{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:10:46Z","timestamp":1750219846999,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,16]],"date-time":"2022-12-16T00:00:00Z","timestamp":1671148800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12,16]]},"DOI":"10.1145\/3581971.3581973","type":"proceedings-article","created":{"date-parts":[[2023,4,6]],"date-time":"2023-04-06T16:35:44Z","timestamp":1680798944000},"page":"10-15","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Understanding Security Audits on Blockchain"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2831-7424","authenticated-orcid":false,"given":"Zhiju","family":"Yang","sequence":"first","affiliation":[{"name":"Seattle University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4665-9014","authenticated-orcid":false,"given":"Gaoyuan","family":"Man","sequence":"additional","affiliation":[{"name":"Arizona State University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8213-287X","authenticated-orcid":false,"given":"Songqing","family":"Yue","sequence":"additional","affiliation":[{"name":"University of Wisconsin - Platteville, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,4,6]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"21260","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto S.","year":"2008","unstructured":"S. Nakamoto , \u201c Bitcoin: A peer-to-peer electronic cash system ,\u201d Decentralized Business Review , p. 21260 , 2008 . S. Nakamoto, \u201cBitcoin: A peer-to-peer electronic cash system,\u201d Decentralized Business Review, p. 21260, 2008.","journal-title":"Decentralized Business Review"},{"volume-title":"A next-generation smart contract and decentralized application platform","author":"Buterin V.","key":"e_1_3_2_1_2_1","unstructured":"V. Buterin , \u201c A next-generation smart contract and decentralized application platform ,\u201d white paper, vol. 3 , no. 37, 2014. V. Buterin , \u201cA next-generation smart contract and decentralized application platform,\u201d white paper, vol. 3, no. 37, 2014."},{"volume-title":"Solana Blockchain","year":"2022","key":"e_1_3_2_1_3_1","unstructured":"\u201c Solana Blockchain ,\u201d 2022 . https:\/\/solana.com\/. \u201cSolana Blockchain,\u201d 2022. https:\/\/solana.com\/."},{"volume-title":"Aptos Blockchain","year":"2022","key":"e_1_3_2_1_4_1","unstructured":"\u201c Aptos Blockchain ,\u201d 2022 . https:\/\/aptoslabs.com\/. \u201cAptos Blockchain,\u201d 2022. https:\/\/aptoslabs.com\/."},{"volume-title":"CoinMarketCap","year":"2022","key":"e_1_3_2_1_5_1","unstructured":"\u201c CoinMarketCap ,\u201d 2022 . https:\/\/coinmarketcap.com\/. \u201cCoinMarketCap,\u201d 2022. https:\/\/coinmarketcap.com\/."},{"volume-title":"Defi Llama","year":"2022","key":"e_1_3_2_1_6_1","unstructured":"\u201c Defi Llama ,\u201d 2022 . https:\/\/defillama.com\/. \u201cDefi Llama,\u201d 2022. https:\/\/defillama.com\/."},{"key":"e_1_3_2_1_7_1","volume-title":"Sereum: Protecting existing smart contracts against re-entrancy attacks","author":"Rodler M.","year":"1812","unstructured":"M. Rodler , W. Li , G. O. Karame , and L. Davi , \u201c Sereum: Protecting existing smart contracts against re-entrancy attacks ,\u201d arXiv preprint arXiv: 1812 .05934, 2018. M. Rodler, W. Li, G. O. Karame, and L. Davi, \u201cSereum: Protecting existing smart contracts against re-entrancy attacks,\u201d arXiv preprint arXiv:1812.05934, 2018."},{"volume-title":"National Vulnerability Database","year":"2022","key":"e_1_3_2_1_8_1","unstructured":"\u201c National Vulnerability Database ,\u201d 2022 . https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-10299 \u201cNational Vulnerability Database,\u201d 2022. