{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:02:50Z","timestamp":1750309370161,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T00:00:00Z","timestamp":1743379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3,31]]},"DOI":"10.1145\/3672608.3707712","type":"proceedings-article","created":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T18:26:54Z","timestamp":1747247214000},"page":"386-388","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Decentralized Finance Withdrawal Delays"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1435-8508","authenticated-orcid":false,"given":"Jan","family":"Gorzny","sequence":"first","affiliation":[{"name":"Zircuit, Toronto, Ontario, Canada"}]}],"member":"320","published-online":{"date-parts":[[2025,5,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAPPS61106.2024.00008"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.2404.11281"},{"key":"e_1_3_2_1_3_1","volume-title":"Proxy Hunting: Understanding and Characterizing Proxy-based Upgradeable Smart Contracts in Blockchains. In 32nd USENIX Security Symposium, USENIX Security 2023","author":"William Edward","year":"2023","unstructured":"William Edward Bodell III, Sajad Meisami, and Yue Duan. 2023. Proxy Hunting: Understanding and Characterizing Proxy-based Upgradeable Smart Contracts in Blockchains. In 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9\u201311, 2023, Joseph A. Calandrino and Carmela Troncoso (Eds.). USENIX Association, 1829\u20131846. https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/bodell"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3532857"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-64322-8_1"},{"key":"e_1_3_2_1_6_1","volume-title":"Attacker drains $800K from DeFi protocol Sturdy Finance. https:\/\/cointelegraph.com\/news\/attacker-drains-800k-from-defi-protocol-sturdy-finance","author":"Reguerra Ezra","year":"2023","unstructured":"Ezra Reguerra. 2023. Attacker drains $800K from DeFi protocol Sturdy Finance. https:\/\/cointelegraph.com\/news\/attacker-drains-800k-from-defi-protocol-sturdy-finance Available at https:\/\/cointelegraph.com\/news\/attacker-drains-800k-from-defi-protocol-sturdy-finance. Accessed: December 8, 2023."},{"key":"e_1_3_2_1_7_1","volume-title":"ERC-20: Token Standard. https:\/\/eips.ethereum.org\/EIPS\/eip-20","author":"Vogelsteller Fabian","year":"2023","unstructured":"Fabian Vogelsteller and Vitalik Buterin. 2015. ERC-20: Token Standard. https:\/\/eips.ethereum.org\/EIPS\/eip-20 Available at https:\/\/eips.ethereum.org\/EIPS\/eip-20. Accessed 8 December 2023."},{"key":"e_1_3_2_1_8_1","volume-title":"Ethereum: A secure decentralised generalised transaction ledger. https:\/\/ethereum.github.io\/yellowpaper\/paper.pdf Ethereum Project Yellow Paper, https:\/\/ethereum.github.io\/yellowpaper\/paper.pdf.","author":"Wood Gavin","year":"2014","unstructured":"Gavin Wood. 2014. Ethereum: A secure decentralised generalised transaction ledger. https:\/\/ethereum.github.io\/yellowpaper\/paper.pdf Ethereum Project Yellow Paper, https:\/\/ethereum.github.io\/yellowpaper\/paper.pdf."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179435"}],"event":{"name":"SAC '25: 40th ACM\/SIGAPP Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Catania International Airport Catania Italy","acronym":"SAC '25"},"container-title":["Proceedings of the 40th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672608.3707712","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3672608.3707712","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:06:14Z","timestamp":1750291574000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672608.3707712"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,31]]},"references-count":9,"alternative-id":["10.1145\/3672608.3707712","10.1145\/3672608"],"URL":"https:\/\/doi.org\/10.1145\/3672608.3707712","relation":{},"subject":[],"published":{"date-parts":[[2025,3,31]]},"assertion":[{"value":"2025-05-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}