{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T10:02:38Z","timestamp":1775815358526,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Fundamental Research Funds for the Central Universities of China","award":["24lgqb018"],"award-info":[{"award-number":["24lgqb018"]}]},{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/100017052","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372485, 623B2102 and 62332004"],"award-info":[{"award-number":["62372485, 623B2102 and 62332004"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/100017052","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/501100003453","name":"Natural Science Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2023A1515011314"],"award-info":[{"award-number":["2023A1515011314"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/501100003453","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Research and Development Program of China","award":["2023YFB2704700"],"award-info":[{"award-number":["2023YFB2704700"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,28]]},"DOI":"10.1145\/3696410.3714604","type":"proceedings-article","created":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T22:52:18Z","timestamp":1745362338000},"page":"4902-4912","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Safeguarding Blockchain Ecosystem: Understanding and Detecting Attack Transactions on Cross-chain Bridges"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5155-8547","authenticated-orcid":false,"given":"Jiajing","family":"Wu","sequence":"first","affiliation":[{"name":"Sun Yat-sen University, Zhuhai, China and Guangdong Engineering Technology Research Center of Blockchain, Zhuhai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1289-2603","authenticated-orcid":false,"given":"Kaixin","family":"Lin","sequence":"additional","affiliation":[{"name":"Sun Yat-Sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7067-2396","authenticated-orcid":false,"given":"Dan","family":"Lin","sequence":"additional","affiliation":[{"name":"Sun Yat-Sen University, Zhuhai, China and Guangdong Engineering Technology Research Center of Blockchain, Zhuhai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-0974-2236","authenticated-orcid":false,"given":"Bozhao","family":"Zhang","sequence":"additional","affiliation":[{"name":"Sun Yat-Sen University, Zhuhai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4633-0008","authenticated-orcid":false,"given":"Zhiying","family":"Wu","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7685-944X","authenticated-orcid":false,"given":"Jianzhong","family":"Su","sequence":"additional","affiliation":[{"name":"Sun Yat-Sen University, Zhuhai, China and Guangdong Engineering Technology Research Center of Blockchain, Zhuhai, China"}]}],"member":"320","published-online":{"date-parts":[[2025,4,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2023. Etherscan. https:\/\/etherscan.io\/"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1038\/nrg2102"},{"key":"e_1_3_2_1_3_1","unstructured":"Arjun Bhuptani. 2021. The interoperability trilemma. https:\/\/medium.com\/connext\/the-interoperability-trilemma-657c2cf69f17."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.aad9029"},{"key":"e_1_3_2_1_5_1","unstructured":"certik. Accessed: 2023. certik. https:\/\/www.certik.com\/zh-CN."},{"key":"e_1_3_2_1_6_1","volume-title":"et al","author":"Chen Ting","year":"2020","unstructured":"Ting Chen, Rong Cao, Ting Li, Xiapu Luo, Guofei Gu, Yufei Zhang, Zhou Liao, Hang Zhu, Gang Chen, Zheyuan He, et al . 2020. SODA: A Generic Online Detection Framework for Smart Contracts.. In NDSS."},{"key":"e_1_3_2_1_7_1","volume-title":"et al","author":"Chen Tianqi","year":"2015","unstructured":"Tianqi Chen, Tong He, Michael Benesty, Vadim Khotilovich, Yuan Tang, Hyunsu Cho, Kailong Chen, Rory Mitchell, Ignacio Cano, Tianyi Zhou, et al . 2015. Xgboost: extreme gradient boosting. R package version 0.4--2 1, 4 (2015), 1--4."},{"key":"e_1_3_2_1_8_1","unstructured":"De.Fi Team. Accessed: 2023. REKT database. https:\/\/de.fi\/rekt-database."},{"key":"e_1_3_2_1_9_1","volume-title":"Exploring the front-end of project management. Engineering project organization journal 3, 2","author":"Edkins Andrew","year":"2013","unstructured":"Andrew Edkins, Joana Geraldi, Peter Morris, and Alan Smith. 2013. Exploring the front-end of project management. Engineering project organization journal 3, 2 (2013), 71--85."},{"key":"e_1_3_2_1_10_1","first-page":"1222","article-title":"A closer look at skip-gram modelling","volume":"6","author":"Guthrie David","year":"2006","unstructured":"David Guthrie, Ben Allison, Wei Liu, Louise Guthrie, and Yorick Wilks. 2006. A closer look at skip-gram modelling.. In LREC, Vol. 6. 1222--1225.","journal-title":"LREC"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_31"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212734.3212736"},{"key":"e_1_3_2_1_13_1","volume-title":"An empirical evaluation of doc2vec with practical insights into document embedding generation. arXiv preprint arXiv:1607.05368","author":"Lau Jey Han","year":"2016","unstructured":"Jey Han Lau and Timothy Baldwin. 2016. An empirical evaluation of doc2vec with practical insights into document embedding generation. arXiv preprint arXiv:1607.05368 (2016)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC56567.2023.10174993"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC56567.2023.10174993"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJDCF.302876"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183440.3183495"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678597"},{"key":"e_1_3_2_1_19_1","volume-title":"graph2vec: Learning distributed representations of graphs. arXiv preprint arXiv:1707.05005","author":"Narayanan Annamalai","year":"2017","unstructured":"Annamalai Narayanan, Mahinthan Chandramohan, Rajasekar Venkatesan, Lihui Chen, Yang Liu, and Shantanu Jaiswal. 