{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:05:58Z","timestamp":1750309558055,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Key R&D Program of Zhejiang","award":["2025C01083"],"award-info":[{"award-number":["2025C01083"]}]},{"name":"Ministry of Education, Singapore","award":["MOET3202"],"award-info":[{"award-number":["MOET3202"]}]},{"name":"Werner Siemens-Stiftung (WSS)"},{"name":"Fundamental Research Funds for the Central Universities (Zhejiang University NGICS Platform)"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,28]]},"DOI":"10.1145\/3696410.3714682","type":"proceedings-article","created":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T22:57:28Z","timestamp":1745362648000},"page":"4146-4159","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Quantitative Runtime Monitoring of Ethereum Transaction Attacks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-4408-6368","authenticated-orcid":false,"given":"Xinyao","family":"Xu","sequence":"first","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-8500-3973","authenticated-orcid":false,"given":"Ziyu","family":"Mao","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7685-944X","authenticated-orcid":false,"given":"Jianzhong","family":"Su","sequence":"additional","affiliation":[{"name":"Sun Yat-Sen University, Zhuhai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-5048-2516","authenticated-orcid":false,"given":"Xingwei","family":"Lin","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9271-0007","authenticated-orcid":false,"given":"David","family":"Basin","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3545-1392","authenticated-orcid":false,"given":"Jun","family":"Sun","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7113-7635","authenticated-orcid":false,"given":"Jingyi","family":"Wang","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2025,4,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Aicoin. 2023. Information about Ethereum. https:\/\/www.aicoin.com\/currencies\/ethereum.html."},{"key":"e_1_3_2_1_2_1","volume-title":"MONPOLY: Monitoring usage-control policies. In Runtime Verification: Second International Conference, RV","author":"Basin David","year":"2012","unstructured":"David Basin, Mat\u00fa\u0161 Harvan, Felix Klaedtke, and Eugen Z\u0103linescu. 2012. MONPOLY: Monitoring usage-control policies. In Runtime Verification: Second International Conference, RV 2011, San Francisco, CA, USA, September 27--30, 2011, Revised Selected Papers 2. Springer, 360--364."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699444"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3391195","article-title":"A survey on ethereum systems security: Vulnerabilities, attacks, and defenses","volume":"53","author":"Chen Huashan","year":"2020","unstructured":"Huashan Chen, Marcus Pendleton, Laurent Njilla, and Shouhuai Xu. 2020. A survey on ethereum systems security: Vulnerabilities, attacks, and defenses. ACM Computing Surveys (CSUR), Vol. 53, 3 (2020), 1--43.","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00040"},{"key":"e_1_3_2_1_6_1","unstructured":"DeFillama. 2023. DeFillama Dashboard. https:\/\/defillama.com\/.."},{"key":"e_1_3_2_1_7_1","unstructured":"Etherscan. [n. d.]. Etherscan Blockchain Explorer. https:\/\/etherscan.io\/"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238177"},{"key":"e_1_3_2_1_9_1","unstructured":"Ali Safavi Kevin Wang. 2016. Blockchain is empowering the future of insurance. https:\/\/techcrunch.com\/2016\/10\/29\/blockchain-is-empowering-the-future-of-insurance\/."},{"key":"e_1_3_2_1_10_1","volume-title":"USENIX Annual Technical Conference. 565--579","author":"Kim Yeonsoo","year":"2021","unstructured":"Yeonsoo Kim, Seongho Jeong, Kamil Jezek, Bernd Burgstaller, and Bernhard Scholz. 2021. An Off-The-Chain Execution Environment for Scalable Testing and Profiling of Smart Contracts.. In USENIX Annual Technical Conference. 565--579."},{"key":"e_1_3_2_1_11_1","volume-title":"Smart Contract Vulnerabilities: Vulnerable Does Not Imply Exploited. In 30th USENIX Security Symposium (USENIX Security 21)","author":"Perez Daniel","year":"2021","unstructured":"Daniel Perez and Benjamin Livshits. 2021. Smart Contract Vulnerabilities: Vulnerable Does Not Imply Exploited. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 1325--1341. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/perez"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833734"},{"key":"e_1_3_2_1_13_1","unstructured":"Rekt. 2020a. VALUE DEFI - REKT. https:\/\/rekt.news\/value-defi-rekt\/."},{"key":"e_1_3_2_1_14_1","unstructured":"Rekt. 2020b. WARP FINANCE - REKT. https:\/\/rekt.news\/zh\/warp-finance-rekt\/."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE56229.2023.00110"},{"key":"e_1_3_2_1_16_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Su Liya","year":"2021","unstructured":"Liya Su, Xinyue Shen, Xiangyu Du, Xiaojing Liao, XiaoFeng Wang, Luyi Xing, and Baoxu Liu. 2021. Evil under the sun: understanding and discovering attacks on Ethereum decentralized applications. In 30th USENIX Security Symposium (USENIX Security 21). 1307--1324."},{"key":"e_1_3_2_1_17_1","unstructured":"Susie-X. 2024. https:\/\/github.com\/Susie-X\/Ethereum-Transaction\/tree\/main."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3464421"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.2968505"},{"key":"e_1_3_2_1_20_1","unstructured":"Zikai Alex Wen and Andrew Miller. 2016. Scanning Live Ethereum Contracts for the ''Unchecked-Send'' Bug. https:\/\/rekt.news\/zh\/warp-finance-rekt\/."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3346888"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Zibin Zheng Shaoan Xie Hongning Dai Xiangping Chen and Huaimin Wang. 2017. An overview of blockchain technology: Architecture consensus and future trends. In 2017 IEEE international congress on big data (BigData congress). Ieee 557--564.","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.12.019"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJWGS.2018.095647"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00027"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179435"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the Twenty-Ninth International Conference on International Joint Conferences on Artificial Intelligence. 3283--3290","author":"Zhuang Yuan","year":"2021","unstructured":"Yuan Zhuang, Zhenguang Liu, Peng Qian, Qi Liu, Xiang Wang, and Qinming He. 2021. Smart contract vulnerability detection using graph neural networks. In Proceedings of the Twenty-Ninth International Conference on International Joint Conferences on Artificial Intelligence. 3283--3290."}],"event":{"name":"WWW '25: The ACM Web Conference 2025","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Sydney NSW Australia","acronym":"WWW '25"},"container-title":["Proceedings of the ACM on Web Conference 2025"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714682","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3696410.3714682","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:56Z","timestamp":1750295936000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714682"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,22]]},"references-count":27,"alternative-id":["10.1145\/3696410.3714682","10.1145\/3696410"],"URL":"https:\/\/doi.org\/10.1145\/3696410.3714682","relation":{},"subject":[],"published":{"date-parts":[[2025,4,22]]},"assertion":[{"value":"2025-04-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}