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-10299"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3282373.3282419"},{"volume-title":"Chainalysis Mid-year Crypto Crime Update","year":"2022","key":"e_1_3_2_1_10_1","unstructured":"\u201c Chainalysis Mid-year Crypto Crime Update ,\u201d 2022 . https:\/\/blog.chainalysis.com\/reports\/crypto-crime-midyear-update-2022\/. \u201cChainalysis Mid-year Crypto Crime Update,\u201d 2022. https:\/\/blog.chainalysis.com\/reports\/crypto-crime-midyear-update-2022\/."},{"volume-title":"Ronin Network Hack","year":"2022","key":"e_1_3_2_1_11_1","unstructured":"\u201c Ronin Network Hack ,\u201d 2022 . https:\/\/rekt.news\/ronin-rekt\/. \u201cRonin Network Hack,\u201d 2022. https:\/\/rekt.news\/ronin-rekt\/."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/WETSEB.2019.00008"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243780"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3194113.3194115"},{"volume-title":"Mythril","year":"2022","key":"e_1_3_2_1_15_1","unstructured":"\u201c Mythril ,\u201d 2022 . https:\/\/github.com\/ConsenSys\/mythril. \u201cMythril,\u201d 2022. https:\/\/github.com\/ConsenSys\/mythril."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3415298"},{"key":"e_1_3_2_1_17_1","volume-title":"Libra Assoc","author":"Blackshear S.","year":"2019","unstructured":"S. Blackshear , E. Cheng , D. L. Dill , V. Gao , B. Maurer , T. Nowacki , A. Pott , S. Qadeer , D. R. Rain , S. Sezer , , \u201c Move: A language with programmable resources ,\u201d Libra Assoc , 2019 . S. Blackshear, E. Cheng, D. L. Dill, V. Gao, B. Maurer, T. Nowacki, A. Pott, S. Qadeer, D. R. Rain, S. Sezer, , \u201cMove: A language with programmable resources,\u201d Libra Assoc, 2019."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-C.2017.150"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.3390\/math10060949"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWorkshops49005.2020.9145151"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2020.3016821"},{"volume-title":"Token Sniffer","year":"2022","key":"e_1_3_2_1_22_1","unstructured":"\u201c Token Sniffer ,\u201d 2022 . https:\/\/tokensniffer.com\/. \u201cToken Sniffer,\u201d 2022. https:\/\/tokensniffer.com\/."},{"volume-title":"Rug Pull Detector","year":"2022","key":"e_1_3_2_1_23_1","unstructured":"\u201c Rug Pull Detector ,\u201d 2022 . http:\/\/rugpulldetector.com\/. \u201cRug Pull Detector,\u201d 2022. http:\/\/rugpulldetector.com\/."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900656"},{"volume-title":"Discover the World's Top Smart Contract Auditing Companies","year":"2022","key":"e_1_3_2_1_25_1","unstructured":"\u201c Discover the World's Top Smart Contract Auditing Companies ,\u201d 2022 . https:\/\/smartcontractaudits.com\/audit-providers\/companies\/1. \u201cDiscover the World's Top Smart Contract Auditing Companies,\u201d 2022. https:\/\/smartcontractaudits.com\/audit-providers\/companies\/1."},{"volume-title":"CertiK Security Audit","year":"2022","key":"e_1_3_2_1_26_1","unstructured":"\u201c CertiK Security Audit ,\u201d 2022 . https:\/\/www.certik.com\/products\/security-audit. \u201cCertiK Security Audit,\u201d 2022. https:\/\/www.certik.com\/products\/security-audit."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54455-6_8"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3316481"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.020"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2942301"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183440.3183495"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238177"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32409-4_18"},{"key":"e_1_3_2_1_34_1","first-page":"1333","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Krupp J.","year":"2018","unstructured":"J. Krupp and C. Rossow , \u201c teEther: Gnawing at ethereum to automatically exploit smart contracts ,\u201d in 27th USENIX Security Symposium (USENIX Security 18) , pp. 1317\u2013 1333 , 2018 . J. Krupp and C. Rossow, \u201cteEther: Gnawing at ethereum to automatically exploit smart contracts,\u201d in 27th USENIX Security Symposium (USENIX Security 18), pp. 1317\u20131333, 2018."