{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:49:16Z","timestamp":1774367356673,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":148,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T00:00:00Z","timestamp":1727654400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,30]]},"DOI":"10.1145\/3678890.3678894","type":"proceedings-article","created":{"date-parts":[[2024,9,29]],"date-time":"2024-09-29T22:23:36Z","timestamp":1727648616000},"page":"298-316","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Security of Cross-chain Bridges: Attack Surfaces, Defenses, and Open Problems"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-9370-2248","authenticated-orcid":false,"given":"Mengya","family":"Zhang","sequence":"first","affiliation":[{"name":"The Ohio State University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4646-7146","authenticated-orcid":false,"given":"Xiaokuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"George Mason University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7585-1075","authenticated-orcid":false,"given":"Yinqian","family":"Zhang","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6527-5994","authenticated-orcid":false,"given":"Zhiqiang","family":"Lin","sequence":"additional","affiliation":[{"name":"The Ohio State University, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2024,9,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Aave. 2023. Aave Document Hub. https:\/\/docs.aave.com\/hub\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Aave. 2023. Aave Governance Cross-Chain Bridges. https:\/\/github.com\/aave\/governance-crosschain-bridges."},{"key":"e_1_3_2_1_3_1","unstructured":"Allbridge. 2023. Allbridge Docs. https:\/\/docs.allbridge.io\/allbridge-overview\/networks-and-tokens."},{"key":"e_1_3_2_1_4_1","volume-title":"Sok: Security and privacy of blockchain interoperability. Authorea Preprints","author":"Augusto Andr\u00e9","year":"2023","unstructured":"Andr\u00e9 Augusto, Rafael Belchior, Miguel Correia, Andr\u00e9 Vasconcelos, Luyao Zhang, and Thomas Hardjono. 2023. Sok: Security and privacy of blockchain interoperability. Authorea Preprints (2023)."},{"key":"e_1_3_2_1_5_1","unstructured":"B2Broker. 2022. How Do Liquidity Pools Work in Crypto?https:\/\/b2broker.com\/news\/how-do-liquidity-pools-work-in-crypto\/."},{"key":"e_1_3_2_1_6_1","volume-title":"Enabling blockchain innovations with pegged sidechains. URL: http:\/\/www. opensciencereview. com\/papers\/123\/enablingblockchain-innovations-with-pegged-sidechains 72","author":"Back Adam","year":"2014","unstructured":"Adam Back, Matt Corallo, Luke Dashjr, Mark Friedenbach, Gregory Maxwell, Andrew Miller, Andrew Poelstra, Jorge Tim\u00f3n, and Pieter Wuille. 2014. Enabling blockchain innovations with pegged sidechains. URL: http:\/\/www. opensciencereview. com\/papers\/123\/enablingblockchain-innovations-with-pegged-sidechains 72 (2014), 201\u2013224."},{"key":"e_1_3_2_1_7_1","unstructured":"BanklessTimes. 2022. Crypto platform EVODeFi loses $320K in hack. https:\/\/www.banklesstimes.com\/news\/2022\/03\/22\/crypto-platform-evodefi-loses-dollar320k-in-hack\/."},{"key":"e_1_3_2_1_8_1","volume-title":"Hephaestus: Modeling, Analysis, and Performance Evaluation of Cross-Chain Transactions","author":"Belchior Rafael","year":"2023","unstructured":"Rafael Belchior, Peter Somogyvari, Jonas Pfannschmidt, Andr\u00e9 Vasconcelos, and Miguel Correia. 