference on Financial Cryptography. Springer, 349\u2013378","author":"Miller S","year":"2000","unstructured":"Mark\u00a0 S Miller , Chip Morningstar , and Bill Frantz . 2000 . Capability-based financial instruments . In International Conference on Financial Cryptography. Springer, 349\u2013378 . Mark\u00a0S Miller, Chip Morningstar, and Bill Frantz. 2000. Capability-based financial instruments. In International Conference on Financial Cryptography. Springer, 349\u2013378."},{"key":"e_1_3_2_1_12_1","volume-title":"What is bitcoin. Sveri gesRiksbankEconomicReview 2014","author":"Segendorf Bj\u00f6rn","year":"2014","unstructured":"Bj\u00f6rn Segendorf . 2014. What is bitcoin. Sveri gesRiksbankEconomicReview 2014 ( 2014 ), 2\u201371. Bj\u00f6rn Segendorf. 2014. What is bitcoin. Sveri gesRiksbankEconomicReview 2014 (2014), 2\u201371."},{"key":"e_1_3_2_1_13_1","volume-title":"Formalizing and securing relationships on public networks. First monday","author":"Szabo Nick","year":"1997","unstructured":"Nick Szabo . 1997. Formalizing and securing relationships on public networks. First monday ( 1997 ). Nick Szabo. 1997. Formalizing and securing relationships on public networks. First monday (1997)."},{"key":"e_1_3_2_1_14_1","volume-title":"Deepchain: Auditable and privacy-preserving deep learning with blockchain-based incentive","author":"Weng Jiasi","year":"2019","unstructured":"Jiasi Weng , Jian Weng , Jilian Zhang , Ming Li , Yue Zhang , and Weiqi Luo . 2019 . Deepchain: Auditable and privacy-preserving deep learning with blockchain-based incentive . IEEE Transactions on Dependable and Secure Computing ( 2019). Jiasi Weng, Jian Weng, Jilian Zhang, Ming Li, Yue Zhang, and Weiqi Luo. 2019. Deepchain: Auditable and privacy-preserving deep learning with blockchain-based incentive. IEEE Transactions on Dependable and Secure Computing (2019)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/829515.830549"},{"key":"e_1_3_2_1_16_1","volume-title":"Enigma: Decentralized computation platform with guaranteed privacy. arXiv preprint arXiv:1506.03471(2015).","author":"Zyskind Guy","year":"2015","unstructured":"Guy Zyskind , Oz Nathan , and Alex Pentland . 2015 . Enigma: Decentralized computation platform with guaranteed privacy. arXiv preprint arXiv:1506.03471(2015). Guy Zyskind, Oz Nathan, and Alex Pentland. 2015. Enigma: Decentralized computation platform with guaranteed privacy. arXiv preprint arXiv:1506.03471(2015)."}],"event":{"name":"ICFNDS 2021: The 5th International Conference on Future Networks & Distributed Systems","acronym":"ICFNDS 2021","location":"Dubai United Arab Emirates"},"container-title":["The 5th International Conference on Future Networks &amp; Distributed Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508072.3508225","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508072.3508225","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:31Z","timestamp":1750191151000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508072.3508225"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,15]]},"references-count":16,"alternative-id":["10.1145\/3508072.3508225","10.1145\/3508072"],"URL":"https:\/\/doi.org\/10.1145\/3508072.3508225","relation":{},"subject":[],"published":{"date-parts":[[2021,12,15]]},"assertion":[{"value":"2022-04-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}