{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T18:52:27Z","timestamp":1776365547904,"version":"3.51.2"},"reference-count":329,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2025,4,21]],"date-time":"2025-04-21T00:00:00Z","timestamp":1745193600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>Blockchain technology has emerged as a transformative innovation, providing a transparent, immutable, and decentralized platform that underpins critical applications across industries such as cryptocurrencies, supply chain management, healthcare, and finance. Despite their promise of enhanced security and trust, the increasing sophistication of cyberattacks has exposed vulnerabilities within blockchain ecosystems, posing severe threats to their integrity, reliability, and adoption. This study presents a comprehensive and systematic review of blockchain vulnerabilities by categorizing and analyzing potential threats, including network-level attacks, consensus-based exploits, smart contract vulnerabilities, and user-centric risks. Furthermore, the research evaluates existing countermeasures and mitigation strategies by examining their effectiveness, scalability, and adaptability to diverse blockchain architectures and use cases. The study highlights the critical need for context-aware security solutions that address the unique requirements of various blockchain applications and proposes a framework for advancing proactive and resilient security designs. By bridging gaps in the existing literature, this research offers valuable insights for academics, industry practitioners, and policymakers, contributing to the ongoing development of robust and secure decentralized ecosystems.<\/jats:p>","DOI":"10.3390\/fi17040183","type":"journal-article","created":{"date-parts":[[2025,4,21]],"date-time":"2025-04-21T20:38:26Z","timestamp":1745267906000},"page":"183","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Securing Decentralized Ecosystems: A Comprehensive Systematic Review of Blockchain Vulnerabilities, Attacks, and Countermeasures and Mitigation Strategies"],"prefix":"10.3390","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9986-210X","authenticated-orcid":false,"given":"Md Kamrul","family":"Siam","sequence":"first","affiliation":[{"name":"Department of Computer Science, New York Institute of Technology, New York, NY 10023, USA"}]},{"given":"Bilash","family":"Saha","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Kennesaw State University, Kennesaw, GA 30144, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-4373-7684","authenticated-orcid":false,"given":"Md Mehedi","family":"Hasan","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Kennesaw State University, Kennesaw, GA 30144, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6316-5334","authenticated-orcid":false,"given":"Md Jobair","family":"Hossain Faruk","sequence":"additional","affiliation":[{"name":"Department of Computer Science, New York Institute of Technology, New York, NY 10023, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-4176-9014","authenticated-orcid":false,"given":"Nafisa","family":"Anjum","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Kennesaw State University, Kennesaw, GA 30144, USA"}]},{"given":"Sharaban","family":"Tahora","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Kennesaw State University, Kennesaw, GA 30144, USA"}]},{"given":"Aiasha","family":"Siddika","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Kennesaw State University, Kennesaw, GA 30144, USA"}]},{"given":"Hossain","family":"Shahriar","sequence":"additional","affiliation":[{"name":"Center for Cybersecurity, University of West Florida, Pensacola, FL 32514, USA"}]}],"member":"1968","published-online":{"date-parts":[[2025,4,21]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"100959","DOI":"10.1016\/j.measen.2023.100959","article-title":"Deep learning enabled blockchain based electronic heathcare data attack detection for smart health systems","volume":"31","author":"Chidambaranathan","year":"2024","journal-title":"Meas. Sens."},{"key":"ref_2","first-page":"417","article-title":"Attack resistant blockchain-based healthcare record system using modified RSA Algorithm","volume":"16","author":"Srivastava","year":"2024","journal-title":"Int. J. Inf. Technol."},{"key":"ref_3","unstructured":"(2025, March 25). Deloitte\u2019s 2021 Global Blockchain Survey: Financial Leaders See Digital Assets as the Future. Available online: https:\/\/www2.deloitte.com\/us\/en\/insights\/topics\/understanding-blockchain-potential\/global-blockchain-survey.html."},{"key":"ref_4","unstructured":"(2024, April 20). FinancialNewsMedia.com. Global Blockchain Technology Market Expected to Reach $1.4 Trillion by 2030. Available online: https:\/\/www.prnewswire.com\/news-releases\/global-blockchain-technology-market-expected-to-reach-1-4-trillion-by-2030-301535849.html."},{"key":"ref_5","unstructured":"Pramod, B., and Vaibhav, M. (2021). Blockchain Distributed Ledger Market Expected to Reach $ 137.29 Billion by 2027, Allied Market Research."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Sood, A., and Simon, R. (2019, January 21\u201322). Implementation of Blockchain in Cross Border Money Transfer. Proceedings of the 2019 4th International Conference on Information Systems and Computer Networks (ISCON), Mathura, India.","DOI":"10.1109\/ISCON47742.2019.9036283"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"2266","DOI":"10.1109\/TSMC.2019.2895123","article-title":"Blockchain-Enabled Smart Contracts: Architecture, Applications, and Future Trends","volume":"49","author":"Wang","year":"2019","journal-title":"IEEE Trans. Syst. Man. Cybern. Syst."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Panarello, A., Tapas, N., Merlino, G., Longo, F., and Puliafito, A. (2018). Blockchain and IoT Integration: A Systematic Survey. Sensors, 18.","DOI":"10.3390\/s18082575"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Saha, B., Islam, M.S., Riad, A.K., Tahora, S., Shahriar, H., and Sneha, S. (2023). BlockTheFall: Wearable Device-based Fall Detection Framework Powered by Machine Learning and Blockchain for Elderly Care. arXiv.","DOI":"10.1109\/COMPSAC57700.2023.00216"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Tahora, S., Saha, B., Sakib, N., Shahriar, H., and Haddad, H. (2023). Blockchain Technology in Higher Education Ecosystem: Unraveling the Good, Bad, and Ugly. arXiv.","DOI":"10.1109\/COMPSAC57700.2023.00160"},{"key":"ref_11","first-page":"1","article-title":"Blockchain & infrastructure (identity, data security)","volume":"1","author":"Shrier","year":"2016","journal-title":"Mass. Inst. Technol.-Connect. Sci."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"H\u00f6lbl, M., Kompara, M., Kami\u0161ali\u0107, A., and Nemec Zlatolas, L. (2018). A systematic review of the use of blockchain in healthcare. Symmetry, 10.","DOI":"10.20944\/preprints201809.0136.v1"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Randolph, J., Faruk, M.J.H., Saha, B., Shahriar, H., Valero, M., Zhao, L., and Sakib, N. (July, January June). Blockchain-based Medical Image Sharing and Automated Critical-results Notification: A Novel Framework. Proceedings of the 2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC), Los Alamitos, CA, USA.","DOI":"10.1109\/COMPSAC54236.2022.00279"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Faruk, M.J.H., Shahriar, H., Saha, B., and Barek, A. (2022). Security in Electronic Health Records System: Blockchain-Based Framework to Protect Data Integrity. Blockchain for Cybersecurity in Cyber-Physical Systems, Springer.","DOI":"10.1007\/978-3-031-25506-9_7"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"62018","DOI":"10.1109\/ACCESS.2018.2875782","article-title":"Blockchain in Logistics and Supply Chain: A Lean Approach for Designing Real-World Use Cases","volume":"6","author":"Perboli","year":"2018","journal-title":"IEEE Access"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"94186","DOI":"10.1109\/ACCESS.2022.3204274","article-title":"Blockchain and NFTs for Time-Bound Access and Monetization of Private Data","volume":"10","author":"Madine","year":"2022","journal-title":"IEEE Access"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"O\u2019Reilly, P., and Rigopoulos, K. (2024). Fiscal Year 2023 Cybersecurity and Privacy Annual Report, Number NIST SP 800-229.","DOI":"10.6028\/NIST.SP.800-229"},{"key":"ref_18","unstructured":"Kramer, S. (2024, April 20). Unpacking SonicWall 2024 Mid-Year Cyber Threat Report. Available online: https:\/\/thecuberesearch.com\/unpacking-sonicwall-2024-midyear-cyber-threat-report\/."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Badertscher, C., Lu, Y., and Zikas, V. (2021, January 16\u201320). A rational protocol treatment of 51% attacks. Proceedings of the Advances in Cryptology\u2013CRYPTO 2021: 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event. Proceedings, Part III 41.","DOI":"10.1007\/978-3-030-84252-9_1"},{"key":"ref_20","unstructured":"Sinclair, S. (2024, April 20). Ethereum Classic\u2019s MESS Solution Won\u2019t Provide \u2019Robust\u2019 Security Against 51% Attacks. Available online: https:\/\/www.coindesk.com\/markets\/2020\/08\/20\/ethereum-classics-mess-solution-wont-provide-robust-security-against-51-attacks\/."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Kustov, V., Aleksey, G., Nikolay, B., Ekaterina, S., and Ravi, R.V. (2022, January 8). Three Sources of Blockchain Technology Vulnerabilities\u2014How to Deal with them?. Proceedings of the 2022 Second International Conference on Computer Science, Engineering and Applications (ICCSEA), Gunupur, India.","DOI":"10.1109\/ICCSEA54677.2022.9936330"},{"key":"ref_22","unstructured":"Livni, E. (The New York Times, 2022). Binance Blockchain Hit by $570 Million Hack, Exposing Crypto Vulnerabilities, The New York Times."},{"key":"ref_23","unstructured":"Oxford Analytica (2022). Binance breach underlines risks for crypto ecosystem. Emerald Expert Briefings."},{"key":"ref_24","unstructured":"Beck, R.H. (2024, April 20). Top 10 Cryptocurrencies of March 4, 2025. Available online: https:\/\/www.investopedia.com\/top-10-cryptocurrencies-5189931."},{"key":"ref_25","first-page":"2597","article-title":"Blockchain Security Threats and Collaborative Defense: A Literature Review","volume":"76","author":"Li","year":"2023","journal-title":"Comput. Mater. Contin."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"448","DOI":"10.30574\/wjarr.2021.10.3.0196","article-title":"Enhancing cyber security using quantum computing and Artificial Intelligence: A review","volume":"10","author":"Hussain","year":"2021","journal-title":"World J. Adv. Res. Rev."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Mollajafari, S., and Bechkoum, K. (2023). Blockchain Technology and Related Security Risks: Towards a Seven-Layer Perspective and Taxonomy. Sustainability, 15.","DOI":"10.3390\/su151813401"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Karakostas, D., Kiayias, A., and Zacharias, T. (2024, January 14\u201318). Blockchain bribing attacks and the efficacy of counterincentives. Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, Salt Lake City, UT, USA.","DOI":"10.1145\/3658644.3670330"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"2333","DOI":"10.1007\/s10207-024-00849-5","article-title":"Selfish mining attack in blockchain: A systematic literature review","volume":"23","author":"Madhushanie","year":"2024","journal-title":"Int. J. Inf. Secur."},{"key":"ref_30","unstructured":"(2025, March 25). CASP Checklist for Systematic Reviews and Meta-Analysis. Available online: https:\/\/casp-uk.net\/casp-tools-checklists\/systematic-reviews-meta-analysis-observational-studies\/."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Careem, M.A.A., and Dutta, A. (2020, January 7\u201311). Reputation based Routing in MANET using Blockchain. Proceedings of the 2020 International Conference on Communication Systems & Networks (COMSNETS), Bengaluru, India.","DOI":"10.1109\/COMSNETS48256.2020.9027450"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Luu, L., Chu, D.H., Olickel, H., Saxena, P., and Hobor, A. (2016, January 24\u201328). Making Smart Contracts Smarter. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS), Vienna, Austria.","DOI":"10.1145\/2976749.2978309"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"12004","DOI":"10.1109\/JIOT.2021.3074544","article-title":"Security challenges and opportunities for smart contracts in Internet of Things: A survey","volume":"8","author":"Peng","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"24416","DOI":"10.1109\/ACCESS.2020.2970495","article-title":"Smart contract: Attacks and protections","volume":"8","author":"Sayeed","year":"2020","journal-title":"IEEE Access"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Mense, A., and Flatscher, M. (2018, January 19\u201321). Security Vulnerabilities in Ethereum Smart Contracts. Proceedings of the 20th International Conference on Information Integration and Web-Based Applications & Services (iiWAS), Yogyakarta, Indonesia.","DOI":"10.1145\/3282373.3282419"},{"key":"ref_36","first-page":"352","article-title":"Blockchain Attacks, Analysis and a Model to Solve Double Spending Attack","volume":"10","author":"Begum","year":"2020","journal-title":"Int. J. Mach. Learn. Comput."