2023. Hephaestus: Modeling, Analysis, and Performance Evaluation of Cross-Chain Transactions. IEEE Transactions on Reliability (2023)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3471140"},{"key":"e_1_3_2_1_10_1","unstructured":"Bitcoin.com. 2022. Binance-Backed Blockchain Completes Hard Fork to Mitigate Future Cross-Chain Bridge Hacks. https:\/\/news.bitcoin.com\/binance-backed-blockchain-completes-hard-fork-to-mitigate-future-cross-chain-bridge-hacks\/."},{"key":"e_1_3_2_1_11_1","unstructured":"The Block. 2022. Hacker drains $2 million from QAN platform bridge token slumps 94%. https:\/\/www.theblock.co\/post\/176118\/hacker-drains-1-million-from-qanplatform-bridge-token-slumps-94."},{"key":"e_1_3_2_1_12_1","unstructured":"Blockchainhub. 2023. Decentralized Applications \u2013 dApps. https:\/\/blockchainhub.net\/decentralized-applications-dapps\/."},{"key":"e_1_3_2_1_13_1","unstructured":"LI.FI Blog. 2022. LI.FI Smart Contract Vulnerability Post Mortem. https:\/\/blog.li.fi\/20th-march-the-exploit-e9e1c5c03eb9."},{"key":"e_1_3_2_1_14_1","unstructured":"BNB. 2023. Binance Smart Chain. https:\/\/github.com\/bnb-chain\/whitepaper\/blob\/master\/WHITEPAPER.md."},{"key":"e_1_3_2_1_15_1","unstructured":"BoringDao. 2023. BoringDao Docs. https:\/\/docs.boringdao.com\/."},{"key":"e_1_3_2_1_16_1","volume-title":"Towards atomic cross-chain token transfers: State of the art and open questions within tast","author":"Borkowski Michael","year":"2018","unstructured":"Michael Borkowski, Daniel McDonald, Christoph Ritzer, and Stefan Schulte. 2018. Towards atomic cross-chain token transfers: State of the art and open questions within tast. Distributed Systems Group TU Wien (Technische Universit at Wien), Report 8 (2018)."},{"key":"e_1_3_2_1_17_1","unstructured":"Anyswap Bridge. 2023. Anyswap DEX User Guide. https:\/\/anyswap-faq.readthedocs.io\/en\/latest\/index.html."},{"key":"e_1_3_2_1_18_1","unstructured":"Cross-Chain Bridge. 2023. Cross-Chain Bridge Docs - Conneted Networks. https:\/\/docs.crosschainbridge.org\/connected-networks."},{"key":"e_1_3_2_1_19_1","unstructured":"Hyphen Bridge. 2023. Hyphen Bridge. https:\/\/hyphen.biconomy.io\/bridge."},{"key":"e_1_3_2_1_20_1","unstructured":"Orbit Bridge. 2023. Orbit Bridge FAQs. https:\/\/bridge.orbitchain.io\/questions."},{"key":"e_1_3_2_1_21_1","unstructured":"Plasma Bridge. 2023. Plasma Bridge. https:\/\/docs.polygon.technology\/docs\/develop\/ethereum-polygon\/plasma\/getting-started\/."},{"key":"e_1_3_2_1_22_1","unstructured":"Portal\u00a0Token Bridge. 2023. Portal Token Bridge - Introduction. https:\/\/docs.wormhole.com\/wormhole\/."},{"key":"e_1_3_2_1_23_1","unstructured":"Synapse Bridge. 2023. Welcome to Synapse. https:\/\/docs.synapseprotocol.com."},{"key":"e_1_3_2_1_24_1","unstructured":"Wormhole Bridge. 2023. Wormhole Bridge. https:\/\/wormholebridge.com\/."},{"key":"e_1_3_2_1_25_1","volume-title":"Chain interoperability. R3 Research Paper 9","author":"Buterin Vitalik","year":"2016","unstructured":"Vitalik Buterin. 2016. Chain interoperability. R3 Research Paper 9 (2016)."},{"key":"e_1_3_2_1_26_1","unstructured":"Satellite by Alexar. 2023. Satellite by Alexar Docs. https:\/\/docs.axelar.dev\/resources\/mainnet."},{"key":"e_1_3_2_1_27_1","unstructured":"Horizon by Harmony. 2023. Harmony ONE-ETH Bridge. https:\/\/bridge.harmony.one\/busd."},{"key":"e_1_3_2_1_28_1","unstructured":"Solana Cashio. 2023. Solana Cashio. https:\/\/www.solanacash.io."},{"key":"e_1_3_2_1_29_1","unstructured":"Celer cBridge. 2023. Celer cBridge. https:\/\/cbridge.celer.network\/1\/56\/USDC."},{"key":"e_1_3_2_1_30_1","unstructured":"Celer cBridge. 2023. State Guardian Network. https:\/\/cbridge-docs.celer.network\/introduction\/state-guardian-network."