{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T16:12:53Z","timestamp":1726762373991},"reference-count":34,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2022,9,1]]},"DOI":"10.1109\/tdsc.2021.3079315","type":"journal-article","created":{"date-parts":[[2021,5,11]],"date-time":"2021-05-11T20:06:43Z","timestamp":1620763603000},"page":"2965-2981","source":"Crossref","is-referenced-by-count":45,"title":["Make Web3.0 Connected"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-7532-0434","authenticated-orcid":false,"given":"Zhuotao","family":"Liu","sequence":"first","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Yangxi","family":"Xiang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Jian","family":"Shi","sequence":"additional","affiliation":[{"name":"Case Western Reserve University, Cleveland, OH, USA"}]},{"given":"Peng","family":"Gao","sequence":"additional","affiliation":[{"name":"Virginia Tech, Blacksburg, VA, USA"}]},{"given":"Haoyu","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-4797-4294","authenticated-orcid":false,"given":"Xusheng","family":"Xiao","sequence":"additional","affiliation":[{"name":"Case Western Reserve University, Cleveland, OH, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-6874-6453","authenticated-orcid":false,"given":"Bihan","family":"Wen","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-8776-8730","authenticated-orcid":false,"given":"Qi","family":"Li","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Yih-Chun","family":"Hu","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Champaign, IL, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3355503"},{"key":"ref2","article-title":"Enabling blockchain innovations with pegged sidechains","author":"Back","year":"2014"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3212734.3212736"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00085"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00040"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107415324.004.2014"},{"key":"ref8","first-page":"279","article-title":"Enhancing bitcoin security and performance with strong consistency via collective signing","volume-title":"Proc. 25th USENIX Conf. Secur. Symp.","author":"Kogias"},{"key":"ref9","first-page":"45","article-title":"Bitcoin-NG: A scalable blockchain protocol","volume-title":"Proc. 13th Usenix Conf. Netw. Syst. Des. Implementation","author":"Eyal"},{"key":"ref10","first-page":"95","article-title":"Monoxide: Scale out blockchains with asynchronous consensus zones","volume-title":"Proc. 16th USENIX Conf. Netw. Syst. Des. Implementation","author":"Wang"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243853"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.000-5"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23241"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.55"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00023"},{"key":"ref16","first-page":"1317","article-title":"TEETHER: Gnawing at ethereum to automatically exploit smart contracts","volume-title":"Proc. 27th USENIX Conf. Secur. Symp.","author":"Krupp"},{"key":"ref17","first-page":"1335","article-title":"Enter the hydra: Towards principled bug bounties and exploit-resistant smart contracts","volume-title":"Proc. 27th USENIX Conf. Security Symp.","author":"Breidenbach"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"ref19","first-page":"675","article-title":"DIZK: A distributed zero knowledge proof system","volume-title":"Proc. 27th USENIX Conf. Secur. Symp.","author":"Wu"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417239"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/359545.359563"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978326"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63688-7_10"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3355503"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2001.959888"},{"key":"ref27","article-title":"Antlr","author":"Parr","year":"2014"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-43725-1_3"},{"key":"ref39","article-title":"Move: A language with programmable resources","author":"Blackshear","year":"2019"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250755"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142485"},{"key":"ref42","article-title":"Chimera: A declarative language for streaming network traffic analysis","volume-title":"Proc. 21st USENIX Conf. Secur. Symp.","author":"Borders"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663735"},{"key":"ref44","first-page":"345","article-title":"VAST: A unified platform for interactive network forensics","volume-title":"Proc. 13th USENIX Symp. Netw. Syst. Des. Implementation","author":"Vallentin"},{"key":"ref45","first-page":"113","article-title":"AIQL: Enabling efficient attack investigation from system monitoring data","volume-title":"Proc. USENIX Conf. Usenix Annu. Tech. Conf.","author":"Gao"},{"key":"ref46","first-page":"639","article-title":"SAQL: A stream-based query system for real-time abnormal system behavior detection","volume-title":"Proc. 27th USENIX Conf. Secur. Symp.","author":"Gao"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/9872146\/09428608.pdf?arnumber=9428608","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T23:57:52Z","timestamp":1704844672000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9428608\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,1]]},"references-count":34,"journal-issue":{"issue":"5"},"URL":"http:\/\/dx.doi.org\/10.1109\/tdsc.2021.3079315","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,1]]}}}