},{"key":"ref_37","first-page":"857","article-title":"Low-Resource Eclipse Attacks on Ethereum\u2019s Peer-to-Peer Network","volume":"2018","author":"Marcus","year":"2018","journal-title":"Cryptology ePrint Archive"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"28712","DOI":"10.1109\/ACCESS.2019.2901858","article-title":"A survey on long-range attacks for proof of stake protocols","volume":"7","author":"Deirmentzoglou","year":"2019","journal-title":"IEEE Access"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Grundmann, M., Neudecker, T., and Hartenstein, H. (2018, January 2). Exploiting transaction accumulation and double spends for topology inference in bitcoin. Proceedings of the Financial Cryptography and Data Security: FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Cura\u00e7ao. Revised Selected Papers 22.","DOI":"10.1007\/978-3-662-58820-8_9"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"1","DOI":"10.26594\/register.v8i1.2190","article-title":"Block-hash of blockchain framework against man-in-the-middle attacks","volume":"8","author":"Riadi","year":"2022","journal-title":"Regist. J. Ilm. Teknol. Sist. Inf."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"15839","DOI":"10.1109\/JSEN.2020.3022536","article-title":"Ultra-lightweight mutual authentication in the vehicle based on smart contract blockchain: Case of MITM attack","volume":"21","author":"Razmjouei","year":"2020","journal-title":"IEEE Sens. J."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"3012","DOI":"10.1109\/TDSC.2020.3030213","article-title":"Man-in-the-middle attack on contactless payment over NFC communications: Design, implementation, experiments and detection","volume":"18","author":"Akter","year":"2020","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1016\/bs.adcom.2020.08.020","article-title":"Attacks on blockchain","volume":"Volume 121","author":"Aggarwal","year":"2021","journal-title":"Advances in Computers"},{"key":"ref_44","unstructured":"The Defiant Weekly (2024, April 20). Saddle Finance Loses More than $10 Million in a Recent DeFi Exploit. Available online: https:\/\/thedefiant.io\/saddle-finance-loses-10-million."},{"key":"ref_45","unstructured":"CoinDesk (2023, April 06). Japan\u2019s Liquid Global Exchange Hacked; $90M in Crypto Siphoned Off. Available online: https:\/\/www.coindesk.com\/markets\/2021\/08\/19\/japans-liquid-global-exchange-hacked-90m-in-crypto-siphoned-off\/."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"564","DOI":"10.1007\/s42524-020-0129-x","article-title":"Blockchain applied to the construction supply chain: A case study with threat model","volume":"7","author":"Shemov","year":"2020","journal-title":"Front. Eng. Manag."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Averin, A., and Averina, O. (2019, January 1\u20134). Review of blockchain technology vulnerabilities and blockchain-system attacks. Proceedings of the 2019 International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon), Vladivostok, Russia.","DOI":"10.1109\/FarEastCon.2019.8934243"},{"key":"ref_48","first-page":"110","article-title":"The Risks of the Blockchain A Review on Current Vulnerabilities and Attacks","volume":"10","author":"Unger","year":"2020","journal-title":"J. Internet Serv. Inf. Secur."},{"key":"ref_49","first-page":"1636","article-title":"Security threats on blockchain and its countermeasures","volume":"5","author":"Rathod","year":"2018","journal-title":"Int. Res. J. Eng. Technol."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1145\/844128.844156","article-title":"Secure routing for structured peer-to-peer overlay networks","volume":"36","author":"Castro","year":"2002","journal-title":"ACM SIGOPS Oper. Syst. Rev."},{"key":"ref_51","first-page":"5307697","article-title":"Multiple-Layer Security Threats on the Ethereum Blockchain and Their Countermeasures","volume":"2022","author":"Duan","year":"2022","journal-title":"Secur. Commun. Networks"},{"key":"ref_52","unstructured":"NFTing (2024, April 20). What is a Replay Attack?. Available online: https:\/\/nfting.store\/blogs\/news\/what-is-a-replay-attack."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"140549","DOI":"10.1109\/ACCESS.2021.3119291","article-title":"The 51% attack on blockchains: A mining behavior study","volume":"9","author":"Orozco","year":"2021","journal-title":"IEEE Access"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"65","DOI":"10.3905\/jai.2019.1.081","article-title":"Cryptocurrency value and 51% attacks: Evidence from event studies","volume":"22","author":"Shanaev","year":"2019","journal-title":"J. Altern. Investments"},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Saad, M., Spaulding, J., Njilla, L., Kamhoua, C.A., Nyang, D., and Mohaisen, A. (2019). Overview of attack surfaces in blockchain. Blockchain for Distributed Systems Security, John Wiley & Sons.","DOI":"10.1002\/9781119519621.ch3"},{"key":"ref_56","unstructured":"Praitheeshan, P., Pan, L., Yu, J., Liu, J., and Doss, R. (2019). Security analysis methods on ethereum smart contract vulnerabilities: A survey. arXiv."},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Vivar, A.L., Castedo, A.T., Orozco, A.L.S., and Villalba, L.J.G. (2020). An Analysis of Smart Contracts Security Threats Alongside Existing Solutions. Entropy, 22.","DOI":"10.3390\/e22020203"},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Sonnino, A., Bano, S., Al-Bassam, M., and Danezis, G. (2020, January 7\u201311). Replay Attacks and Defenses Against Cross-Shard Consensus in Sharded Distributed Ledgers. Proceedings of the 2020 IEEE European Symposium on Security and Privacy (EuroS&P), Genoa, Italy.","DOI":"10.1109\/EuroSP48549.2020.00026"},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"5715","DOI":"10.1109\/TII.2019.2921566","article-title":"Double-Spending with a Sybil Attack in the Bitcoin Decentralized Network","volume":"15","author":"Zhang","year":"2019","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Apostolaki, M., Zohar, A., and Vanbever, L. (2017, January 22\u201324). Hijacking Bitcoin: Routing Attacks on Cryptocurrencies. Proceedings of the 2017 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA.","DOI":"10.1109\/SP.2017.29"},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"770","DOI":"10.1016\/j.future.2017.08.048","article-title":"TrustChain: A Sybil-Resistant Scalable Blockchain","volume":"107","author":"Otte","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Pradhan, S., Tripathy, S., and Nandi, S. (2018, January 16\u201319). Blockchain-Based Security Framework for P2P File Sharing System. Proceedings of the 2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), Indore, India.","DOI":"10.1109\/ANTS.2018.8710078"},{"key":"ref_63","unstructured":"Rajab, T., Manshaei, M.H., Dakhilalian, M., Jadliwala, M., and Rahman, M.A. (2020). On the Feasibility of Sybil Attacks in Shard-Based Permissionless Blockchains. arXiv, Available online: https:\/\/arxiv.org\/abs\/2002.06531."},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Morganti, G., Schiavone, E., and Bondavalli, A. (2018, January 24\u201326). Risk Assessment of Blockchain Technology. Proceedings of the 2018 Eighth Latin-American Symposium on Dependable Computing (LADC), Foz do Igua\u00e7u, Brazil.","DOI":"10.1109\/LADC.2018.00019"},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"3416","DOI":"10.1109\/COMST.2018.2842460","article-title":"A survey on security and privacy issues of bitcoin","volume":"20","author":"Conti","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"1659","DOI":"10.1109\/TNSM.2021.3069502","article-title":"Decentralized and lightweight approach to detect eclipse attacks on proof of work blockchains","volume":"18","author":"Alangot","year":"2021","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"101604","DOI":"10.1016\/j.cose.2019.101604","article-title":"Am I eclipsed? A smart detector of eclipse attacks for Ethereum","volume":"88","author":"Xu","year":"2020","journal-title":"Comput. Secur."},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"9065","DOI":"10.1007\/s10586-024-04509-0","article-title":"Securing internet of things using machine and deep learning methods: A survey","volume":"27","author":"Ghaffari","year":"2024","journal-title":"Clust. Comput."},{"key":"ref_69","doi-asserted-by":"crossref","unstructured":"Yan, K., Zhang, X., and Diao, W. (2024, January 9\u201313). Stealing Trust: Unraveling Blind Message Attacks in Web3 Authentication. Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security (CCS), Salt Lake City, UT, USA.","DOI":"10.1145\/3658644.3670323"},{"key":"ref_70","doi-asserted-by":"crossref","unstructured":"Papaspirou, V., Kantzavelou, I., Yigit, Y., Maglaras, L., and Katsikas, S. (2024, January 29\u201331). A Blockchain-Based Multi-Factor Honeytoken Dynamic Authentication Mechanism. Proceedings of the 19th International Conference on Availability, Reliability and Security (ARES), Vienna, Austria.","DOI":"10.1145\/3664476.3670944"},{"key":"ref_71","unstructured":"Samreen, N.F., and Alalfi, M.H. (2021). A survey of security vulnerabilities in ethereum smart contracts. arXiv."},{"key":"ref_72","doi-asserted-by":"crossref","unstructured":"Xu, J., Dang, F., Ding, X., and Zhou, M. (2020, January 27\u201329). A Survey on Vulnerability Detection Tools of Smart Contract Bytecode. Proceedings of the 2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE), Dalian, China.","DOI":"10.1109\/ICISCAE51034.2020.9236931"},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"12178","DOI":"10.1109\/JIOT.2023.3241544","article-title":"Detection of Vulnerabilities of Blockchain Smart Contracts","volume":"10","author":"He","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_74","doi-asserted-by":"crossref","unstructured":"Choi, J., Ahn, B., Bere, G., Ahmad, S., Mantooth, H.A., and Kim, T. (2021, January 16\u201317). Blockchain-Based Man-in-the-Middle (MITM) Attack Detection for Photovoltaic Systems. Proceedings of the 2021 IEEE Design Methodologies Conference (DMC), Virtual Event.","DOI":"10.1109\/DMC51747.2021.9529949"},{"key":"ref_75","doi-asserted-by":"crossref","unstructured":"Wazid, M., Bera, B., Mitra, A., Das, A.K., and Ali, R. (2020, January 25). Private Blockchain-Envisioned Security Framework for AI-Enabled IoT-Based Drone-Aided Healthcare Services. Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond (DroneCom), London, UK.","DOI":"10.1145\/3414045.3415941"},{"key":"ref_76","unstructured":"Kulkarni, O. (2019). Preventing the Man-in-the-Middle Attack on Internet Communication Using Blockchain Technology. [Ph.D. Thesis, National College of Ireland]."},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"5300","DOI":"10.1109\/TII.2019.2908992","article-title":"Fault diagnosis in photovoltaic arrays using GBSSL method and proposing a fault correction system","volume":"16","author":"Momeni","year":"2019","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_78","doi-asserted-by":"crossref","unstructured":"Homoliak, I., Venugopalan, S., Hum, Q., and Szalachowski, P. (2019, January 14\u201317). A Security Reference Architecture for Blockchains. Proceedings of the 2019 IEEE International Conference on Blockchain (Blockchain), Atlanta, GA, USA.","DOI":"10.1109\/Blockchain.2019.00060"},{"key":"ref_79","doi-asserted-by":"crossref","unstructured":"Kebande, V.R., Awaysheh, F.M., Ikuesan, R.A., Alawadi, S.A., and Alshehri, M.D. (2021). A blockchain-based multi-factor authentication model for a cloud-enabled internet of vehicles. Sensors, 21.","DOI":"10.20944\/preprints202107.0429.v1"},{"key":"ref_80","doi-asserted-by":"crossref","unstructured":"Alkaeed, M., Soliman, M.M., Khan, K.M., and Elfouly, T.M. (2020, January 8). Distributed Framework via Blockchain Smart Contracts for Smart Grid Systems Against Cyber-Attacks. Proceedings of the 2020 11th IEEE Control and System Graduate Research Colloquium (ICSGRC), Johor Bahru, Malaysia.","DOI":"10.1109\/ICSGRC49013.2020.9232544"},{"key":"ref_81","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1007\/s42979-020-00201-3","article-title":"Security considerations for Internet of Things: A survey","volume":"1","author":"Jurcut","year":"2020","journal-title":"SN Comput. Sci."},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"846","DOI":"10.3390\/smartcities6020041","article-title":"An Extensive Preliminary Blockchain Survey from a Maritime Perspective","volume":"6","author":"Abdallah","year":"2023","journal-title":"Smart Cities"},{"key":"ref_83","unstructured":"Frankenfield, J. (2019). 51% Attack, Investopedia."