},{"key":"e_1_3_2_1_31_1","unstructured":"Celer cBridge. 2023. Welcome to cBridge. https:\/\/cbridge-docs.celer.network."},{"key":"e_1_3_2_1_32_1","unstructured":"Cennznet. 2023. BLOCKCHAIN FOR THE OPEN METAVERSE. https:\/\/cennz.net."},{"key":"e_1_3_2_1_33_1","unstructured":"CertiK. 2021. PolyNetwork Attack Analysis. https:\/\/certik.medium.com\/polynetwork-hack-analysis-a86513f2a730."},{"key":"e_1_3_2_1_34_1","unstructured":"CertiK. 2022. Nomad Bridge Exploit Incident Analysis. https:\/\/www.certik.com\/resources\/blog\/28fMavD63CpZJOKOjb9DX3-nomad-bridge-exploit-incident-analysis."},{"key":"e_1_3_2_1_35_1","unstructured":"Certik. 2023. CertiK Blockchain Security Leaderboard. https:\/\/www.certik.com\/."},{"key":"e_1_3_2_1_36_1","unstructured":"Cross chain Loans. 2022. Cross-chain Loans - Decentralized lending marketplace across blockchains. https:\/\/crosschain.loans\/."},{"key":"e_1_3_2_1_37_1","volume-title":"Lessons from the Wormhole Exploit: Smart Contract Vulnerabilities Introduce Risk","year":"2022","unstructured":"Chainalysis. 2022. Lessons from the Wormhole Exploit: Smart Contract Vulnerabilities Introduce Risk; Blockchains\u2019 Transparency Makes It Hard for Bad Actors to Cash Out. https:\/\/blog.chainalysis.com\/reports\/wormhole-hack-february-2022\/."},{"key":"e_1_3_2_1_38_1","unstructured":"ChainBridge. 2023. ChainBridge Overview. https:\/\/chainbridge.chainsafe.io."},{"key":"e_1_3_2_1_39_1","volume-title":"Chainlink: Blockchain Oracles for Hybrid Smart Contracts. https:\/\/chain.link.","year":"2023","unstructured":"Chainlink. 2023. Chainlink: Blockchain Oracles for Hybrid Smart Contracts. https:\/\/chain.link."},{"key":"e_1_3_2_1_40_1","volume-title":"Chainlink: Blockchain Oracles for Hybrid Smart Contracts. https:\/\/chain.link\/cross-chain.","year":"2023","unstructured":"Chainlink. 2023. Chainlink: Blockchain Oracles for Hybrid Smart Contracts. https:\/\/chain.link\/cross-chain."},{"key":"e_1_3_2_1_41_1","unstructured":"ChainPort. 2023. ChainPort Docs. https:\/\/docs.chainport.io\/chainport\/chainport-features."},{"key":"e_1_3_2_1_42_1","unstructured":"Chainspot. 2023. Soy Bridge. https:\/\/chainspot.io\/bridge\/soy-bridge."},{"key":"e_1_3_2_1_43_1","unstructured":"ChainSwap. 2023. The cross-chain hub for all ecosystems. https:\/\/chainswap.com."},{"key":"e_1_3_2_1_44_1","unstructured":"CoinCodeCap. 2022. Hamster Coin Rugged: Reportedly 1 730 BNB Lost. https:\/\/coincodecap.com\/hamster-coin-rugged-reportedly-1730-bnb-lost."},{"key":"e_1_3_2_1_45_1","volume-title":"Warns Congressman. https:\/\/www.coindesk.com\/policy\/2022\/08\/18\/treasury-tornado-cash-sanctions-are-unprecedented-warns-us-congressman\/.","year":"2022","unstructured":"Coindesk. 2022. US Treasury\u2019s Tornado Cash Sanctions Are \u2018Unprecedented,\u2019 Warns Congressman. https:\/\/www.coindesk.com\/policy\/2022\/08\/18\/treasury-tornado-cash-sanctions-are-unprecedented-warns-us-congressman\/."},{"key":"e_1_3_2_1_46_1","unstructured":"Coindesk. 2023. What Are Wrapped Tokens?https:\/\/www.coindesk.com\/learn\/what-are-wrapped-tokens\/."},{"key":"e_1_3_2_1_47_1","unstructured":"CoinGeek. 2021. Solana sees first rug pull: Luna Yield disappears with $6.7M in digital currency. https:\/\/coingeek.com\/solana-sees-first-rug-pull-luna-yield-disappears-with-6-7m-in-digital-currency\/."},{"key":"e_1_3_2_1_48_1","unstructured":"CoinYuppie. 2022. In-depth analysis of four types of cross-chain bridges and their risks. https:\/\/coinyuppie.com\/in-depth-analysis-of-four-types-of-cross-chain-bridges-and-their-risks\/."