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"e_1_3_2_1_36_1","first-page":"1","article-title":"Zeus: analyzing safety of smart contracts","author":"Kalra S.","year":"2018","unstructured":"S. Kalra , S. Goel , M. Dhawan , and S. Sharma , \u201c Zeus: analyzing safety of smart contracts .,\u201d in Ndss , pp. 1 \u2013 12 , 2018 . S. Kalra, S. Goel, M. Dhawan, and S. Sharma, \u201cZeus: analyzing safety of smart contracts.,\u201d in Ndss, pp. 1\u201312, 2018.","journal-title":"Ndss"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2018.00022"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3264591"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96145-3_4"},{"key":"e_1_3_2_1_40_1","unstructured":"Vyper Documentation \u201d 2022. https:\/\/vyper.readthedocs.io\/en\/stable\/.  Vyper Documentation \u201d 2022. https:\/\/vyper.readthedocs.io\/en\/stable\/."},{"volume-title":"Ethereum Smart Contract Security Best Practices","year":"2022","key":"e_1_3_2_1_41_1","unstructured":"\u201c Ethereum Smart Contract Security Best Practices ,\u201d 2022 . https:\/\/consensys.github.io\/smart-contract-best-practices\/. \u201cEthereum Smart Contract Security Best Practices,\u201d 2022. https:\/\/consensys.github.io\/smart-contract-best-practices\/."},{"volume-title":"Thinking About Smart Contract Security","year":"2022","key":"e_1_3_2_1_42_1","unstructured":"\u201c Thinking About Smart Contract Security ,\u201d 2022 . https:\/\/blog.ethereum.org\/2016\/06\/19\/thinking-smart-contract-security. \u201cThinking About Smart Contract Security,\u201d 2022. https:\/\/blog.ethereum.org\/2016\/06\/19\/thinking-smart-contract-security."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53357-4_6"},{"volume-title":"SolidProof","year":"2022","key":"e_1_3_2_1_44_1","unstructured":"\u201c SolidProof ,\u201d 2022 . https:\/\/app.solidproof.io\/projects. \u201cSolidProof,\u201d 2022. https:\/\/app.solidproof.io\/projects."},{"volume-title":"Common Vulnerabilities and Exposures (CVE)","year":"2022","key":"e_1_3_2_1_45_1","unstructured":"\u201c Common Vulnerabilities and Exposures (CVE) ,\u201d 2022 . https:\/\/en.wikipedia.org\/wiki\/Common Vulnerabilities and Exposures . \u201cCommon Vulnerabilities and Exposures (CVE),\u201d 2022. https:\/\/en.wikipedia.org\/wiki\/Common Vulnerabilities and Exposures."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3391195"},{"volume-title":"NVD Vulnerability Severity Ratings","year":"2022","key":"e_1_3_2_1_47_1","unstructured":"\u201c NVD Vulnerability Severity Ratings ,\u201d 2022 . https:\/\/nvd.nist.gov\/vuln-metrics\/cvss \u201cNVD Vulnerability Severity Ratings,\u201d 2022. https:\/\/nvd.nist.gov\/vuln-metrics\/cvss"}],"event":{"name":"ICBTA 2022: 2022 5th International Conference on Blockchain Technology and Applications","acronym":"ICBTA 2022","location":"Xi'an China"},"container-title":["Proceedings of the 2022 5th International Conference on Blockchain Technology and Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3581971.3581973","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3581971.3581973","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:58Z","timestamp":1750178818000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3581971.3581973"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,16]]},"references-count":47,"alternative-id":["10.1145\/3581971.3581973","10.1145\/3581971"],"URL":"https:\/\/doi.org\/10.1145\/3581971.3581973","relation":{},"subject":[],"published":{"date-parts":[[2022,12,16]]},"assertion":[{"value":"2023-04-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}