},{"key":"ref_84","doi-asserted-by":"crossref","unstructured":"Ye, C., Li, G., Cai, H., Gu, Y., and Fukuda, A. (2018, January 18\u201321). Analysis of Security in Blockchain: Case Study in 51% Attack Detecting. Proceedings of the 2018 5th International Conference on Dependable Systems and Their Applications (DSA), Guangzhou, China.","DOI":"10.1109\/DSA.2018.00015"},{"key":"ref_85","unstructured":"Bastiaan, M. (2015). Preventing the 51% Attack: A Stochastic Analysis of Two Phase Proof of Work in Bitcoin. [Bachelor\u2019s Thesis, University of Twente]. Available online: https:\/\/essay.utwente.nl\/74730\/."},{"key":"ref_86","doi-asserted-by":"crossref","unstructured":"Lee, H., Shin, M., Kim, K.S., Kang, Y., and Kim, J. (2018). Recipient-Oriented Transaction for Preventing Double Spending Attacks in Private Blockchain, IEEE.","DOI":"10.1109\/SAHCN.2018.8397151"},{"key":"ref_87","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s42786-018-00002-6","article-title":"A survey of blockchain from security perspective","volume":"3","author":"Dasgupta","year":"2019","journal-title":"J. Bank. Financ. Technol."},{"key":"ref_88","doi-asserted-by":"crossref","first-page":"2445","DOI":"10.1007\/s00607-020-00823-8","article-title":"A novel blockchain based framework to secure IoT-LLNs against routing attacks","volume":"102","author":"Sahay","year":"2020","journal-title":"Computing"},{"key":"ref_89","doi-asserted-by":"crossref","unstructured":"Tran, M., Choi, I., Moon, G.J., Vu, A.V., and Kang, M.S. (2020, January 18\u201321). A Stealthier Partitioning Attack Against Bitcoin Peer-to-Peer Network. Proceedings of the 2020 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA.","DOI":"10.1109\/SP40000.2020.00027"},{"key":"ref_90","doi-asserted-by":"crossref","unstructured":"Tekiner, E., Acar, A., Uluagac, A.S., Kirda, E., and Selcuk, A.A. (2021, January 6\u201310). SoK: Cryptojacking Malware. Proceedings of the 2021 IEEE European Symposium on Security and Privacy (EuroS&P), Vienna, Austria.","DOI":"10.1109\/EuroSP51992.2021.00019"},{"key":"ref_91","doi-asserted-by":"crossref","first-page":"4059","DOI":"10.1109\/JIOT.2022.3203249","article-title":"A survey on iot intrusion detection: Federated learning, game theory, social psychology and explainable ai as future directions","volume":"10","author":"Arisdakessian","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_92","first-page":"155","article-title":"BCSDN-IoT: Towards an IoT security architecture based on SDN and Blockchain","volume":"13","author":"ABBASSI","year":"2022","journal-title":"Int. J. Electr. Comput. Eng. Syst."},{"key":"ref_93","doi-asserted-by":"crossref","unstructured":"Mastilak, L., Helebrandt, P., Galinski, M., and Kotuliak, I. (2022). Secure Inter-Domain Routing Based on Blockchain: A Comprehensive Survey. Sensors, 22.","DOI":"10.3390\/s22041437"},{"key":"ref_94","doi-asserted-by":"crossref","unstructured":"Sayeed, S., and Marco-Gisbert, H. (2019). Assessing Blockchain Consensus and Security Mechanisms against the 51% Attack. Appl. Sci., 9.","DOI":"10.3390\/app9091788"},{"key":"ref_95","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1145\/3578581","article-title":"Incentive Mechanisms in Peer-to-Peer Networks\u2014A Systematic Literature Review","volume":"55","author":"Ihle","year":"2023","journal-title":"ACM Comput. Surv."},{"key":"ref_96","doi-asserted-by":"crossref","first-page":"107367","DOI":"10.1016\/j.comnet.2020.107367","article-title":"Blockchain reputation-based consensus: A scalable and resilient mechanism for distributed mistrusting applications","volume":"179","author":"Reis","year":"2020","journal-title":"Comput. Netw."},{"key":"ref_97","doi-asserted-by":"crossref","unstructured":"Alsunbul, A., Elmedany, W., and Al-Ammal, H. (2021, January 6\u20137). Blockchain Application in Healthcare Industry: Attacks and Countermeasures. Proceedings of the 2021 International Conference on Data Analytics for Business and Industry (ICDABI), Sakheer, Bahrain.","DOI":"10.1109\/ICDABI53623.2021.9655852"},{"key":"ref_98","doi-asserted-by":"crossref","unstructured":"Anita, N., and Vijayalakshmi, M. (2019, January 6\u20138). Blockchain Security Attack: A Brief Survey. Proceedings of the 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Kanpur, India.","DOI":"10.1109\/ICCCNT45670.2019.8944615"},{"key":"ref_99","first-page":"111","article-title":"Detection and mitigation of the eclipse attack in chord overlays","volume":"13","author":"Rottondi","year":"2016","journal-title":"Int. J. Comput. Sci. Eng."},{"key":"ref_100","unstructured":"Ekparinya, P., Gramoli, V., and Jourjon, G. (2018). Double-Spending Risk Quantification in Private, Consortium and Public Ethereum Blockchains. arXiv."},{"key":"ref_101","unstructured":"Quintyne-Collins, M. (2025, March 25). Short Paper: Towards Characterizing Sybil Attacks in Cryptocurrency Mixers. Cryptology ePrint Archive, Paper 2019\/1111. Available online: https:\/\/eprint.iacr.org\/2019\/1111."},{"key":"ref_102","doi-asserted-by":"crossref","unstructured":"Swathi, P., Modi, C., and Patel, D. (2019, January 6\u20138). Preventing Sybil Attack in Blockchain Using Distributed Behavior Monitoring of Miners. Proceedings of the 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Kanpur, India.","DOI":"10.1109\/ICCCNT45670.2019.8944507"},{"key":"ref_103","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1145\/3687251.3687253","article-title":"Smart Contract Vulnerability Detection: The Role of Large Language Model (LLM)","volume":"24","author":"Boi","year":"2024","journal-title":"ACM SIGAPP Appl. Comput. Rev."},{"key":"ref_104","first-page":"17","article-title":"When ChatGPT Meets Smart Contract Vulnerability Detection: How Far Are We?","volume":"33","author":"Chen","year":"2024","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"ref_105","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1145\/3637229","article-title":"Smart Contract Code Repair Recommendation based on Reinforcement Learning and Multi-metric Optimization","volume":"33","author":"Guo","year":"2024","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"ref_106","doi-asserted-by":"crossref","unstructured":"Rabieinejad, E., Yazdinejad, A., and Parizi, R.M. (2021, January 22\u201325). A Deep Learning Model for Threat Hunting in Ethereum Blockchain. Proceedings of the 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Shenyang, China.","DOI":"10.1109\/TrustCom53373.2021.00160"},{"key":"ref_107","doi-asserted-by":"crossref","unstructured":"Wu, Z., Wu, J., Zhang, H., Li, Z., Chen, J., Zheng, Z., Xia, Q., Fan, G., and Zhen, Y. (2024, January 15\u201319). DAppFL: Just-in-Time Fault Localization for Decentralized Applications in Web3. Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), Vienna, Austria.","DOI":"10.1145\/3650212.3652116"},{"key":"ref_108","doi-asserted-by":"crossref","first-page":"4551","DOI":"10.1007\/s10586-023-04202-8","article-title":"Ethereum blockchain-based three factor authentication and multi-contract access control for secure smart home environment in 5G networks","volume":"27","author":"Atiewi","year":"2024","journal-title":"Clust. Comput."},{"key":"ref_109","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/s10723-023-09687-6","article-title":"ICSMPC: Design of an Iterative-Learning Contextual Side Chaining Model for Improving Security of Priority-Aware Cloud Resources","volume":"21","author":"Brahmam","year":"2023","journal-title":"J. Grid Comput."},{"key":"ref_110","doi-asserted-by":"crossref","first-page":"672","DOI":"10.1007\/s12083-020-01022-0","article-title":"A secure vehicle theft detection framework using Blockchain and smart contract","volume":"14","author":"Das","year":"2021","journal-title":"Peer- Netw. Appl."},{"key":"ref_111","doi-asserted-by":"crossref","unstructured":"Heikamp, F., Pan, L., Doss, R., Trujillo-Rasua, R., and Ruj, S. (2023, January 10\u201314). ForTrac: A Secure NFT-Based Forward Traceability System for Providing Data Accuracy and Completeness. Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure (BSCI), Melbourne, VIC, Australia.","DOI":"10.1145\/3594556.3594608"},{"key":"ref_112","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1145\/3597206","article-title":"Semantic-Enriched Code Knowledge Graph to Reveal Unknowns in Smart Contract Code Reuse","volume":"32","author":"Huang","year":"2023","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"ref_113","doi-asserted-by":"crossref","first-page":"8127","DOI":"10.1007\/s11042-024-19232-6","article-title":"Blockchain-enabled IoT access control model for sharing electronic healthcare data","volume":"84","author":"Ilyas","year":"2024","journal-title":"Multimed. Tools Appl."},{"key":"ref_114","doi-asserted-by":"crossref","unstructured":"Liu, B., Sun, S., and Szalachowski, P. (July, January 29). SMACS: Smart Contract Access Control Service. Proceedings of the 2020 50th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), Valencia, Spain.","DOI":"10.1109\/DSN48063.2020.00039"},{"key":"ref_115","doi-asserted-by":"crossref","unstructured":"Si, J.J., Sharma, T., and Wang, K.Y. (2024, January 11\u201316). Understanding User-Perceived Security Risks and Mitigation Strategies in the Web3 Ecosystem. Proceedings of the CHI Conference on Human Factors in Computing Systems (CHI \u201924), Honolulu, HI, USA.","DOI":"10.1145\/3613904.3642291"},{"key":"ref_116","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1145\/3570603","article-title":"Characterizing Cryptocurrency-themed Malicious Browser Extensions","volume":"6","author":"Wang","year":"2022","journal-title":"Proc. ACM Meas. Anal. Comput. Syst."},{"key":"ref_117","first-page":"269","article-title":"Correction to: SHBF: A Secure and Scalable Hybrid Blockchain Framework for Resolving Trilemma Challenges","volume":"16","author":"Ali","year":"2024","journal-title":"Int. J. Inf. Technol."},{"key":"ref_118","unstructured":"Vivekanandan, G., Divya, B., Madhav, V.T., Naveen, K., Karthick, T.K., and Yuvanesh, P. (2024, January 17\u201318). VoteChain: Promising a Secure and Transparent Election Using Blockchain and Biometrics. Proceedings of the 2024 International Conference on Power, Energy, Control and Transmission Systems (ICPECTS), Chennai, India."},{"key":"ref_119","first-page":"Article 19777","article-title":"FLBC-IDS: A Federated Learning and Blockchain-Based Intrusion Detection System for Secure IoT Environments","volume":"83","author":"Govindaram","year":"2024","journal-title":"Multimed. Tools Appl."},{"key":"ref_120","doi-asserted-by":"crossref","first-page":"3751","DOI":"10.1007\/s10586-021-03366-5","article-title":"BlockTree: A nonlinear structured, scalable and distributed ledger scheme for processing digital transactions","volume":"24","author":"Vishwakarma","year":"2021","journal-title":"Clust. Comput."},{"key":"ref_121","doi-asserted-by":"crossref","unstructured":"Yan, K., Zhang, J., Liu, X., Diao, W., and Guo, S. (May, January 30). Bad Apples: Understanding the Centralized Security Risks in Decentralized Ecosystems. Proceedings of the ACM Web Conference 2023 (WWW \u201923), Austin, TX, USA.","DOI":"10.1145\/3543507.3583393"},{"key":"ref_122","doi-asserted-by":"crossref","unstructured":"Niu, J., Peng, W., Zhang, X., and Zhang, Y. (2022, January 7\u201311). NARRATOR: Secure and Practical State Continuity for Trusted Execution in the Cloud. Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS), Los Angeles, CA, USA.","DOI":"10.1145\/3548606.3560620"},{"key":"ref_123","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/s10664-024-10446-8","article-title":"OpenSCV: An open hierarchical taxonomy for smart contract vulnerabilities","volume":"29","author":"Vidal","year":"2024","journal-title":"Empir. Softw. Eng."},{"key":"ref_124","doi-asserted-by":"crossref","unstructured":"Chen, J., Chen, C., Hu, J., Grundy, J., Wang, Y., Chen, T., and Zheng, Z. (2024, January 15\u201319). Identifying Smart Contract Security Issues in Code Snippets from Stack Overflow. Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), Vienna, Austria.","DOI":"10.1145\/3650212.3680353"},{"key":"ref_125","doi-asserted-by":"crossref","unstructured":"Weiss, K., Ferreira Torres, C., and Wendland, F. (2024, January 21\u201323). Analyzing the Impact of Copying-and-Pasting Vulnerable Solidity Code Snippets from Question-and-Answer Websites. Proceedings of the 2024 ACM on Internet Measurement Conference (IMC), Madrid, Spain.","DOI":"10.1145\/3646547.3688437"},{"key":"ref_126","doi-asserted-by":"crossref","unstructured":"Akhras, R., Hajj, W.E., Hajj, H., Shaban, K., and Jaber, R. (2023, January 9\u201311). ECC: Enhancing Smart Grid Communication with Ethereum Blockchain, Asymmetric Cryptography, and Cloud Services. Proceedings of the 2023 IEEE 10th International Conference on Data Science and Advanced Analytics (DSAA), Thessaloniki, Greece.","DOI":"10.1109\/DSAA60987.2023.10302581"},{"key":"ref_127","doi-asserted-by":"crossref","unstructured":"Eshghie, M., Artho, C., Stammler, H., Ahrendt, W., Hildebrandt, T., and Schneider, G. (2024, January 16\u201320). HighGuard: Cross-Chain Business Logic Monitoring of Smart Contracts. Proceedings of the 39th IEEE\/ACM International Conference on Automated Software Engineering (ASE), Sacramento, CA, USA.","DOI":"10.1145\/3691620.3695356"},{"key":"ref_128","doi-asserted-by":"crossref","unstructured":"Haugum, T., Hoff, B., Alsadi, M., and Li, J. (2022, January 13\u201315). Security and Privacy Challenges in Blockchain Interoperability\u2014A Multivocal Literature Review. Proceedings of the International Conference on Evaluation and Assessment in Software Engineering (EASE), Gothenburg, Sweden.","DOI":"10.1145\/3530019.3531345"},{"key":"ref_129","doi-asserted-by":"crossref","unstructured":"Tran, T.D., Vo, K.A., Phan, D.T., Tan, C.N., and Pham, V.H. (2024, January 26\u201328). ChainSniper: A Machine Learning Approach for Auditing Cross-Chain Smart Contracts. Proceedings of the 2024 9th International Conference on Intelligent Information Technology (ICIIT), Ho Chi Minh City, Vietnam.","DOI":"10.1145\/3654522.3654577"},{"key":"ref_130","doi-asserted-by":"crossref","unstructured":"Zheng, P., Luo, X., and Zheng, Z. (2023, January 14\u201320). BSHUNTER: Detecting and Tracing Defects of Bitcoin Scripts. Proceedings of the 2023 IEEE\/ACM 45th International Conference on Software Engineering (ICSE), Melbourne, Australia.","DOI":"10.1109\/ICSE48619.2023.00037"},{"key":"ref_131","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/s10723-023-09699-2","article-title":"Preservation of Sensitive Data Using Multi-Level Blockchain-Based Secured Framework for Edge Network Devices","volume":"21","author":"Awasthi","year":"2023","journal-title":"J. Grid Comput."