},{"key":"e_1_3_2_1_49_1","unstructured":"Connext. 2021. nxtp: A simpler xchain protocol. https:\/\/blog.connext.network\/nxtp-a-simpler-xchain-protocol-88760697ea04."},{"key":"e_1_3_2_1_50_1","unstructured":"Blockchain Council. 2023. Blockchain & Role of P2P Network. https:\/\/www.blockchain-council.org\/blockchain\/blockchain-role-of-p2p-network\/."},{"key":"e_1_3_2_1_51_1","unstructured":"CryptoBriefing. 2022. BNB Chain\u2019s $566M Hack: Binance Network\u2019s Major Bridge Attack Unpacked. https:\/\/cryptobriefing.com\/bnb-chain-566m-hack-binance-networks-major-bridge-attack-unpacked\/."},{"key":"e_1_3_2_1_52_1","unstructured":"Cryptonomist. 2022. Rubic DEX loses $1 million in crypto to hacker attack. https:\/\/en.cryptonomist.ch\/2022\/11\/03\/dex-rubic-loses-1-million-crypto\/."},{"key":"e_1_3_2_1_53_1","unstructured":"Coin Culture. 2021. White Hat Saves Polygon from $850 Million Hack. https:\/\/coinculture.com\/au\/tech\/white-hat-saves-polygon-from-850million-hack\/."},{"key":"e_1_3_2_1_54_1","unstructured":"Axie DAO. 2023. We are the Axie DAO. https:\/\/axiedao.org\/."},{"key":"e_1_3_2_1_55_1","unstructured":"DappRadar. 2022. Staking - RADAR Token - DappRadar. https:\/\/dappradar.com\/token\/staking."},{"key":"e_1_3_2_1_56_1","unstructured":"DappRadar. 2024. Dapp Industry Hits Record 5.3 Million dUAW. https:\/\/dappradar.com\/blog\/dapp-industry-hits-record-5-3-million-duaw\/."},{"key":"e_1_3_2_1_57_1","unstructured":"Rekt Database. 2023. Bridge Attacks. https:\/\/de.fi\/rekt-database."},{"key":"e_1_3_2_1_58_1","unstructured":"REKT Database. 2023. Multichain Attack. https:\/\/de.fi\/rekt-database\/multichain."},{"key":"e_1_3_2_1_59_1","unstructured":"Rekt Database. 2024. Biggest Crypto Hacks & Scams - DeFi REKT Database. https:\/\/de.fi\/rekt-database."},{"key":"e_1_3_2_1_60_1","unstructured":"DefiLlama. 2024. DefiLlama - Hacks. https:\/\/defillama.com\/hacks."},{"key":"e_1_3_2_1_61_1","unstructured":"DEFIYIELD.App. 2022. Wormhole exploit: the second-largest DeFi hack ever. https:\/\/blog.defiyield.app\/wormhole-exploit-the-second-largest-defi-hack-ever-237ed5c81670."},{"key":"e_1_3_2_1_62_1","unstructured":"Ethereum. 2023. ERC-20 TOKEN STANDARD. https:\/\/ethereum.org\/en\/developers\/docs\/standards\/tokens\/erc-20\/."},{"key":"e_1_3_2_1_63_1","unstructured":"Ethereum. 2023. GAS AND FEES. https:\/\/ethereum.org\/en\/developers\/docs\/gas\/."},{"key":"e_1_3_2_1_64_1","unstructured":"Ethereum. 2023. INTRODUCTION TO SMART CONTRACTS. https:\/\/ethereum.org\/en\/developers\/docs\/smart-contracts\/."},{"key":"e_1_3_2_1_65_1","unstructured":"Ethereum. 2023. Welcome to Ethereum. https:\/\/ethereum.org\/en\/."},{"key":"e_1_3_2_1_66_1","unstructured":"Etherscan. 2022. Ethereum Transaction Hash (Txhash) Details. https:\/\/etherscan.io\/tx\/0xa5fe9d044e4f3e5aa5bc4c0709333cd2190cba0f4e7f16bcf73f49f83e4a5460."},{"key":"e_1_3_2_1_67_1","unstructured":"Etherscan. 2023. Address. https:\/\/etherscan.io\/address\/0xa8c83b1b30291a3a1a118058b5445cc83041cd9d."},{"key":"e_1_3_2_1_68_1","unstructured":"Etherscan. 2023. Null Address. https:\/\/etherscan.io\/address\/0x0000000000000000000000000000000000000000."},{"key":"e_1_3_2_1_69_1","unstructured":"Binance Feed. 2022. Rubic Lost More Than $1.4 Million Due To The Hack. https:\/\/www.binance.com\/en\/feed\/post\/134659."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/wetseb.2019.00008"},{"key":"e_1_3_2_1_71_1","unstructured":"Dezentralized Finance. 2024. Cross Chain Bridges. https:\/\/dezentralizedfinance.com\/cross-chain-bridges\/."},{"key":"e_1_3_2_1_72_1","unstructured":"Fantom Foundation. 