{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T18:48:51Z","timestamp":1755802131243,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,20]],"date-time":"2023-10-20T00:00:00Z","timestamp":1697760000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,20]]},"DOI":"10.1145\/3650400.3650609","type":"proceedings-article","created":{"date-parts":[[2024,4,17]],"date-time":"2024-04-17T08:33:18Z","timestamp":1713342798000},"page":"1239-1244","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["EIP Security Analysis: Application Program Standards, Attack Events, and Security Vulnerabilities"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-5922-807X","authenticated-orcid":false,"given":"Xueyan","family":"Tang","sequence":"first","affiliation":[{"name":"Salus Security, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-2982-9289","authenticated-orcid":false,"given":"Yuying","family":"Du","sequence":"additional","affiliation":[{"name":"Salus Security, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-9007-2995","authenticated-orcid":false,"given":"Zhengyang","family":"Wang","sequence":"additional","affiliation":[{"name":"Salus Security, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-4309-7823","authenticated-orcid":false,"given":"Shawn","family":"Chong","sequence":"additional","affiliation":[{"name":"Salus Security, China"}]}],"member":"320","published-online":{"date-parts":[[2024,4,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3475992.3476000"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3381036"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3528226.3528370"},{"key":"e_1_3_2_1_4_1","unstructured":"Retrieved August 17 2023 from https:\/\/ethereum.org\/zh\/eips\/."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3582882"},{"key":"e_1_3_2_1_6_1","volume-title":"Chen Feng and Victor C. M. Leung","author":"Cai Wei","year":"2018","unstructured":"Wei Cai, Zehua Wang, Jason B. Ernst, Zhen Hong, Chen Feng and Victor C. M. Leung 2018. Decentralized applications: The blockchain-empowered software system. IEEE access, 6, 53019-53033."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-020-9284-9"},{"key":"e_1_3_2_1_8_1","unstructured":"Retrieved May 04 2023 from https:\/\/ethereum.org\/zh\/developers\/docs\/standards\/tokens\/erc-20\/."},{"key":"e_1_3_2_1_9_1","unstructured":"Retrieved Jan 21 2023 from https:\/\/ethereum.org\/zh\/developers\/docs\/standards\/tokens\/erc-721\/."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain53845.2021.00034"},{"key":"e_1_3_2_1_11_1","unstructured":"Tim Roughgarden. 2020. Retrieved 1 Dec 2020 from https:\/\/arxiv.org\/abs\/2012.00854."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479722.3480993"},{"key":"e_1_3_2_1_13_1","unstructured":"Ian C. Moore Jagdeep Sidhu. 2020. Retrieved 7 May 2021 from https:\/\/arxiv.org\/abs\/2105.03521."},{"key":"e_1_3_2_1_14_1","unstructured":"Sarah Azouvi Guy Goren Lioba Heimbach Alexander Hicks. 2023. Retrieved 8 Aug 2023 from https:\/\/arxiv.org\/abs\/2304.11478."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCCC58608.2023.10176712"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/BCCA55292.2022.9922213"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-31108-6_9"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","unstructured":"R. B. Fekih M. Lahami M. Jmaiel A. Ben Ali and P. Genestier. 2022. Towards Model checking approach for Smart contract validation in the EIP-1559 Ethereum. 2022 IEEE 46th Annual Computers Software and Applications Conference (COMPSAC). Los Alamitos CA 83-88 doi: 10.1109\/COMPSAC54236.2022.00020.","DOI":"10.1109\/COMPSAC54236.2022.00020"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain53845.2021.00033"},{"key":"e_1_3_2_1_20_1","unstructured":"Kaili Wang Qinchen Wang Dan Boneh. 2022. Retrieved 10 Oct 2022 from https:\/\/arxiv.org\/abs\/2208.00543"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSP51677.2021.9357605"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-8045-4_5"},{"key":"e_1_3_2_1_23_1","volume-title":"The role of the erc-20 token standard in a financial revolution: the case of initial coin offerings","author":"P.","year":"2018","unstructured":"Cuffe, P. 2018. The role of the erc-20 token standard in a financial revolution: the case of initial coin offerings. IEC-IEEE-KATS Academic Challenge, Busan, Korea (October 2018), 22-23."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SDS49854.2020.9143877"},{"key":"e_1_3_2_1_25_1","unstructured":"Nikolay Ivanov Qiben Yan. 2022. Retrieved 17 Sep 2022 from https:\/\/arxiv.org\/abs\/2209.08370."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-66046-8_40"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TENSYMP52854.2021.9550913"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-8045-4_3"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3560264"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-63958-0_42"}],"event":{"name":"EITCE 2023: 2023 7th International Conference on Electronic Information Technology and Computer Engineering","acronym":"EITCE 2023","location":"Xiamen China"},"container-title":["Proceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3650400.3650609","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3650400.3650609","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T05:08:25Z","timestamp":1755752905000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3650400.3650609"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,20]]},"references-count":30,"alternative-id":["10.1145\/3650400.3650609","10.1145\/3650400"],"URL":"https:\/\/doi.org\/10.1145\/3650400.3650609","relation":{},"subject":[],"published":{"date-parts":[[2023,10,20]]},"assertion":[{"value":"2024-04-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}