2017. graph2vec: Learning distributed representations of graphs. arXiv preprint arXiv:1707.05005 (2017)."},{"key":"e_1_3_2_1_20_1","volume-title":"SoK: Cross-Chain Bridging Architectural Design Flaws and Mitigations. arXiv preprint arXiv:2403.00405","author":"Notland Jakob Svennevik","year":"2024","unstructured":"Jakob Svennevik Notland, Jinguye Li, Mariusz Nowostawski, and Peter Halland Haro. 2024. SoK: Cross-Chain Bridging Architectural Design Flaws and Mitigations. arXiv preprint arXiv:2403.00405 (2024)."},{"key":"e_1_3_2_1_21_1","volume-title":"SoK: Cross-Chain Bridging Architectural Design Flaws and Mitigations. arXiv preprint arXiv:2403.00405","author":"Notland Jakob Svennevik","year":"2024","unstructured":"Jakob Svennevik Notland, Jinguye Li, Mariusz Nowostawski, and Peter Halland Haro. 2024. SoK: Cross-Chain Bridging Architectural Design Flaws and Mitigations. arXiv preprint arXiv:2403.00405 (2024)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109378"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.2.2.57-67"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.4249\/scholarpedia.1883"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/1639537.1639542"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-64322-8_1"},{"key":"e_1_3_2_1_27_1","volume-title":"Sereum: Protecting existing smart contracts against re-entrancy attacks. arXiv preprint arXiv:1812.05934","author":"Rodler Michael","year":"2018","unstructured":"Michael Rodler, Wenting Li, Ghassan O Karame, and Lucas Davi. 2018. Sereum: Protecting existing smart contracts against re-entrancy attacks. arXiv preprint arXiv:1812.05934 (2018)."},{"key":"e_1_3_2_1_28_1","article-title":"Weisfeiler-lehman graph kernels","volume":"12","author":"Shervashidze Nino","year":"2011","unstructured":"Nino Shervashidze, Pascal Schweitzer, Erik Jan Van Leeuwen, Kurt Mehlhorn, and Karsten M Borgwardt. 2011. Weisfeiler-lehman graph kernels. Journal of Machine Learning Research 12, 9 (2011).","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102471"},{"key":"e_1_3_2_1_30_1","unstructured":"slowmist. Accessed: 2023. slowmist. https:\/\/cn.slowmist.com\/."},{"key":"e_1_3_2_1_31_1","volume-title":"Decision tree methods: applications for classification and prediction. Shanghai archives of psychiatry 27, 2","author":"Song Yan-Yan","year":"2015","unstructured":"Yan-Yan Song and LU Ying. 2015. Decision tree methods: applications for classification and prediction. Shanghai archives of psychiatry 27, 2 (2015), 130."},{"key":"e_1_3_2_1_32_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Su Liya","year":"2021","unstructured":"Liya Su, Xinyue Shen, Xiangyu Du, Xiaojing Liao, XiaoFeng Wang, Luyi Xing, and Baoxu Liu. 2021. Evil under the sun: Understanding and discovering attacks on ethereum decentralized applications. In 30th USENIX Security Symposium (USENIX Security 21). 1307--1324."},{"key":"e_1_3_2_1_33_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Torres Christof Ferreira","year":"2019","unstructured":"Christof Ferreira Torres, Mathis Steichen, et al. 2019. The art of the scam: Demystifying honeypots in ethereum smart contracts. In 28th USENIX Security Symposium (USENIX Security 19). 1591--1607."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2022.3228122"},{"key":"e_1_3_2_1_35_1","volume-title":"Ethereum: A secure decentralized generalized transaction ledger. https:\/\/ethereum.github.io\/yellowpaper\/paper.pdf.","author":"Wood Gavin","year":"2023","unstructured":"Gavin Wood. 2023. Ethereum: A secure decentralized generalized transaction ledger. https:\/\/ethereum.github.io\/yellowpaper\/paper.pdf."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583537"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1137\/20M1386062"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3559520"},{"key":"e_1_3_2_1_39_1","volume-title":"SoK: Security of Cross-chain Bridges: Attack Surfaces, Defenses, and Open Problems. arXiv preprint arXiv:2312.12573","author":"Zhang Mengya","year":"2023","unstructured":"Mengya Zhang, Xiaokuan Zhang, Josh Barbee, Yinqian Zhang, and Zhiqiang Lin. 2023. SoK: Security of Cross-chain Bridges: Attack Surfaces, Defenses, and Open Problems. arXiv preprint arXiv:2312.12573 (2023)."},{"key":"e_1_3_2_1_40_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Zhou Shunfan","year":"2020","unstructured":"Shunfan Zhou, Malte M\u00f6ser, Zhemin Yang, Ben Adida, Thorsten Holz, Jie Xiang, Steven Goldfeder, Yinzhi Cao, Martin Plattner, Xiaojun Qin, et al. 2020. An ever-evolving game: Evaluation of real-world attacks and defenses in ethereum ecosystem. In 29th USENIX Security Symposium (USENIX Security 20). 2793--2810."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3639477.3639722"}],"event":{"name":"WWW '25: The ACM Web Conference 2025","location":"Sydney NSW Australia","acronym":"WWW '25","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the ACM on Web Conference 2025"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714604","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3696410.3714604","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:34Z","timestamp":1750295914000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714604"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,22]]},"references-count":41,"alternative-id":["10.1145\/3696410.3714604","10.1145\/3696410"],"URL":"https:\/\/doi.org\/10.1145\/3696410.3714604","relation":{},"subject":[],"published":{"date-parts":[[2025,4,22]]},"assertion":[{"value":"2025-04-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}