2023. Intro to Fantom. https:\/\/fantom.foundation\/intro-to-fantom\/."},{"key":"e_1_3_2_1_73_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Frank Joel","year":"2020","unstructured":"Joel Frank, Cornelius Aschermann, and Thorsten Holz. 2020. { ETHBMC} : A Bounded Model Checker for Smart Contracts. In 29th USENIX Security Symposium (USENIX Security 20). 2757\u20132774."},{"key":"e_1_3_2_1_74_1","unstructured":"Fusion. 2023. Distributed Control Rights Management. https:\/\/www.fusion.org\/tech\/dcrm."},{"key":"e_1_3_2_1_75_1","unstructured":"United Gamers. 2022. RUG PULL OR FUD? BLOCKVERSE DISAPPEARS REAPPEARS CONFUSES US ALL. https:\/\/www.unitedgamers.gg\/news\/blockverse-rupull-fud\/."},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00040"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3404366"},{"key":"e_1_3_2_1_78_1","volume-title":"Proceedings of the ACM on Programming Languages","author":"Grossman Shelly","year":"2017","unstructured":"Shelly Grossman, Ittai Abraham, Guy Golan-Gueta, Yan Michalevsky, Noam Rinetzky, Mooly Sagiv, and Yoni Zohar. 2017. Online detection of effectively callback free objects with applications to smart contracts. Proceedings of the ACM on Programming Languages (2017)."},{"key":"e_1_3_2_1_79_1","volume-title":"Bitcoin-monero cross-chain atomic swap. Cryptology ePrint Archive","author":"Gugger Jo\u00ebl","year":"2020","unstructured":"Jo\u00ebl Gugger. 2020. Bitcoin-monero cross-chain atomic swap. Cryptology ePrint Archive (2020)."},{"key":"e_1_3_2_1_80_1","unstructured":"Hacken. 2023. Heco Bridge Hack Explained. https:\/\/hacken.io\/insights\/heco-bridge-hack-explained\/."},{"key":"e_1_3_2_1_81_1","volume-title":"EXPLAINED: THE MULTICHAIN HACK (JANUARY","year":"2021","unstructured":"Halborn. 2021. EXPLAINED: THE MULTICHAIN HACK (JANUARY 2022). https:\/\/halborn.com\/explained-the-multichain-hack-january-2022\/."},{"key":"e_1_3_2_1_82_1","volume-title":"EXPLAINED: THE PNETWORK HACK (SEPTEMBER","year":"2021","unstructured":"Halborn. 2021. EXPLAINED: THE PNETWORK HACK (SEPTEMBER 2021). https:\/\/halborn.com\/explained-the-pnetwork-hack-september-2021\/."},{"key":"e_1_3_2_1_83_1","volume-title":"EXPLAINED: THE NOMAD HACK (AUGUST","author":"HALBORN.","year":"2022","unstructured":"HALBORN. 2022. EXPLAINED: THE NOMAD HACK (AUGUST 2022). https:\/\/halborn.com\/explained-the-nomad-hack-august-2022\/."},{"key":"e_1_3_2_1_84_1","volume-title":"EXPLAINED: THE RONIN HACK (MARCH","author":"HALBORN.","year":"2022","unstructured":"HALBORN. 2022. EXPLAINED: THE RONIN HACK (MARCH 2022). https:\/\/halborn.com\/explained-the-ronin-hack-march-2022\/."},{"key":"e_1_3_2_1_85_1","unstructured":"HALBORN. 2022. Harmony\u2019s Horizon Bridge Attack: How $100M was Siphoned Off By a Hacker. https:\/\/hackernoon.com\/harmonys-horizon-bridge-attack-how-dollar100m-was-siphoned-by-a-hacker."},{"key":"e_1_3_2_1_86_1","volume-title":"EXPLAINED: THE ORBIT BRIDGE HACK (DECEMBER","year":"2023","unstructured":"Halborn. 2023. EXPLAINED: THE ORBIT BRIDGE HACK (DECEMBER 2023). https:\/\/www.halborn.com\/blog\/post\/explained-the-orbit-bridge-hack-december-2023."},{"key":"e_1_3_2_1_87_1","unstructured":"Halborn. 2023. Halborn Blockchain Security Firm: Ethical Hackers Infosec. https:\/\/halborn.com\/."},{"key":"e_1_3_2_1_88_1","volume-title":"EXPLAINED: THE SOCKET PROTOCOL HACK (JANUARY","year":"2024","unstructured":"Halborn. 2024. EXPLAINED: THE SOCKET PROTOCOL HACK (JANUARY 2024). https:\/\/www.halborn.com\/blog\/post\/explained-the-socket-protocol-hack-january-2024."