},{"key":"ref_132","doi-asserted-by":"crossref","unstructured":"Fischlin, M., and G\u00fcnther, F. (2023, January 26\u201330). Verifiable Verification in Cryptographic Protocols. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (CCS), Copenhagen, Denmark.","DOI":"10.1145\/3576915.3623151"},{"key":"ref_133","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1007\/s11128-024-04432-8","article-title":"QBIoV: A secure data sharing scheme for the Internet of vehicles based on quantum-enabled blockchain","volume":"23","author":"Liu","year":"2024","journal-title":"Quantum Inf. Process."},{"key":"ref_134","doi-asserted-by":"crossref","first-page":"1577","DOI":"10.1007\/s12083-020-00914-5","article-title":"RAIAP: Renewable authentication on isolated anonymous profiles: A GDPR compliant self-sovereign architecture for distributed systems","volume":"13","author":"Pedrosa","year":"2020","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"ref_135","doi-asserted-by":"crossref","first-page":"2207","DOI":"10.1007\/s00202-024-02636-w","article-title":"An optimized approach with 128-bit key management for IoT-enabled smart grid: Enhancing efficiency, security, and sustainability","volume":"107","author":"Ramya","year":"2025","journal-title":"Electr. Eng."},{"key":"ref_136","doi-asserted-by":"crossref","first-page":"711","DOI":"10.1007\/s12145-023-01194-2","article-title":"Enhanced Elliptic Curve-Diffie Hellman Technique with Bigdata Analytics for Satellite Image Security Enhancement in Internet of Things Systems","volume":"17","author":"Reddy","year":"2024","journal-title":"Earth Sci. Inform."},{"key":"ref_137","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1007\/s10916-024-02120-9","article-title":"Electronic Health Records Sharing Based on Consortium Blockchain","volume":"48","author":"Wu","year":"2024","journal-title":"J. Med. Syst."},{"key":"ref_138","doi-asserted-by":"crossref","unstructured":"Antonopoulos, P., Kaushik, R., Kodavalla, H., Rosales Aceves, S., Wong, R., Anderson, J., and Szymaszek, J. (2021, January 20\u201325). SQL Ledger: Cryptographically Verifiable Data in Azure SQL Database. Proceedings of the 2021 International Conference on Management of Data (SIGMOD), Xi\u2019an, China.","DOI":"10.1145\/3448016.3457558"},{"key":"ref_139","doi-asserted-by":"crossref","unstructured":"Shahaab, A., Hewage, C., and Khan, I. (2021, January 26\u201328). Preventing Spoliation of Evidence with Blockchain: A Perspective from South Asia. Proceedings of the 2021 3rd International Conference on Blockchain Technology (ICBCT), Shanghai, China.","DOI":"10.1145\/3460537.3460550"},{"key":"ref_140","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1007\/s12083-022-01410-8","article-title":"Tamper-proof multitenant data storage using blockchain","volume":"16","author":"Sharma","year":"2023","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"ref_141","doi-asserted-by":"crossref","first-page":"17467","DOI":"10.1007\/s00521-024-10039-y","article-title":"Deep neural network-based secure healthcare framework","volume":"36","author":"Aldaej","year":"2024","journal-title":"Neural Comput. Appl."},{"key":"ref_142","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1145\/3446373","article-title":"Blockchain-empowered Data-driven Networks: A Survey and Outlook","volume":"54","author":"Li","year":"2022","journal-title":"ACM Comput. Surv."},{"key":"ref_143","doi-asserted-by":"crossref","unstructured":"Liu, T., Liu, J., Wang, J., Zhai, D., Liu, Y., and He, X. (2021, January 17\u201319). Anonymous Storage and Verification Model of IIoT Based on Blockchain: Anonymous storage and verification model of IIoT production status based on blockchain. Proceedings of the 2021 4th International Conference on Blockchain Technology and Applications (ICBTA), Xi\u2019an, China.","DOI":"10.1145\/3510487.3510508"},{"key":"ref_144","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1007\/s10462-024-10908-x","article-title":"Securing data and preserving privacy in cloud IoT-based technologies: An analysis of assessing threats and developing effective safeguards","volume":"57","author":"Pathak","year":"2024","journal-title":"Artif. Intell. Rev."},{"key":"ref_145","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1145\/3664287","article-title":"OTI-IoT: A Blockchain-based Operational Threat Intelligence Framework for Multi-vector DDoS Attacks","volume":"24","author":"Aguru","year":"2024","journal-title":"ACM Trans. Internet Technol."},{"key":"ref_146","doi-asserted-by":"crossref","first-page":"4515","DOI":"10.1007\/s10586-023-04184-7","article-title":"CD-TMS: A combinatorial design-based token management system to enhance security and performance in blockchain","volume":"27","author":"Hadian","year":"2024","journal-title":"Clust. Comput."},{"key":"ref_147","doi-asserted-by":"crossref","unstructured":"He, Z., Li, Z., Qiao, A., Luo, X., Zhang, X., Chen, T., Song, S., Liu, D., and Niu, W. (2024, January 20\u201323). Nurgle: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulation. Proceedings of the 2024 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA.","DOI":"10.1109\/SP54263.2024.00125"},{"key":"ref_148","doi-asserted-by":"crossref","unstructured":"Janjua, H.A., Yue, L., and Hayat, S. (2023, January 13\u201315). Smart Scan: An Approach to Detect Denial of Service Vulnerability in Ethereum Smart Contracts. Proceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering (EITCE), Xiamen, China.","DOI":"10.1145\/3650400.3650663"},{"key":"ref_149","doi-asserted-by":"crossref","unstructured":"Li, K., Wang, Y., and Tang, Y. (2021, January 15\u201319). DETER: Denial of Ethereum Txpool sERvices. Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (CCS), Coex, Republic of Korea.","DOI":"10.1145\/3460120.3485369"},{"key":"ref_150","doi-asserted-by":"crossref","unstructured":"Mo, Y., Chen, J., Wang, Y., and Zheng, Z. (2023, January 17\u201321). Toward Automated Detecting Unanticipated Price Feed in Smart Contract. Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), Seattle, WA, USA.","DOI":"10.1145\/3597926.3598133"},{"key":"ref_151","doi-asserted-by":"crossref","first-page":"19879","DOI":"10.1007\/s11042-021-11859-z","article-title":"A detailed survey of denial of service for IoT and multimedia systems: Past, present and futuristic development","volume":"81","author":"Verma","year":"2022","journal-title":"Multimed. Tools Appl."},{"key":"ref_152","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1007\/s10660-023-09702-8","article-title":"Securing blockchain-based crowdfunding platforms: An integrated graph neural networks and machine learning approach","volume":"24","author":"Zkik","year":"2024","journal-title":"Electron. Commer. Res."},{"key":"ref_153","doi-asserted-by":"crossref","first-page":"183466","DOI":"10.1109\/ACCESS.2024.3510467","article-title":"Blockchain-Secure Gaming Environments: A Comprehensive Survey","volume":"12","author":"Rishiwal","year":"2024","journal-title":"IEEE Access"},{"key":"ref_154","doi-asserted-by":"crossref","unstructured":"Xia, P., Wang, H., Yu, Z., Liu, X., Luo, X., Xu, G., and Tyson, G. (2022, January 25\u201327). Challenges in Decentralized Name Management: The Case of ENS. Proceedings of the 22nd ACM Internet Measurement Conference (IMC), Nice, France.","DOI":"10.1145\/3517745.3561469"},{"key":"ref_155","doi-asserted-by":"crossref","unstructured":"Wang, Y., Hsin, W.J., and Lamsal, M. (2022, January 3\u20135). EdGENI: Making GENI User-Friendly for General Computer Education. Proceedings of the 53rd ACM Technical Symposium on Computer Science Education (SIGCSE), Providence, RI, USA.","DOI":"10.1145\/3478431.3499300"},{"key":"ref_156","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1145\/3439725","article-title":"The Application of the Blockchain Technology in Voting Systems: A Review","volume":"54","author":"Huang","year":"2022","journal-title":"ACM Comput. Surv."},{"key":"ref_157","doi-asserted-by":"crossref","unstructured":"Ahmed-Rengers, M. (2019, January 23\u201326). FrameProv: Towards End-to-End Video Provenance. Proceedings of the New Security Paradigms Workshop (NSPW), San Carlos, Costa Rica.","DOI":"10.1145\/3368860.3368866"},{"key":"ref_158","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1145\/3460093","article-title":"SADPonzi: Detecting and Characterizing Ponzi Schemes in Ethereum Smart Contracts","volume":"5","author":"Chen","year":"2021","journal-title":"Proc. ACM Meas. Anal. Comput. Syst."},{"key":"ref_159","doi-asserted-by":"crossref","unstructured":"Faccia, A., Mo\u015fteanu, N.R., Cavaliere, L.P.L., and Mataruna-Dos-Santos, L.J. (2020, January 18\u201320). Electronic Money Laundering, The Dark Side of Fintech: An Overview of the Most Recent Cases. Proceedings of the 2020 12th International Conference on Information Management and Engineering (ICIME), Amsterdam, The Netherlands.","DOI":"10.1145\/3430279.3430284"},{"key":"ref_160","doi-asserted-by":"crossref","unstructured":"Fan, S., Min, T., Wu, X., and Cai, W. (2023, January 23\u201328). Altruistic and Profit-Oriented: Making Sense of Roles in Web3 Community from Airdrop Perspective. Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems (CHI), Hamburg, Germany.","DOI":"10.1145\/3544548.3581173"},{"key":"ref_161","doi-asserted-by":"crossref","first-page":"18825","DOI":"10.1007\/s00521-024-10122-4","article-title":"Suspicious transaction alert and blocking system for cryptocurrency exchanges in metaverse\u2019s social media universes: RG-guard","volume":"36","year":"2024","journal-title":"Neural Comput. Appl."},{"key":"ref_162","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1109\/TCE.2023.3323356","article-title":"A Secure and Efficient Charitable Donation System Based on Ethereum Blockchain and Searchable Encryption","volume":"70","author":"He","year":"2024","journal-title":"IEEE Trans. Consum. Electron."},{"key":"ref_163","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1145\/3392155","article-title":"Understanding (Mis)Behavior on the EOSIO Blockchain","volume":"4","author":"Huang","year":"2020","journal-title":"Proc. ACM Meas. Anal. Comput. Syst."},{"key":"ref_164","doi-asserted-by":"crossref","unstructured":"Iyer, V., Shah, K., Rane, S., and Shankarmani, R. (2021, January 7\u201311). Decentralised Peer-to-Peer Crop Insurance. Proceedings of the 3rd ACM International Symposium on Blockchain and Secure Critical Infrastructure (BSCI), Hong Kong, China.","DOI":"10.1145\/3457337.3457837"},{"key":"ref_165","doi-asserted-by":"crossref","unstructured":"Kuchumov, A., Pecheritsa, E., Chaikovskaya, A., and Maslova, E. (2021, January 15\u201317). Digitalization of Economics: Modern Financial Technologies and Their Influence on Economic Security. Proceedings of the IV International Scientific and Practical Conference, St. Petersburg, Russia.","DOI":"10.1145\/3487757.3490866"},{"key":"ref_166","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1145\/3633514","article-title":"EtherShield: Time-interval Analysis for Detection of Malicious Behavior on Ethereum","volume":"24","author":"Pan","year":"2024","journal-title":"ACM Trans. Internet Technol."},{"key":"ref_167","doi-asserted-by":"crossref","unstructured":"Ralli, R., Jugran, G., Gaurav, M., and Goyal, M. (2024, January 8\u201310). An Ensemble Based Fraudulent Blockchain Account Detection System. Proceedings of the 2024 Sixteenth International Conference on Contemporary Computing (IC3), Noida, India.","DOI":"10.1145\/3675888.3676068"},{"key":"ref_168","doi-asserted-by":"crossref","first-page":"10139","DOI":"10.1007\/s00500-024-09701-3","article-title":"Block chain-based trusted smart contract for secure mobile user payment gateway in e-health systems","volume":"28","author":"Saranya","year":"2024","journal-title":"Soft Comput."