{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:30:17Z","timestamp":1772908217685,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T00:00:00Z","timestamp":1601856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001866","name":"Fonds National de la Recherche Luxembourg","doi-asserted-by":"publisher","award":["13192291"],"award-info":[{"award-number":["13192291"]}],"id":[{"id":"10.13039\/501100001866","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,5]]},"DOI":"10.1145\/3320269.3384756","type":"proceedings-article","created":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T16:33:22Z","timestamp":1601915602000},"page":"584-597","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":35,"title":["\u00c6GIS: Shielding Vulnerable Smart Contracts Against Attacks"],"prefix":"10.1145","author":[{"given":"Christof","family":"Ferreira Torres","sequence":"first","affiliation":[{"name":"University of Luxembourg, Luxembourg, Luxembourg"}]},{"given":"Mathis","family":"Baden","sequence":"additional","affiliation":[{"name":"University of Luxembourg, Luxembourg, Luxembourg"}]},{"given":"Robert","family":"Norvill","sequence":"additional","affiliation":[{"name":"University of Luxembourg, Luxembourg, Luxembourg"}]},{"given":"Beltran Borja","family":"Fiz Pontiveros","sequence":"additional","affiliation":[{"name":"University of Luxembourg, Luxembourg, Luxembourg"}]},{"given":"Hugo","family":"Jonker","sequence":"additional","affiliation":[{"name":"Open University of the Netherlands &amp; Radboud University, Heerlen &amp; Nijmegen, Netherlands"}]},{"given":"Sjouke","family":"Mauw","sequence":"additional","affiliation":[{"name":"University of Luxembourg, Luxembourg, Luxembourg"}]}],"member":"320","published-online":{"date-parts":[[2020,10,5]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3167084"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54455-6_8"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2017.9301"},{"key":"e_1_3_2_2_4_1","unstructured":"Jordi Baylina. 2019. Verification of the balances rescued from the multisig compromise. https:\/\/github.com\/Giveth\/WHGBalanceVerification.  Jordi Baylina. 2019. Verification of the balances rescued from the multisig compromise. https:\/\/github.com\/Giveth\/WHGBalanceVerification."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2993600.2993611"},{"key":"e_1_3_2_2_6_1","volume-title":"Proc. 27th USENIX Security Symposium (USENIX Security'18)","author":"Breidenbach Lorenz","year":"2018"},{"key":"e_1_3_2_2_7_1","unstructured":"ChainSecurity. 2019. Constantinople enables new Reentrancy Attack. https:\/\/medium.com\/chainsecurity\/constantinople-enables-new-reentrancy-attack-ace4088297d9.  ChainSecurity. 2019. Constantinople enables new Reentrancy Attack. https:\/\/medium.com\/chainsecurity\/constantinople-enables-new-reentrancy-attack-ace4088297d9."},{"key":"e_1_3_2_2_8_1","unstructured":"Ashu Daniel Lv. 2016. CarbonVote. https:\/\/http:\/\/carbonvote.com\/.  Ashu Daniel Lv. 2016. CarbonVote. https:\/\/http:\/\/carbonvote.com\/."},{"key":"e_1_3_2_2_9_1","unstructured":"devops199. 2017. anyone can kill your contract #6995. https:\/\/github.com\/paritytech\/parity-ethereum\/issues\/6995.  devops199. 2017. anyone can kill your contract #6995. https:\/\/github.com\/paritytech\/parity-ethereum\/issues\/6995."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/WETSEB.2019.00008"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-89722-6_10"},{"key":"e_1_3_2_2_12_1","volume-title":"Proceedings of the ACM on Programming Languages","volume":"2","author":"Grossman Shelly","year":"2017"},{"key":"e_1_3_2_2_13_1","unstructured":"NCC Group. 2018. Decentralized Application Security Project (DASP) Top 10. https:\/\/dasp.co\/index.html.  NCC Group. 2018. Decentralized Application Security Project (DASP) Top 10. https:\/\/dasp.co\/index.html."