},{"key":"e_1_3_2_1_89_1","unstructured":"Harmony. 2023. Horizon Bridge - Harmony. https:\/\/docs.harmony.one\/home\/general\/bridges."},{"key":"e_1_3_2_1_90_1","unstructured":"Coinbase Help. 2023. Tether (USDT) - Coinbase Help. https:\/\/help.coinbase.com\/en\/coinbase\/getting-started\/crypto-education\/usdt."},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212734.3212736"},{"key":"e_1_3_2_1_92_1","unstructured":"Hop. 2023. Hop Exchange. https:\/\/bridge.connext.network\/."},{"key":"e_1_3_2_1_93_1","unstructured":"IBM. 2023. What is blockchain technology?https:\/\/www.ibm.com\/topics\/what-is-blockchain."},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238177"},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-43725-1_3"},{"key":"e_1_3_2_1_96_1","unstructured":"Numen\u00a0Cyber Labs. 2023. Poolz Finance Attacked for $665 000. https:\/\/medium.com\/@numencyberlabs\/poolz-finance-attacked-for-665-000-56084cacae53."},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC56567.2023.10174993"},{"key":"e_1_3_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJDCF.302876"},{"key":"e_1_3_2_1_99_1","unstructured":"LI.FI. 2023. Advanced Bridge & DEX Aggregation. https:\/\/li.fi."},{"key":"e_1_3_2_1_100_1","volume-title":"Blockchain: Gamified. https:\/\/www.skymavis.com\/.","author":"Mavis Sky","year":"2023","unstructured":"Sky Mavis. 2023. Blockchain: Gamified. https:\/\/www.skymavis.com\/."},{"key":"e_1_3_2_1_101_1","volume-title":"Sok: Validating bridges as a scaling solution for blockchains. Cryptology ePrint Archive","author":"McCorry Patrick","year":"2021","unstructured":"Patrick McCorry, Chris Buckland, Bennet Yee, and Dawn Song. 2021. Sok: Validating bridges as a scaling solution for blockchains. Cryptology ePrint Archive (2021)."},{"key":"e_1_3_2_1_102_1","unstructured":"Meter. 2023. THE FUTURE IS MULTI-CHAIN. https:\/\/meter.io."},{"key":"e_1_3_2_1_103_1","unstructured":"Meter.io. 2022. Community unfortunately Meter Passport was hacked a few hours ago.https:\/\/twitter.com\/Meter_IO\/status\/1490045486606139392."},{"key":"e_1_3_2_1_104_1","volume-title":"Atomic cross-chain swaps: development, trajectory and potential of non-monetary digital token swap facilities. arXiv preprint arXiv:1902.04471","author":"Miraz H","year":"2019","unstructured":"Mahdi\u00a0H Miraz and David\u00a0C Donald. 2019. Atomic cross-chain swaps: development, trajectory and potential of non-monetary digital token swap facilities. arXiv preprint arXiv:1902.04471 (2019)."},{"key":"e_1_3_2_1_105_1","unstructured":"Moonscan. 2022. Moonbeam Transaction Hash (Txhash) Details. https:\/\/moonscan.io\/tx\/0xcca9299c739a1b538150af007a34aba516b6dade1965e80198be021e3166fe4c."},{"key":"e_1_3_2_1_106_1","unstructured":"Multichain. 2022. Multichain Contract Vulnerability Post Mortem. https:\/\/medium.com\/multichainorg\/multichain-contract-vulnerability-post-mortem-d37bfab237c8."},{"key":"e_1_3_2_1_107_1","unstructured":"Multichain. 2023. Multichain Supported Chains. https:\/\/docs.multichain.org\/getting-started\/introduction\/supported-chains."},{"key":"e_1_3_2_1_108_1","unstructured":"Neptune Mutual. 2022. Decoding Omni Bridge\u2019s Call Data Replay Exploit. https:\/\/medium.com\/neptune-mutual\/decoding-omni-bridges-call-data-replay-exploit-f1c7e339a7e8."},{"key":"e_1_3_2_1_109_1","unstructured":"Near. 2023. ETH <> NEAR Rainbow Bridge - NEAR Protocol. https:\/\/near.org\/bridge\/."},{"key":"e_1_3_2_1_110_1","unstructured":"Razor Network. 2021. ChainSwap Exploit Post-Mortem. https:\/\/medium.com\/razor-network\/chainswap-exploit-post-mortem-d73f5d15ce3c."