},{"key":"ref_169","doi-asserted-by":"crossref","unstructured":"Su, J., Lin, X., Fang, Z., Zhu, Z., Chen, J., Zheng, Z., Lv, W., and Wang, J. (2023, January 11\u201315). DeFiWarder: Protecting DeFi Apps from Token Leaking Vulnerabilities. Proceedings of the 2023 38th IEEE\/ACM International Conference on Automated Software Engineering (ASE), Luxembourg.","DOI":"10.1109\/ASE56229.2023.00110"},{"key":"ref_170","doi-asserted-by":"crossref","unstructured":"Wu, C., Chen, J., Wang, Z., Liang, R., and Du, R. (2024, January 16\u201320). Semantic Sleuth: Identifying Ponzi Contracts via Large Language Models. Proceedings of the 39th IEEE\/ACM International Conference on Automated Software Engineering (ASE), Sacramento, CA, USA.","DOI":"10.1145\/3691620.3695055"},{"key":"ref_171","doi-asserted-by":"crossref","unstructured":"Wu, C., Chen, J., Zhao, Z., He, K., Xu, G., Wu, Y., Wang, H., Li, H., Liu, Y., and Xiang, Y. (2024, January 14\u201318). TokenScout: Early Detection of Ethereum Scam Tokens via Temporal Graph Learning. Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security (CCS), Salt Lake City, UT, USA.","DOI":"10.1145\/3658644.3690234"},{"key":"ref_172","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1145\/3505263","article-title":"Time-travel Investigation: Toward Building a Scalable Attack Detection Framework on Ethereum","volume":"31","author":"Wu","year":"2022","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"ref_173","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Sun, J., Ma, F., Chen, Y., Yan, Z., and Jiang, Y. (2024, January 14\u201320). Stop Pulling My Rug: Exposing Rug Pull Risks in Crypto Token to Investors. Proceedings of the 46th International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP), Lisbon, Portugal.","DOI":"10.1145\/3639477.3639722"},{"key":"ref_174","doi-asserted-by":"crossref","unstructured":"Amin Rezaei, A., Precht, H., and Marx G\u00f3mez, J. (2021, January 26\u201328). Supporting Prostitutes Protection Act through DLT. Proceedings of the 2021 The 3rd International Conference on Blockchain Technology (ICBCT), Shanghai, China.","DOI":"10.1145\/3460537.3460548"},{"key":"ref_175","doi-asserted-by":"crossref","unstructured":"Le, M.Q., Le, H.D., Dinh-Duc, A.V., and Tran, T.T. (2023, January 7\u20138). IU-TransCert: A Blockchain-Based System for Academic Credentials with Auditability. Proceedings of the 12th International Symposium on Information and Communication Technology (SoICT), Ho Chi Minh City, Vietnam.","DOI":"10.1145\/3628797.3628822"},{"key":"ref_176","doi-asserted-by":"crossref","first-page":"1231","DOI":"10.1007\/s10207-023-00688-w","article-title":"Analyzing and comparing the security of self-sovereign identity management systems through threat modeling","volume":"22","author":"Lockenvitz","year":"2023","journal-title":"Int. J. Inf. Secur."},{"key":"ref_177","doi-asserted-by":"crossref","unstructured":"Putz, B., Vielberth, M., and Pernul, G. (2022, January 23\u201326). BISCUIT\u2014Blockchain Security Incident Reporting Based on Human Observations. Proceedings of the 17th International Conference on Availability, Reliability and Security (ARES), Vienna, Austria.","DOI":"10.1145\/3538969.3538984"},{"key":"ref_178","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1007\/s10207-021-00561-8","article-title":"Insider attack mitigation in a smart metering infrastructure using reputation score and blockchain technology","volume":"21","author":"Singh","year":"2022","journal-title":"Int. J. Inf. Secur."},{"key":"ref_179","doi-asserted-by":"crossref","first-page":"1669","DOI":"10.1007\/s00500-023-09515-9","article-title":"Designing of music copyright protection system based on deep belief network and blockchain","volume":"28","author":"Fang","year":"2024","journal-title":"Soft Comput."},{"key":"ref_180","doi-asserted-by":"crossref","unstructured":"Hamza, R., Dao, M.S., Ito, S., and Koji, Z. (2022, January 1). Towards Intellectual Property Rights Protection in Big Data. Proceedings of the 3rd ACM Workshop on Intelligent Cross-Data Analysis and Retrieval (ICDAR), Newark, NJ, USA.","DOI":"10.1145\/3512731.3534211"},{"key":"ref_181","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1145\/3652519","article-title":"A Self-Defense Copyright Protection Scheme for NFT Image Art Based on Information Embedding","volume":"21","author":"Wang","year":"2025","journal-title":"ACM Trans. Multimed. Comput. Commun. Appl."},{"key":"ref_182","doi-asserted-by":"crossref","unstructured":"Xu, L., Chen, L., Gao, Z., Fan, X., and Shi, W. (2020, January 27\u201329). DL-DP: Improving the Security of Industrial IoT with Decentralized Ledger Defined Perimeter. Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, Taipei, Taiwan.","DOI":"10.1145\/3384943.3409422"},{"key":"ref_183","doi-asserted-by":"crossref","unstructured":"Thomasset, C., and Barrera, D. (2020, January 7\u201311). SERENIoT: Distributed Network Security Policy Management and Enforcement for Smart Homes. Proceedings of the 2020 Annual Computer Security Applications Conference (ACSAC), Austin, TX, USA.","DOI":"10.1145\/3427228.3427235"},{"key":"ref_184","doi-asserted-by":"crossref","first-page":"2237","DOI":"10.1007\/s12083-024-01712-z","article-title":"Enhancing cybersecurity in IoT networks: SLSTM-WCO algorithm for anomaly detection","volume":"17","author":"Sharma","year":"2024","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"ref_185","doi-asserted-by":"crossref","unstructured":"Saxena, A., and Mittal, S. (2022, January 4\u20136). Internet of Medical Things (IoMT) Security and Privacy: A Survey of Recent Advances and Enabling Technologies. Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing (IC3), Noida, India.","DOI":"10.1145\/3549206.3549301"},{"key":"ref_186","doi-asserted-by":"crossref","first-page":"1225","DOI":"10.1007\/s12083-019-00856-7","article-title":"Research on secure transmission and storage of energy IoT information based on Blockchain","volume":"13","author":"Rui","year":"2020","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"ref_187","doi-asserted-by":"crossref","first-page":"1263","DOI":"10.1007\/s10207-022-00611-9","article-title":"An efficient intrusion detection system for MQTT-IoT using enhanced chaotic salp swarm algorithm and LightGBM","volume":"21","author":"Prajisha","year":"2022","journal-title":"Int. J. Inf. Secur."},{"key":"ref_188","doi-asserted-by":"crossref","first-page":"2926","DOI":"10.1007\/s12083-021-01151-0","article-title":"Blockchain\u2013a promising solution to internet of things: A comprehensive analysis, opportunities, challenges and future research issues","volume":"14","author":"Paul","year":"2021","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"ref_189","doi-asserted-by":"crossref","first-page":"131605","DOI":"10.1109\/ACCESS.2024.3460428","article-title":"Cybersecurity Anomaly Detection: AI and Ethereum Blockchain for a Secure and Tamperproof IoHT Data Management","volume":"12","author":"Olawale","year":"2024","journal-title":"IEEE Access"},{"key":"ref_190","doi-asserted-by":"crossref","unstructured":"Niavis, H., and Loupos, K. (2022, January 23\u201326). ConSenseIoT: A Consensus Algorithm for Secure and Scalable Blockchain in the IoT context. Proceedings of the 17th International Conference on Availability, Reliability and Security (ARES 2022), Vienna, Austria.","DOI":"10.1145\/3538969.3543811"},{"key":"ref_191","doi-asserted-by":"crossref","first-page":"4129","DOI":"10.1007\/s10586-022-03645-9","article-title":"Integration of blockchain and collaborative intrusion detection for secure data transactions in industrial IoT: A survey","volume":"25","author":"Mathew","year":"2022","journal-title":"Clust. Comput."},{"key":"ref_192","doi-asserted-by":"crossref","first-page":"1331","DOI":"10.1007\/s10586-020-03190-3","article-title":"Privacy protection for fog computing and the internet of things data based on blockchain","volume":"24","author":"Liu","year":"2021","journal-title":"Clust. Comput."},{"key":"ref_193","doi-asserted-by":"crossref","unstructured":"Lai, E., and Luo, W. (2020, January 10\u201312). Static Analysis of Integer Overflow of Smart Contracts in Ethereum. Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy (CSP 2020), Nanjing, China.","DOI":"10.1145\/3377644.3377650"},{"key":"ref_194","doi-asserted-by":"crossref","first-page":"134521","DOI":"10.1109\/ACCESS.2024.3462735","article-title":"BlockDLO: Blockchain Computing With Deep Learning Orchestration for Secure Data Communication in IoT Environment","volume":"12","author":"Kokila","year":"2024","journal-title":"IEEE Access"},{"key":"ref_195","doi-asserted-by":"crossref","first-page":"36183","DOI":"10.1007\/s11042-021-11350-9","article-title":"A review study on blockchain-based IoT security and forensics","volume":"80","author":"Kamal","year":"2021","journal-title":"Multimed. Tools Appl."},{"key":"ref_196","doi-asserted-by":"crossref","first-page":"2877","DOI":"10.1007\/s10586-023-04113-8","article-title":"A security framework to enhance IoT device identity and data access through blockchain consensus model","volume":"27","author":"Janani","year":"2024","journal-title":"Clust. Comput."},{"key":"ref_197","doi-asserted-by":"crossref","first-page":"87903","DOI":"10.1007\/s11042-024-18845-1","article-title":"A secured trusted routing using the structure of a novel directed acyclic graph-blockchain in mobile ad hoc network internet of things environment","volume":"83","author":"Ilakkiya","year":"2024","journal-title":"Multimed. Tools Appl."},{"key":"ref_198","doi-asserted-by":"crossref","unstructured":"Ghadi, Y.Y., Mazhar, T., Shahzad, T., Amir Khan, M., Abd-Alrazaq, A., Ahmed, A., and Hamam, H. (2024). The role of blockchain to secure internet of medical things. Sci. Rep., 14.","DOI":"10.1038\/s41598-024-68529-x"},{"key":"ref_199","doi-asserted-by":"crossref","first-page":"23083","DOI":"10.1007\/s11042-023-16395-6","article-title":"Review on intrusion detection system for IoT\/IIo -brief study","volume":"83","author":"Bansal","year":"2023","journal-title":"Multimed. Tools Appl."},{"key":"ref_200","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/s10586-020-03137-8","article-title":"A survey on boosting IoT security and privacy through blockchain: Exploration, requirements, and open issues","volume":"24","author":"Alfandi","year":"2021","journal-title":"Clust. Comput."},{"key":"ref_201","doi-asserted-by":"crossref","first-page":"60265","DOI":"10.1007\/s11042-023-18028-4","article-title":"DDoS mitigation using blockchain and machine learning techniques","volume":"83","author":"Jawahar","year":"2024","journal-title":"Multimed. Tools Appl."},{"key":"ref_202","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1145\/3453153","article-title":"A Survey on Windows-based Ransomware Taxonomy and Detection Mechanisms","volume":"54","author":"Moussaileb","year":"2022","journal-title":"ACM Comput. Surv."},{"key":"ref_203","doi-asserted-by":"crossref","unstructured":"England, P., Malvar, H.S., Horvitz, E., Stokes, J.W., Fournet, C., Burke-Aguero, R., Chamayou, A., Clebsch, S., Costa, M., and Deutscher, J. (2021, January 28\u201330). AMP: Authentication of Media via Provenance. Proceedings of the 12th ACM Multimedia Systems Conference (MMSys \u201921), Istanbul, Turkey.","DOI":"10.1145\/3458305.3459599"},{"key":"ref_204","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1007\/s10462-023-10679-x","article-title":"Deepfakes: Current and future trends","volume":"57","author":"Yazidi","year":"2024","journal-title":"Artif. Intell. Rev."},{"key":"ref_205","doi-asserted-by":"crossref","first-page":"3974","DOI":"10.1007\/s10489-022-03766-z","article-title":"Deepfakes generation and detection: State-of-the-art, open challenges, countermeasures, and way forward","volume":"53","author":"Masood","year":"2023","journal-title":"Appl. Intell."},{"key":"ref_206","doi-asserted-by":"crossref","unstructured":"Singleton, L., Zhao, R., Song, M., and Siy, H. (2020, January 7\u20139). CryptoTutor: Teaching Secure Coding Practices through Misuse Pattern Detection. Proceedings of the 21st Annual Conference on Information Technology Education (SIGITE \u201920), Omaha, NE, USA.","DOI":"10.1145\/3368308.3415419"},{"key":"ref_207","doi-asserted-by":"crossref","unstructured":"Hua, B., Ouyang, W., Jiang, C., Fan, Q., and Pan, Z. (2021, January 6\u201310). Rupair: Towards Automatic Buffer Overflow Detection and Rectification for Rust. Proceedings of the Annual Computer Security Applications Conference (ACSAC \u201921), Austin, TX, USA.","DOI":"10.1145\/3485832.3485841"},{"key":"ref_208","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1007\/s10462-024-10907-y","article-title":"RPL-based attack detection approaches in IoT networks: Review and taxonomy","volume":"57","author":"Alfriehat","year":"2024","journal-title":"Artif. Intell. Rev."},{"key":"ref_209","doi-asserted-by":"crossref","unstructured":"Coretti, S., Kiayias, A., Moore, C., and Russell, A. (2022, January 7\u201311). The Generals\u2019 Scuttlebutt: Byzantine-Resilient Gossip Protocols. Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS \u201922), Los Angeles, CA, USA.","DOI":"10.1145\/3548606.3560638"},{"key":"ref_210","doi-asserted-by":"crossref","unstructured":"Dai, T., Jeitner, P., Shulman, H., and Waidner, M. (2021, January 23\u201327). From IP to transport and beyond: Cross-layer attacks against applications. Proceedings of the 2021 ACM SIGCOMM 2021 Conference, Virtual Event, USA.","DOI":"10.1145\/3452296.3472933"},{"key":"ref_211","doi-asserted-by":"crossref","first-page":"2775","DOI":"10.1007\/s12083-021-01097-3","article-title":"A decentralized vehicle anti-theft system using Blockchain and smart contracts","volume":"14","author":"Das","year":"2021","journal-title":"Peer- Netw. Appl."},{"key":"ref_212","doi-asserted-by":"crossref","unstructured":"Falzon, F., Elkhiyaoui, K., Manevich, Y., and De Caro, A. (2023, January 26\u201330). Short Privacy-Preserving Proofs of Liabilities. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (CCS \u201923), Copenhagen, Denmark.","DOI":"10.1145\/3576915.3616645"},{"key":"ref_213","doi-asserted-by":"crossref","unstructured":"Luo, R., Luo, F., Wang, B., and Chen, T. (2022, January 23\u201325). Smart Contract Vulnerability Detection Based on Variant LSTM. Proceedings of the 2022 International Conference on Big Data, IoT, and Cloud Computing (ICBDICC \u201922), Chengdu, China.","DOI":"10.1145\/3588340.3588369"},{"key":"ref_214","doi-asserted-by":"crossref","unstructured":"Mutemwa, M., Masango, M.G., and Gcaza, N. (2021, January 18\u201320). Managing the Shift in the Enterprise Perimeter in Order to Delay a Cybersecurity Breach. Proceedings of the International Conference on Artificial Intelligence and Its Applications, Virtual Event, Mauritius.","DOI":"10.1145\/3487923.3487925"},{"key":"ref_215","doi-asserted-by":"crossref","unstructured":"Su, Y., Wang, B., Xing, Q., and Wang, X. (2021, January 19\u201321). DISCA: Decentralized Infrastructure for Secure Community Attribute Certifying. Proceedings of the 3rd International Conference on Advanced Information Science and System, Sanya, China.","DOI":"10.1145\/3503047.3503089"},{"key":"ref_216","doi-asserted-by":"crossref","unstructured":"Arora, S., Li, Y., Feng, Y., and Xu, J. (2024, January 1\u20135). SecPLF: Secure Protocols for Loanable Funds against Oracle Manipulation Attacks. Proceedings of the 19th ACM Asia Conference on Computer and Communications Security (AsiaCCS), Singapore.","DOI":"10.1145\/3634737.3637681"},{"key":"ref_217","doi-asserted-by":"crossref","unstructured":"Chen, Z., Beillahi, S.M., and Long, F. (2024, January 14\u201320). FlashSyn: Flash Loan Attack Synthesis via Counter Example Driven Approximation. Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering (ICSE), Lisbon, Portugal.","DOI":"10.1145\/3597503.3639190"},{"key":"ref_218","doi-asserted-by":"crossref","unstructured":"Eskandari, S., Salehi, M., Gu, W.C., and Clark, J. (2021, January 20\u201322). SoK: Oracles from the Ground Truth to Market Manipulation. Proceedings of the 3rd ACM Conference on Advances in Financial Technologies, Arlington, VA, USA.","DOI":"10.1145\/3479722.3480994"},{"key":"ref_219","doi-asserted-by":"crossref","unstructured":"Xie, M., Hu, M., Kong, Z., Zhang, C., Feng, Y., Wang, H., Xue, Y., Zhang, H., Liu, Y., and Liu, Y. (2024, January 15\u201319). DeFort: Automatic Detection and Analysis of Price Manipulation Attacks in DeFi Applications. Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), Vienna, Austria.","DOI":"10.1145\/3650212.3652137"},{"key":"ref_220","doi-asserted-by":"crossref","unstructured":"Cao, C., Wu, J., Qi, H., and Eda, S. (2023, January 6\u20139). Blockchain-based Runtime Attestation against Physical Fault Injection Attacks on Edge Devices. Proceedings of the Eighth ACM\/IEEE Symposium on Edge Computing (SEC), Wilmington, DE, USA.","DOI":"10.1145\/3583740.3628441"},{"key":"ref_221","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1007\/s10462-024-11055-z","article-title":"Staying ahead of phishers: A review of recent advances and emerging methodologies in phishing detection","volume":"58","author":"Kavya","year":"2024","journal-title":"Artif. Intell. Rev."},{"key":"ref_222","doi-asserted-by":"crossref","unstructured":"Li, S., Gou, G., Liu, C., Xiong, G., Li, Z., Xiao, J., and Xing, X. (2023, January 4\u20138). TGC: Transaction Graph Contrast Network for Ethereum Phishing Scam Detection. Proceedings of the Annual Computer Security Applications Conference (ACSAC), Austin, TX, USA.","DOI":"10.1145\/3627106.3627109"},{"key":"ref_223","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1145\/3633520","article-title":"Responsible Recommendation Services with Blockchain Empowered Asynchronous Federated Learning","volume":"15","author":"Ali","year":"2024","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"ref_224","doi-asserted-by":"crossref","unstructured":"Alja\u2019afreh, M., Al Mallah, R., Karime, A., and El Saddik, A. (2023, January 2\u20134). Cybersecurity in the Metaverse: Challenges and Approaches. Proceedings of the 2023 International Conference on Intelligent Metaverse Technologies & Applications (iMETA), Tartu, Estonia.","DOI":"10.1109\/iMETA59369.2023.10294371"},{"key":"ref_225","first-page":"5","article-title":"Integration of Blockchain with Connected and Autonomous Vehicles: Vision and Challenge","volume":"14","author":"Dargahi","year":"2022","journal-title":"J. Data Inf. Qual."},{"key":"ref_226","doi-asserted-by":"crossref","unstructured":"Desai, N., Maesa, D.D.F., Sastry, N., Schneider, S., and Ricci, L. (2023, January 13). Preserving Privacy of Vulnerable Users across Heterogeneous Sensitive Sensor Data Streams using Smart Contracts. Proceedings of the Fifth ACM International Workshop on Blockchain-enabled Networked Sensor Systems, Istanbul, Turkiye.","DOI":"10.1145\/3628354.3629532"},{"key":"ref_227","doi-asserted-by":"crossref","first-page":"84299","DOI":"10.1007\/s11042-024-19150-7","article-title":"A privacy-preserving deep learning framework for highly authenticated blockchain secure storage system","volume":"83","author":"Haque","year":"2024","journal-title":"Multimed. Tools Appl."},{"key":"ref_228","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1145\/3560263","article-title":"TokenAware: Accurate and Efficient Bookkeeping Recognition for Token Smart Contracts","volume":"32","author":"He","year":"2023","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"ref_229","doi-asserted-by":"crossref","unstructured":"Jia, Y., Madathil, V., and Kate, A. (2024, January 14\u201318). HomeRun: High-efficiency Oblivious Message Retrieval, Unrestricted. Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security, Salt Lake City, UT, USA.","DOI":"10.1145\/3658644.3670381"},{"key":"ref_230","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/s12083-024-01858-w","article-title":"Differential privacy preserving based framework using blockchain for internet-of-things","volume":"18","author":"Kashif","year":"2025","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"ref_231","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1145\/3426474","article-title":"Privacy-preserving Decentralized Learning Framework for Healthcare System","volume":"17","author":"Kasyap","year":"2021","journal-title":"ACM Trans. Multimed. Comput. Commun. Appl."},{"key":"ref_232","doi-asserted-by":"crossref","unstructured":"Li, Y., Soska, K., Huang, Z., Bellemare, S., Quintyne-Collins, M., Wang, L., Liu, X., Song, D., and Miller, A. (2024, January 1\u20135). Ratel: MPC-extensions for Smart Contracts. Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, Singapore.","DOI":"10.1145\/3634737.3661142"},{"key":"ref_233","doi-asserted-by":"crossref","first-page":"2203","DOI":"10.1007\/s10586-021-03260-0","article-title":"Privacy challenges of IoT-based blockchain: A systematic review","volume":"25","author":"Liang","year":"2022","journal-title":"Clust. Comput."},{"key":"ref_234","doi-asserted-by":"crossref","first-page":"44335","DOI":"10.1007\/s11042-023-15204-4","article-title":"Smart healthcare system using integrated and lightweight ECC with private blockchain for multimedia medical data processing","volume":"82","author":"Mahajan","year":"2023","journal-title":"Multimed. Tools Appl."},{"key":"ref_235","doi-asserted-by":"crossref","unstructured":"Wang, Q., He, L., Zhu, X., Huang, Y., and Li, Z. (2021, January 17\u201319). Privacy Protection of Blockchain Security Development Status. Proceedings of the 2021 4th International Conference on Information Systems and Computer Aided Education (ICISCAE), Dalian, China.","DOI":"10.1145\/3482632.3487477"},{"key":"ref_236","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1145\/3459087","article-title":"Anonymous Blockchain-based System for Consortium","volume":"12","author":"Wang","year":"2021","journal-title":"ACM Trans. Manag. Inf. Syst."},{"key":"ref_237","doi-asserted-by":"crossref","unstructured":"Yang, H., Yuan, L., and Wang, S. (2021, January 15\u201317). Design of Blockchain Smart Contract Based on Ring Signature. Proceedings of the 2021 9th International Conference on Communications and Broadband Networking (ICCBN), Shanghai, China.","DOI":"10.1145\/3456415.3457223"},{"key":"ref_238","doi-asserted-by":"crossref","first-page":"13909","DOI":"10.1007\/s11227-023-05155-w","article-title":"An anonymous and fair auction system based on blockchain","volume":"79","author":"Ye","year":"2023","journal-title":"J. Supercomput."},{"key":"ref_239","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Wu, Y., Wang, J., Liu, B., Liu, A., and Chen, X. (2024, January 26\u201328). Blockchain Query Framework Based on Trusted Execution Environment. Proceedings of the 2024 5th International Conference on Computing, Networks and Internet of Things, Tokyo, Japan.","DOI":"10.1145\/3670105.3670135"},{"key":"ref_240","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Lei, Y., Yan, M., Yu, Y., Chen, J., Wang, S., and Mao, X. (2022, January 10\u201314). Reentrancy Vulnerability Detection and Localization: A Deep Learning Based Two-phase Approach. Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering (ASE), Rochester, MI, USA.","DOI":"10.1145\/3551349.3560428"},{"key":"ref_241","doi-asserted-by":"crossref","unstructured":"Liao, J., Zhang, F., Sun, W., and Shi, W. (June, January 30). Speedster: An Efficient Multi-party State Channel via Enclaves. Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security, Nagasaki, Japan.","DOI":"10.1145\/3488932.3523259"},{"key":"ref_242","unstructured":"Alexopoulos, N., Vasilomanolakis, E., Roux, S.L., Rowe, S., and M\u00fchlh\u00e4user, M. (April, January 30). TRIDEnT: Towards a decentralized threat indicator marketplace. Proceedings of the 35th Annual ACM Symposium on Applied Computing, Brno, Czech Republic."},{"key":"ref_243","doi-asserted-by":"crossref","unstructured":"Ashizawa, N., Yanai, N., Cruz, J.P., and Okamura, S. (2021, January 3\u20135). Eth2Vec: Learning Contract-Wide Code Representations for Vulnerability Detection on Ethereum Smart Contracts. Proceedings of the 3rd ACM International Symposium on Blockchain and Secure Critical Infrastructure, Hong Kong, China.","DOI":"10.1145\/3457337.3457841"},{"key":"ref_244","doi-asserted-by":"crossref","unstructured":"Bhamidipati, V.S.V., Chan, M., Chamorro, D., Jain, A., and Murthy, A. (2019, January 28\u201330). Adaptive Security for Smart Contracts using High Granularity Metrics. Proceedings of the 3rd International Conference on Vision, Image and Signal Processing, Vancouver, BC, Canada.","DOI":"10.1145\/3387168.3387214"},{"key":"ref_245","doi-asserted-by":"crossref","unstructured":"Chen, W., Sun, Z., Wang, H., Luo, X., Cai, H., and Wu, L. (2022, January 18\u201322). WASAI: Uncovering vulnerabilities in Wasm smart contracts. Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Daejeon, Republic of Korea.","DOI":"10.1145\/3533767.3534218"},{"key":"ref_246","doi-asserted-by":"crossref","first-page":"1772","DOI":"10.1145\/3660786","article-title":"Demystifying Invariant Effectiveness for Securing Smart Contracts","volume":"1","author":"Chen","year":"2024","journal-title":"Proc. ACM Softw. Eng."},{"key":"ref_247","first-page":"11","article-title":"Threats to Online Advertising and Countermeasures: A Technical Survey","volume":"1","author":"Chua","year":"2020","journal-title":"Digit. Threat. Res. Pract."},{"key":"ref_248","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1145\/3417516","article-title":"Obsidian: Typestate and Assets for Safer Blockchain Programming","volume":"42","author":"Coblenz","year":"2020","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"ref_249","doi-asserted-by":"crossref","unstructured":"Crincoli, G., Iadarola, G., La Rocca, P.E., Martinelli, F., Mercaldo, F., and Santone, A. (2022, January 18\u201320). Vulnerable Smart Contract Detection by Means of Model Checking. Proceedings of the Fourth ACM International Symposium on Blockchain and Secure Critical Infrastructure, Nagasaki, Japan.","DOI":"10.1145\/3494106.3528672"},{"key":"ref_250","doi-asserted-by":"crossref","unstructured":"Cui, S., Zhao, G., Gao, Y., Tavu, T., and Huang, J. (2022, January 7\u201311). VRust: Automated Vulnerability Detection for Solana Smart Contracts. Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, Los Angeles, CA, USA.","DOI":"10.1145\/3548606.3560552"},{"key":"ref_251","doi-asserted-by":"crossref","unstructured":"Eshghie, M., Artho, C., and Gurov, D. (2021, January 21\u201322). Dynamic Vulnerability Detection on Smart Contracts Using Machine Learning. Proceedings of the Evaluation and Assessment in Software Engineering, Trondheim, Norway.","DOI":"10.1145\/3463274.3463348"},{"key":"ref_252","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1145\/3641846","article-title":"sGuard+: Machine Learning Guided Rule-Based Automated Vulnerability Repair on Smart Contracts","volume":"33","author":"Gao","year":"2024","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"ref_253","doi-asserted-by":"crossref","unstructured":"Garfatta, I., Klai, K., Gra\u00efet, M., and Gaaloul, W. (2022, January 25\u201329). Model Checking of Vulnerabilities in Smart Contracts: A Solidity-to-CPN Approach. Proceedings of the 37th ACM\/SIGAPP Symposium on Applied Computing, Virtual Event.","DOI":"10.1145\/3477314.3507309"},{"key":"ref_254","doi-asserted-by":"crossref","unstructured":"Ghaleb, A. (2022, January 10\u201314). Towards Effective Static Analysis Approaches for Security Vulnerabilities in Smart Contracts. Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering, Rochester, MI, USA.","DOI":"10.1145\/3551349.3559567"},{"key":"ref_255","doi-asserted-by":"crossref","first-page":"713","DOI":"10.1007\/s10207-023-00765-0","article-title":"Vulnerabilities and attacks assessments in blockchain 1.0, 2.0 and 3.0: Tools, analysis and countermeasures","volume":"23","author":"Hamdi","year":"2024","journal-title":"Int. J. Inf. Secur."},{"key":"ref_256","doi-asserted-by":"crossref","unstructured":"Hao, X., Ren, W., Zheng, W., and Zhu, T. (January, January 29). SCScan: A SVM-Based Scanning System for Vulnerabilities in Blockchain Smart Contracts. Proceedings of the 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Guangzhou, China.","DOI":"10.1109\/TrustCom50675.2020.00221"},{"key":"ref_257","doi-asserted-by":"crossref","unstructured":"Hettmer, M., Severin, B., Blum, F., and Gruhn, V. (2023, January 11). Towards Assessing the Real-World Impact of Defects in Blockchain-Based Smart Contracts. Proceedings of the 1st International Workshop on Software Defect Datasets, San Francisco, CA, USA.","DOI":"10.1145\/3617572.3617880"},{"key":"ref_258","doi-asserted-by":"crossref","unstructured":"Huang, Y., Jiang, B., and Chan, W.K. (2020, January 28\u201330). EOSFuzzer: Fuzzing EOSIO Smart Contracts for Vulnerability Detection. Proceedings of the 12th Asia-Pacific Symposium on Internetware, Singapore.","DOI":"10.1145\/3457913.3457920"},{"key":"ref_259","doi-asserted-by":"crossref","unstructured":"Ibba, G., Aufiero, S., Neykova, R., Bartolucci, S., Ortu, M., Tonelli, R., and Destefanis, G. (2024, January 14\u201318). A Curated Solidity Smart Contracts Repository of Metrics and Vulnerability. Proceedings of the 20th International Conference on Predictive Models and Data Analytics in Software Engineering, Porto de Galinhas, Brazil.","DOI":"10.1145\/3663533.3664039"},{"key":"ref_260","doi-asserted-by":"crossref","first-page":"51469","DOI":"10.1007\/s11042-023-17308-3","article-title":"Digital forensic framework for smart contract vulnerabilities using ensemble models","volume":"83","author":"Singh","year":"2023","journal-title":"Multimed. Tools Appl."},{"key":"ref_261","first-page":"23","article-title":"A Survey of Ethereum Smart Contract Security: Attacks and Detection","volume":"3","author":"Jiao","year":"2024","journal-title":"Distrib. Ledger Technol. Res. Pract."},{"key":"ref_262","doi-asserted-by":"crossref","unstructured":"Khor, J., Masama, M.A., Sidorov, M., Leong, W., and Lim, J. (2020, January 18\u201321). An Improved Gas Efficient Library for Securing IoT Smart Contracts Against Arithmetic Vulnerabilities. Proceedings of the 2020 9th International Conference on Software and Computer Applications, Langkawi, Malaysia.","DOI":"10.1145\/3384544.3384577"},{"key":"ref_263","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1145\/3532857","article-title":"Disentangling Decentralized Finance (DeFi) Compositions","volume":"17","author":"Kitzler","year":"2023","journal-title":"ACM Trans. Web"},{"key":"ref_264","doi-asserted-by":"crossref","unstructured":"L\u00ea H\u1ed3ng, B., L\u00ea \u0110c, T., \u0110o\u00e0n Minh, T., Tr\u1ea7n Tu\u1ea5n, D., Phan Th\u1ebf, D., and Pha\u0323m V\u0103n, H. (2023, January 7\u20138). Contextual Language Model and Transfer Learning for Reentrancy Vulnerability Detection in Smart Contracts. Proceedings of the 12th International Symposium on Information and Communication Technology (SoICT), Ho Chi Minh City, Vietnam.","DOI":"10.1145\/3628797.3628945"},{"key":"ref_265","doi-asserted-by":"crossref","first-page":"3222","DOI":"10.1007\/s12083-024-01750-7","article-title":"A smart contract vulnerability detection method based on deep learning with opcode sequences","volume":"17","author":"Li","year":"2024","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"ref_266","doi-asserted-by":"crossref","unstructured":"Li, P., Li, S., Ding, M., Yu, J., Zhang, H., Zhou, X., and Li, J. (2022, January 13\u201315). A Vulnerability Detection Framework for Hyperledger Fabric Smart Contracts Based on Dynamic and Static Analysis. Proceedings of the International Conference on Evaluation and Assessment in Software Engineering (EASE), Gothenburg, Sweden.","DOI":"10.1145\/3530019.3531342"},{"key":"ref_267","doi-asserted-by":"crossref","unstructured":"Li, W., Li, X., Li, Z., and Zhang, Y. (2024, January 21\u201325). COBRA: Interaction-Aware Bytecode-Level Vulnerability Detector for Smart Contracts. Proceedings of the 39th IEEE\/ACM International Conference on Automated Software Engineering (ASE), Sacramento, CA, USA.","DOI":"10.1145\/3691620.3695601"},{"key":"ref_268","doi-asserted-by":"crossref","unstructured":"Li, Z., Zhou, Y., Guo, S., and Xiao, B. (2021, January 6\u201310). SolSaviour: A Defending Framework for Deployed Defective Smart Contracts. Proceedings of the Annual Computer Security Applications Conference (ACSAC), Austin, TX, USA.","DOI":"10.1145\/3485832.3488015"},{"key":"ref_269","doi-asserted-by":"crossref","unstructured":"Liao, X. (2024, January 10\u201311). Smart Contract Vulnerability Detection Based on Dynamic and Static Combination. Proceedings of the International Conference on Digital Economy, Blockchain and Artificial Intelligence, Guangzhou, China.","DOI":"10.1145\/3700058.3700123"},{"key":"ref_270","doi-asserted-by":"crossref","unstructured":"Liao, Z., Zheng, Z., Chen, X., and Nan, Y. (2022, January 18\u201322). SmartDagger: A Bytecode-Based Static Analysis Approach for Detecting Cross-Contract Vulnerability. Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), Daejeon, Republic of Korea.","DOI":"10.1145\/3533767.3534222"},{"key":"ref_271","doi-asserted-by":"crossref","unstructured":"Ma, C., Song, W., and Huang, J. (2023, January 11\u201317). TransRacer: Function Dependence-Guided Transaction Race Detection for Smart Contracts. Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC\/FSE), San Francisco, CA, USA.","DOI":"10.1145\/3611643.3616281"},{"key":"ref_272","doi-asserted-by":"crossref","first-page":"3705616","DOI":"10.1145\/3705616","article-title":"An Automated Vulnerability Detection Framework for Smart Contracts","volume":"3","author":"Mi","year":"2024","journal-title":"Distributed Ledger Technologies: Research and Practice"},{"key":"ref_273","doi-asserted-by":"crossref","unstructured":"Nguyen, H.H., Nguyen, N.M., Doan, H.P., Ahmadi, Z., Doan, T.N., and Jiang, L. (2022, January 14\u201318). MANDO-GURU: Vulnerability Detection for Smart Contract Source Code by Heterogeneous Graph Embeddings. Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC\/FSE), Singapore.","DOI":"10.1145\/3540250.3558927"},{"key":"ref_274","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1145\/3564699","article-title":"A Solicitous Approach to Smart Contract Verification","volume":"26","author":"Otoni","year":"2023","journal-title":"ACM Trans. Priv. Secur."},{"key":"ref_275","doi-asserted-by":"crossref","unstructured":"Pani, S., Nallagonda, H.V., Medicherla, R.K., and Rajan, M. (2023, January 23\u201325). SmartFuzzDriverGen: Smart Contract Fuzzing Automation for Golang. Proceedings of the 16th Innovations in Software Engineering Conference (ISEC), Allahabad, India.","DOI":"10.1145\/3578527.3578538"},{"key":"ref_276","doi-asserted-by":"crossref","unstructured":"Patel, A., Chauhan, K., Maini, S., and Goyal, M. (2024, January 1\u20133). Smart Contract Vulnerabilities Detection Using Deep Learning. Proceedings of the 2024 Sixteenth International Conference on Contemporary Computing (IC3), Noida, India.","DOI":"10.1145\/3675888.3676070"},{"key":"ref_277","doi-asserted-by":"crossref","unstructured":"Qian, P., Liu, Z., Yin, Y., and He, Q. (May, January 30). Cross-Modality Mutual Learning for Enhancing Smart Contract Vulnerability Detection on Bytecode. Proceedings of the ACM Web Conference 2023 (WWW \u201923), Austin, TX, USA.","DOI":"10.1145\/3543507.3583367"},{"key":"ref_278","doi-asserted-by":"crossref","first-page":"1563","DOI":"10.1007\/s10796-021-10150-8","article-title":"A System to Access Online Services with Minimal Personal Information Disclosure","volume":"24","author":"Russo","year":"2022","journal-title":"Inf. Syst. Front."},{"key":"ref_279","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1007\/s00530-024-01406-9","article-title":"Smart contract vulnerabilities detection with bidirectional encoder representations from transformers and control flow graph","volume":"30","author":"Su","year":"2024","journal-title":"Multimed. Syst."},{"key":"ref_280","doi-asserted-by":"crossref","first-page":"1577","DOI":"10.1109\/TCSS.2022.3228122","article-title":"DeFiScanner: Spotting DeFi Attacks Exploiting Logic Vulnerabilities on Blockchain","volume":"11","author":"Wang","year":"2024","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"ref_281","doi-asserted-by":"crossref","unstructured":"Wang, C., Li, Y., Gao, J., Wang, K., Zhang, J., Guan, Z., and Chen, Z. (2024, January 16\u201317). SolaSim: Clone Detection for Solana Smart Contracts via Program Representation. Proceedings of the 32nd IEEE\/ACM International Conference on Program Comprehension (ICPC), Lisbon, Portugal.","DOI":"10.1145\/3643916.3644406"},{"key":"ref_282","unstructured":"Wang, H., Hu, Y., Wu, H., Liu, D., Peng, C., Wu, Y., Fan, M., and Liu, T. (November, January 27). Skyeye: Detecting Imminent Attacks via Analyzing Adversarial Smart Contracts. Proceedings of the 39th IEEE\/ACM International Conference on Automated Software Engineering (ASE), Sacramento, CA, USA."},{"key":"ref_283","doi-asserted-by":"crossref","unstructured":"Wen, H., Liu, H., Song, J., Chen, Y., Guo, W., and Feng, Y. (2024, January 14\u201318). FORAY: Towards Effective Attack Synthesis against Deep Logical Vulnerabilities in DeFi Protocols. Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security (CCS), Salt Lake City, UT, USA.","DOI":"10.1145\/3658644.3690293"},{"key":"ref_284","doi-asserted-by":"crossref","unstructured":"Xue, Y., Ma, M., Lin, Y., Sui, Y., Ye, J., and Peng, T. (2020, January 21\u201325). Cross-contract Static Analysis for Detecting Practical Reentrancy Vulnerabilities in Smart Contracts. Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering (ASE), Melbourne, Australia.","DOI":"10.1145\/3324884.3416553"},{"key":"ref_285","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1186\/s42400-021-00107-4","article-title":"Blockchain abnormal behavior awareness methods: A survey","volume":"5","author":"Yan","year":"2022","journal-title":"Cybersecurity"},{"key":"ref_286","doi-asserted-by":"crossref","unstructured":"Zheng, Z., Zhang, N., Su, J., Zhong, Z., Ye, M., and Chen, J. (2023, January 14\u201320). Turn the Rudder: A Beacon of Reentrancy Detection for Smart Contracts on Ethereum. Proceedings of the 2023 IEEE\/ACM 45th International Conference on Software Engineering (ICSE), Melbourne, Australia.","DOI":"10.1109\/ICSE48619.2023.00036"},{"key":"ref_287","doi-asserted-by":"crossref","unstructured":"Ding, M., Li, P., Li, S., and Zhang, H. (2021, January 21\u201323). HFContractFuzzer: Fuzzing Hyperledger Fabric Smart Contracts for Vulnerability Detection. Proceedings of the Evaluation and Assessment in Software Engineering (EASE), Trondheim, Norway.","DOI":"10.1145\/3463274.3463351"},{"key":"ref_288","doi-asserted-by":"crossref","unstructured":"Dong, C., Huang, H., and Shang, Y. (2024, January 23\u201325). Erinys: Efficient Fuzzing by Function Invoke Sequence Generation for Smart Contracts. Proceedings of the 2024 8th International Conference on Big Data and Internet of Things (BDIOT), Macau, China.","DOI":"10.1145\/3697355.3697394"},{"key":"ref_289","doi-asserted-by":"crossref","unstructured":"Jang, D., Askar, A., Yun, I., Tong, S., Cai, Y., and Kim, T. (2022, January 26\u201328). Fuzzing@Home: Distributed Fuzzing on Untrusted Heterogeneous Clients. Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Limassol, Cyprus.","DOI":"10.1145\/3545948.3545971"},{"key":"ref_290","doi-asserted-by":"crossref","unstructured":"Ren, M., Yin, Z., Ma, F., Xu, Z., Jiang, Y., Sun, C., Li, H., and Cai, Y. (2021, January 11\u201317). Empirical Evaluation of Smart Contract Testing: What Is the Best Choice?. Proceedings of the 30th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), Aarhus, Denmark.","DOI":"10.1145\/3460319.3464837"},{"key":"ref_291","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1145\/3674725","article-title":"FunFuzz: A Function-Oriented Fuzzer for Smart Contract Vulnerability Detection with High Effectiveness and Efficiency","volume":"33","author":"Ye","year":"2024","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"ref_292","doi-asserted-by":"crossref","first-page":"5493","DOI":"10.1007\/s00500-023-09306-2","article-title":"A systematic review of fuzzing","volume":"28","author":"Zhao","year":"2024","journal-title":"Soft Comput."},{"key":"ref_293","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1007\/s10207-020-00513-8","article-title":"Anti-BlUFf: Towards counterfeit mitigation in IC supply chains using blockchain and PUF","volume":"20","author":"Aniello","year":"2021","journal-title":"Int. J. Inf. Secur."},{"key":"ref_294","doi-asserted-by":"crossref","unstructured":"Marjanovi\u0107, J., Dal\u010dekovi\u0107, N., and Sladi\u0107, G. (2021, January 2\u20133). Improving Critical Infrastructure Protection by Enhancing Software Acquisition Process Through Blockchain. Proceedings of the 7th Conference on the Engineering of Computer Based Systems, Novi Sad, Serbia.","DOI":"10.1145\/3459960.3459973"},{"key":"ref_295","doi-asserted-by":"crossref","unstructured":"Xuan, S., Tang, H., Wang, W., and Yang, W. (2020, January 2\u20134). Application of Block Chain Technology in Constructing Network Threat Intelligence System. Proceedings of the 2020 2nd International Conference on Blockchain Technology, Hilo, HI, USA.","DOI":"10.1145\/3390566.3391676"},{"key":"ref_296","doi-asserted-by":"crossref","unstructured":"Lew, C.C., Torres, C.F., Shinde, S., and Brandenburger, M. (2024, January 8\u201312). Revisiting Rollbacks on Smart Contracts in TEE-protected Private Blockchains. Proceedings of the 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Vienna, Austria.","DOI":"10.1109\/EuroSPW61312.2024.00029"},{"key":"ref_297","doi-asserted-by":"crossref","first-page":"87527","DOI":"10.1007\/s11042-023-17942-x","article-title":"R-GCN: A residual-gated recurrent unit convolution network model for anomaly detection in blockchain transactions","volume":"83","author":"Rajmohan","year":"2024","journal-title":"Multimed. Tools Appl."},{"key":"ref_298","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/s12083-024-01829-1","article-title":"Unveiling bitcoin network attack using deep reinforcement learning with Boltzmann exploration","volume":"18","author":"Shetty","year":"2025","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"ref_299","doi-asserted-by":"crossref","unstructured":"Yang, S., Zhang, F., Huang, K., Chen, X., Yang, Y., and Zhu, F. (2024, January 14). SoK: MEV Countermeasures. Proceedings of the Workshop on Decentralized Finance and Security (DeFiSec), Salt Lake City, UT, USA.","DOI":"10.1145\/3689931.3694911"},{"key":"ref_300","doi-asserted-by":"crossref","first-page":"3179","DOI":"10.1007\/s10207-024-00885-1","article-title":"Trust attack prevention based on Spark-blockchain in social IoT: A survey","volume":"23","author":"Masmoudi","year":"2024","journal-title":"Int. J. Inf. Secur."},{"key":"ref_301","unstructured":"Wang, P., Ding, Y., Sun, M., Wang, H., Li, T., Zhou, R., Chen, Z., and Jing, Y. (July, January 27). Building and Maintaining a Third-Party Library Supply Chain for Productive and Secure SGX Enclave Development. Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP), Seoul, Republic of Korea."},{"key":"ref_302","doi-asserted-by":"crossref","first-page":"4515","DOI":"10.1007\/s10586-022-03691-3","article-title":"Data governance through a multi-DLT architecture in view of the GDPR","volume":"25","author":"Zichichi","year":"2022","journal-title":"Clust. Comput."},{"key":"ref_303","doi-asserted-by":"crossref","unstructured":"Zhong, Z., Zheng, Z., Dai, H.N., Xue, Q., Chen, J., and Nan, Y. (2024, January 14\u201320). PrettySmart: Detecting Permission Re-delegation Vulnerability for Token Behaviors in Smart Contracts. Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering (ICSE), Lisbon, Portugal.","DOI":"10.1145\/3597503.3639140"},{"key":"ref_304","doi-asserted-by":"crossref","first-page":"897","DOI":"10.1007\/s11227-022-04702-1","article-title":"Distributed storage scheme for encryption speech data based on blockchain and IPFS","volume":"79","author":"Zhang","year":"2023","journal-title":"J. Supercomput."},{"key":"ref_305","doi-asserted-by":"crossref","unstructured":"Zhang, J., Bai, F., Shen, T., Gong, B., and Luo, J. (2022, January 5\u20137). Trusted Blockchain-Based Data Fingerprinting Differential-Traceability and SkipList Indexing Methods in Privacy Protection. Proceedings of the 2022 4th Blockchain and Internet of Things Conference (BIOTC), Tokyo, Japan.","DOI":"10.1145\/3559795.3559806"},{"key":"ref_306","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1007\/s11390-023-2488-3","article-title":"On the Security of Smart Home Systems: A Survey","volume":"38","author":"Yuan","year":"2023","journal-title":"J. Comput. Sci. Technol."},{"key":"ref_307","doi-asserted-by":"crossref","first-page":"2630","DOI":"10.1007\/s12083-023-01552-3","article-title":"Digital rights management scheme based on redactable blockchain and perceptual hash","volume":"16","author":"Yi","year":"2023","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"ref_308","doi-asserted-by":"crossref","unstructured":"Yang, S., Chen, J., Huang, M., Zheng, Z., and Huang, Y. (2024, January 14\u201320). Uncover the Premeditated Attacks: Detecting Exploitable Reentrancy Vulnerabilities by Identifying Attacker Contracts. Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering (ICSE), Lisbon, Portugal.","DOI":"10.1145\/3597503.3639153"},{"key":"ref_309","doi-asserted-by":"crossref","unstructured":"Wu, J., Wang, Y., Wang, R., Chen, J., and Zheng, Z. (2023, January 21\u201323). Can Neural Networks Help Smart Contract Testing? An Empirical Study. Proceedings of the 14th Asia-Pacific Symposium on Internetware, Hangzhou, China.","DOI":"10.1145\/3609437.3609455"},{"key":"ref_310","doi-asserted-by":"crossref","first-page":"1340","DOI":"10.1007\/s12083-022-01442-0","article-title":"A decentralized lightweight blockchain-based authentication mechanism for Internet of Vehicles","volume":"16","author":"Wu","year":"2023","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"ref_311","doi-asserted-by":"crossref","unstructured":"Sun, Y., Wu, D., Xue, Y., Liu, H., Wang, H., Xu, Z., Xie, X., and Liu, Y. (2024, January 14\u201320). GPTScan: Detecting Logic Vulnerabilities in Smart Contracts by Combining GPT with Program Analysis. Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering (ICSE), Lisbon, Portugal.","DOI":"10.1145\/3597503.3639117"},{"key":"ref_312","doi-asserted-by":"crossref","first-page":"1510","DOI":"10.1145\/3591282","article-title":"Automated Detection of Under-Constrained Circuits in Zero-Knowledge Proofs","volume":"7","author":"Pailoor","year":"2023","journal-title":"Proc. ACM Program. Lang."},{"key":"ref_313","doi-asserted-by":"crossref","first-page":"1219","DOI":"10.1007\/s11135-020-01055-w","article-title":"Embracing Bitcoin: Users\u2019 perceived security and trust","volume":"55","author":"Ooi","year":"2021","journal-title":"Qual. Quant."},{"key":"ref_314","first-page":"261","article-title":"Coping or threat? Unraveling the mechanisms enabling user acceptance of blockchain technologies","volume":"24","author":"Oh","year":"2023","journal-title":"Inf. Technol. Manag."},{"key":"ref_315","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1145\/3560264","article-title":"Pied-Piper: Revealing the Backdoor Threats in Ethereum ERC Token Contracts","volume":"32","author":"Ma","year":"2023","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"ref_316","doi-asserted-by":"crossref","unstructured":"Luo, F., Luo, R., Chen, T., Qiao, A., He, Z., Song, S., Jiang, Y., and Li, S. (2024, January 14\u201320). SCVHunter: Smart Contract Vulnerability Detection Based on Heterogeneous Graph Attention Network. Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering (ICSE), Lisbon, Portugal.","DOI":"10.1145\/3597503.3639213"},{"key":"ref_317","doi-asserted-by":"crossref","unstructured":"Li, W., Jia, S., Liu, L., Zheng, F., Ma, Y., and Lin, J. (2022, January 5\u20139). CryptoGo: Automatic Detection of Go Cryptographic API Misuses. Proceedings of the 38th Annual Computer Security Applications Conference (ACSAC), Austin, TX, USA.","DOI":"10.1145\/3564625.3567989"},{"key":"ref_318","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3594560","article-title":"Digital Economy: The Economics of the Digital Economy","volume":"2023","author":"Lewis","year":"2023","journal-title":"Ubiquity"},{"key":"ref_319","doi-asserted-by":"crossref","unstructured":"Kong, Q., Chen, J., Wang, Y., Jiang, Z., and Zheng, Z. (2023, January 17\u201321). DeFiTainter: Detecting Price Manipulation Vulnerabilities in DeFi Protocols. Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), Seattle, WA, USA.","DOI":"10.1145\/3597926.3598124"},{"key":"ref_320","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1007\/s12083-021-01225-z","article-title":"Robustness against fraudulent activities of a blockchain-based online review system","volume":"15","author":"Karode","year":"2022","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"ref_321","doi-asserted-by":"crossref","first-page":"3565","DOI":"10.1007\/s10586-022-03746-5","article-title":"Cooperative hybrid consensus with function optimization for blockchain","volume":"26","author":"Pashazadeh","year":"2023","journal-title":"Clust. Comput."},{"key":"ref_322","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1007\/s12027-020-00617-7","article-title":"Regulating Blockchain, DLT and Smart Contracts: A technology regulator\u2019s perspective","volume":"21","author":"Ellul","year":"2020","journal-title":"ERA Forum"},{"key":"ref_323","doi-asserted-by":"crossref","unstructured":"Chen, Y., Sun, Z., Gong, Z., and Hao, D. (2024, January 14\u201320). Improving Smart Contract Security with Contrastive Learning-based Vulnerability Detection. Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering (ICSE), Lisbon, Portugal.","DOI":"10.1145\/3597503.3639173"},{"key":"ref_324","doi-asserted-by":"crossref","first-page":"48119","DOI":"10.1007\/s11042-023-17576-z","article-title":"Intrusion detection in cyber-physical system using rsa blockchain technology","volume":"83","author":"Aljabri","year":"2023","journal-title":"Multimed. Tools Appl."},{"key":"ref_325","doi-asserted-by":"crossref","unstructured":"Andreica, T., Musuroi, A., Anistoroaei, A., Jichici, C., and Groza, B. (2024). Blockchain integration for in-vehicle CAN bus intrusion detection systems with ISO\/SAE 21434 compliant reporting. Sci. Rep., 14.","DOI":"10.1038\/s41598-024-58694-4"},{"key":"ref_326","doi-asserted-by":"crossref","unstructured":"Bakar, A., Zouhair, A., and En-Naimi, E.M. (2023, January 24\u201326). Review of Vulnerabilities and Countermeasures Against Sybil Attacks on Decentralized Systems Based on Machine Learning Algorithms. Proceedings of the 6th International Conference on Networking, Intelligent Systems & Security (NISS), Larache, Morocco.","DOI":"10.1145\/3607720.3607751"},{"key":"ref_327","doi-asserted-by":"crossref","first-page":"4569","DOI":"10.1007\/s10586-023-04196-3","article-title":"Preserving flow table integrity in OpenFlow networks through smart contract","volume":"27","author":"Bargayary","year":"2024","journal-title":"Clust. Comput."},{"key":"ref_328","doi-asserted-by":"crossref","first-page":"16233","DOI":"10.1007\/s11227-023-05272-6","article-title":"Blockchain-enabled secure and efficient data sharing scheme for trust management in healthcare smartphone network","volume":"79","author":"Bhan","year":"2023","journal-title":"J. Supercomput."},{"key":"ref_329","unstructured":"Bhudia, A., Cartwright, A., Cartwright, E., Hurley-Smith, D., and Hernandez-Castro, J. (September, January 29). Game Theoretic Modelling of a Ransom and Extortion Attack on Ethereum Validators. Proceedings of the 18th International Conference on Availability, Reliability and Security (ARES), Benevento, Italy."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/4\/183\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:18:50Z","timestamp":1760030330000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/4\/183"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,21]]},"references-count":329,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2025,4]]}},"alternative-id":["fi17040183"],"URL":"https:\/\/doi.org\/10.3390\/fi17040183","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,21]]}}}