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2008.0127"},{"key":"e_1_3_2_2_15_1","volume-title":"Proc. 26th ACM SIGSAC Conference on Computer and Communications Security (CCS'19)","author":"He Jingxuan","year":"1953"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2018.00022"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2018.00151"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238177"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23082"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330560"},{"key":"e_1_3_2_2_21_1","volume-title":"27th USENIX Security Symposium (USENIX Security'18)","author":"Krupp Johannes","year":"2018"},{"key":"e_1_3_2_2_22_1","first-page":"8","article-title":"Electronic voting service using block-chain","volume":"11","author":"Lee Kibin","year":"2016","journal-title":"Journal of Digital Forensics, Security and Law"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70972-7_20"},{"key":"e_1_3_2_2_25_1","volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System. Cryptography Mailing list at https:\/\/metzdowd.com (03","author":"Nakamoto Satoshi","year":"2009"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274743"},{"key":"e_1_3_2_2_27_1","volume-title":"The future of democracy: Blockchain voting. COMP116: Information Security","author":"Osgood Ryan","year":"2016"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00024"},{"key":"e_1_3_2_2_29_1","unstructured":"Sergey Petrov. 2017. Another Parity Wallet hack explained. https:\/\/medium.com\/@Pr0Ger\/another-parity-wallet-hack-explained-847ca46a2e1c.  Sergey Petrov. 2017. Another Parity Wallet hack explained. https:\/\/medium.com\/@Pr0Ger\/another-parity-wallet-hack-explained-847ca46a2e1c."},{"key":"e_1_3_2_2_30_1","unstructured":"Michael Rodler Wenting Li Ghassan O. Karame and Lucas Davi. 2019 a. Re-Entrancy Attack Patterns. https:\/\/github.com\/uni-due-syssec\/eth-reentrancy-attack-patterns.  Michael Rodler Wenting Li Ghassan O. Karame and Lucas Davi. 2019 a. Re-Entrancy Attack Patterns. https:\/\/github.com\/uni-due-syssec\/eth-reentrancy-attack-patterns."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23413"},{"key":"e_1_3_2_2_32_1","unstructured":"David Siegel. 2016. Understanding The DAO Attack. https:\/\/www.coindesk.com\/understanding-dao-hack-journalists\/.  David Siegel. 2016. Understanding The DAO Attack. https:\/\/www.coindesk.com\/understanding-dao-hack-journalists\/."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10773-018-3929-6"},{"key":"e_1_3_2_2_34_1","volume-title":"Sourav Sen Gupta, and Yew-Soon Ong.","author":"Tann A","year":"2018"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3194113.3194115"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274737"},{"key":"e_1_3_2_2_37_1","volume-title":"The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts. In 28th USENIX Security Symposium (USENIX Security 19)","author":"Torres Christof Ferreira","year":"2019"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243780"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-NIER.2019.00009"},{"key":"e_1_3_2_2_40_1","first-page":"1","article-title":"Ethereum: A secure decentralised generalised transaction ledger","volume":"151","author":"Wood Gavin","year":"2014","journal-title":"Ethereum Project Yellow Paper"},{"key":"e_1_3_2_2_41_1","volume-title":"Harvey: A greybox fuzzer for smart contracts. arXiv preprint arXiv:1905.06944","author":"W\u00fcstholz Valentin","year":"2019"},{"key":"e_1_3_2_2_42_1","volume-title":"SolidityCheck: Quickly Detecting Smart Contract Problems Through Regular Expressions. arXiv preprint arXiv:1911.09425","author":"Zhang Pengcheng","year":"2019"},{"key":"e_1_3_2_2_43_1","unstructured":"Wolfie Zhao. 2017. $30 Million: Ether Reported Stolen Due to Parity Wallet Breach. https:\/\/www.coindesk.com\/30-million-ether-reported-stolen-parity-wallet-breach.  Wolfie Zhao. 2017. $30 Million: Ether Reported Stolen Due to Parity Wallet Breach. https:\/\/www.coindesk.com\/30-million-ether-reported-stolen-parity-wallet-breach."},{"key":"e_1_3_2_2_44_1","volume-title":"Proc. 17th International Conference on Information and Communications Security (ICICS'15)","volume":"9543","author":"Zhao Zhichao","year":"2015"},{"key":"e_1_3_2_2_45_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Zhou Yi","year":"2018"}],"event":{"name":"ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security","location":"Taipei Taiwan","acronym":"ASIA CCS '20","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 15th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3384756","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3320269.3384756","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:28Z","timestamp":1750200088000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3384756"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,5]]},"references-count":45,"alternative-id":["10.1145\/3320269.3384756","10.1145\/3320269"],"URL":"https:\/\/doi.org\/10.1145\/3320269.3384756","relation":{},"subject":[],"published":{"date-parts":[[2020,10,5]]},"assertion":[{"value":"2020-10-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}