},{"key":"e_1_3_2_1_111_1","unstructured":"Ronin Network. 2023. Ronin Network. https:\/\/bridge.roninchain.com\/."},{"key":"e_1_3_2_1_112_1","unstructured":"Crypto News. 2022. pNetwork Clears the Air After Rumored Over $1B Breach on Their Platform. https:\/\/crypto.news\/pnetwork-clears-the-air-after-rumored-over-1b-breach-on-their-platform\/."},{"key":"e_1_3_2_1_113_1","unstructured":"Nomad. 2023. Nomad | Bridge. https:\/\/app.nomad.xyz\/."},{"key":"e_1_3_2_1_114_1","unstructured":"Nomad. 2023. Nomad Docs. https:\/\/docs.nomad.xyz\/token-bridge\/how-to-bridge."},{"key":"e_1_3_2_1_115_1","unstructured":"Optics. 2023. Bridges By Optics v2. https:\/\/optics.app\/."},{"key":"e_1_3_2_1_116_1","unstructured":"PolkaBridge. 2023. First Cross-Chain & MultiChain AMM. https:\/\/polkabridge.org."},{"key":"e_1_3_2_1_117_1","unstructured":"Polygon. 2023. Getting started with Polygon Proof of Stake chain. https:\/\/wallet.polygon.technology."},{"key":"e_1_3_2_1_118_1","unstructured":"Polygon. 2023. Polygon - Ethereum\u2019s Internet of Blockchains. https:\/\/polygon.technology\/lightpaper-polygon.pdf."},{"key":"e_1_3_2_1_119_1","unstructured":"PolyNetwork. 2023. Enhancing connections between ledgers by providing interoperability in Web 3.0. https:\/\/poly.network\/."},{"key":"e_1_3_2_1_120_1","unstructured":"Metaverse Post. 2022. WonderHero Token Collapses After Hack. https:\/\/mpost.io\/wonderhero-token-collapses-after-hack\/."},{"key":"e_1_3_2_1_121_1","unstructured":"Crypto Potato. 2022. Ronin Network Announces Bridge Restart Date Three Months After $625M Hack. https:\/\/cryptopotato.com\/ronin-network-announces-bridge-restart-date-three-months-after-625m-hack\/."},{"key":"e_1_3_2_1_122_1","unstructured":"Ethereum\u00a0Improvement Proposals. 2023. EIP-721: Non-Fungible Token Standard. https:\/\/eips.ethereum.org\/EIPS\/eip-721."},{"key":"e_1_3_2_1_123_1","unstructured":"Across Protocol. 2023. Across Protocol. https:\/\/across.to\/bridge."},{"key":"e_1_3_2_1_124_1","unstructured":"Map Protocol. 2023. Map Protocol.: Secure Omnichain Layer for Web3 & dApps. https:\/\/www.mapprotocol.io."},{"key":"e_1_3_2_1_125_1","unstructured":"Qubit. 2023. Driving growth with personalization. Make ecommerce More personal. https:\/\/www.qubit.com."},{"key":"e_1_3_2_1_126_1","unstructured":"RazorNetwork. 2023. Truly decentralized oracle network for decentralized. https:\/\/razor.network."},{"key":"e_1_3_2_1_127_1","unstructured":"REKT. 2023. HYPR NETWORK - REKT. https:\/\/rekt.news\/hypr-network-rekt\/."},{"key":"e_1_3_2_1_128_1","unstructured":"Log Rocket. 2021. Substrate blockchain development: Core concepts. https:\/\/blog.logrocket.com\/substrate-blockchain-framework-core-concepts\/."},{"key":"e_1_3_2_1_129_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23413"},{"key":"e_1_3_2_1_130_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC48266.2020.9169477"},{"key":"e_1_3_2_1_131_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102471"},{"key":"e_1_3_2_1_132_1","volume-title":"SlowMist: Analysis of Three Consecutive Attacks on THORChain (Released","year":"2021","unstructured":"SlowMist. 2021. SlowMist: Analysis of Three Consecutive Attacks on THORChain (Released in 2021). https:\/\/slowmist.medium.com\/slowmist-analysis-of-three-consecutive-attacks-on-thorchain-6223f1c691be."},{"key":"e_1_3_2_1_133_1","unstructured":"SlowMist. 2022. Truth Behind the Celer Network cBridge cross-chain bridge incident: BGP hijacking. https:\/\/medium.com\/coinmonks\/truth-behind-the-celer-network-cbridge-cross-chain-bridge-incident-bgp-hijacking-52556227e940."},{"key":"e_1_3_2_1_134_1","unstructured":"Stargate. 2023. Welcome to the omnichain future. https:\/\/stargate.finance."},{"key":"e_1_3_2_1_135_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-021-06577-5"},{"key":"e_1_3_2_1_136_1","unstructured":"Synapse. 2023. Synapse. https:\/\/synapseprotocol.com\/."},{"key":"e_1_3_2_1_137_1","unstructured":"Coin Telegraph. 2022. Multichain asks users to revoke approvals amid \u2018critical vulnerability\u2019. https:\/\/cointelegraph.com\/news\/multichain-asks-users-to-revoke-approvals-amid-critical-vulnerability."},{"key":"e_1_3_2_1_138_1","unstructured":"Coin Telegraph. 2022. Vitalik Buterin gives thumbs down to cross-chain applications. https:\/\/cointelegraph.com\/news\/vitalik-buterin-gives-thumbs-down-to-cross-chain-applications."},{"key":"e_1_3_2_1_139_1","unstructured":"ThunderCore. 2023. ThunderCore Docs. https:\/\/docs.developers.thundercore.com\/product-protocol\/bridges\/interact-with-thundercore-bridge."},{"key":"e_1_3_2_1_140_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833731"},{"key":"e_1_3_2_1_141_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274737"},{"key":"e_1_3_2_1_142_1","doi-asserted-by":"publisher","DOI":"10.1145\/3492323.3495577"},{"key":"e_1_3_2_1_143_1","volume-title":"Efficient Cross-Chain Transaction Processing on Blockchains. Applied Sciences","author":"Wang Wenqi","year":"2022","unstructured":"Wenqi Wang, Zhiwei Zhang, Guoren Wang, and Ye Yuan. 2022. Efficient Cross-Chain Transaction Processing on Blockchains. Applied Sciences (2022)."},{"key":"e_1_3_2_1_144_1","unstructured":"xDAI Bridge. 2023. xDAI Bridge - Gnosis Chain. https:\/\/bridge.gnosischain.com."},{"key":"e_1_3_2_1_145_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-64331-0_1"},{"key":"e_1_3_2_1_146_1","volume-title":"Layerzero: Trustless omnichain interoperability protocol. arXiv preprint arXiv:2110.13871","author":"Zarick Ryan","year":"2021","unstructured":"Ryan Zarick, Bryan Pellegrino, and Caleb Banister. 2021. Layerzero: Trustless omnichain interoperability protocol. arXiv preprint arXiv:2110.13871 (2021)."},{"key":"e_1_3_2_1_147_1","volume-title":"Xscope: Hunting for Cross-Chain Bridge Attacks. arXiv preprint arXiv:2208.07119","author":"Zhang Jiashuo","year":"2022","unstructured":"Jiashuo Zhang, Jianbo Gao, Yue Li, Ziming Chen, Zhi Guan, and Zhong Chen. 2022. Xscope: Hunting for Cross-Chain Bridge Attacks. arXiv preprint arXiv:2208.07119 (2022)."},{"key":"e_1_3_2_1_148_1","volume-title":"USENIX Security Symposium.","author":"Zhang Mengya","year":"2020","unstructured":"Mengya Zhang, Xiaokuan Zhang, Yinqian Zhang, and Zhiqiang Lin. 2020. TXSPECTOR: Uncovering Attacks in Ethereum from Transactions. In USENIX Security Symposium."}],"event":{"name":"RAID '24: The 27th International Symposium on Research in Attacks, Intrusions and Defenses","location":"Padua Italy","acronym":"RAID '24"},"container-title":["The 27th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678890.3678894","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3678890.3678894","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:00Z","timestamp":1750295880000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678890.3678894"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,30]]},"references-count":148,"alternative-id":["10.1145\/3678890.3678894","10.1145\/3678890"],"URL":"https:\/\/doi.org\/10.1145\/3678890.3678894","relation":{},"subject":[],"published":{"date-parts":[[2024,9,30]]},"assertion":[{"value":"2024-09-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}