{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T18:51:15Z","timestamp":1726080675148},"publisher-location":"Cham","reference-count":49,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030452339"},{"type":"electronic","value":"9783030452346"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,4,17]],"date-time":"2020-04-17T00:00:00Z","timestamp":1587081600000},"content-version":"vor","delay-in-days":107,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-45234-6_4","type":"book-chapter","created":{"date-parts":[[2020,4,20]],"date-time":"2020-04-20T10:04:23Z","timestamp":1587377063000},"page":"75-96","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A Generalized Formal Semantic Framework for Smart Contracts"],"prefix":"10.1007","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-0543-1147","authenticated-orcid":false,"given":"Jiao","family":"Jiao","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-9726-3434","authenticated-orcid":false,"given":"Shang-Wei","family":"Lin","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-3545-1392","authenticated-orcid":false,"given":"Jun","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,17]]},"reference":[{"key":"4_CR1","unstructured":"Bamboo (2018), https:\/\/github.com\/pirapira\/bamboo"},{"key":"4_CR2","unstructured":"Ethereum (2020), https:\/\/www.ethereum.org"},{"key":"4_CR3","unstructured":"Implementation Details (2020), https:\/\/github.com\/SmartContractSemantics\/SemanticFrameworkforSmartContracts"},{"key":"4_CR4","unstructured":"Mythril (2020), https:\/\/github.com\/ConsenSys\/mythril"},{"key":"4_CR5","unstructured":"Remix - Solidity IDE (2020), https:\/\/remix.ethereum.org"},{"key":"4_CR6","unstructured":"Solidity Compiler Test Set (2020), https:\/\/github.com\/ethereum\/solidity"},{"key":"4_CR7","unstructured":"Solidity Documentation (2020), https:\/\/solidity.readthedocs.io\/en\/latest"},{"key":"4_CR8","unstructured":"Vyper Documentation (2020), https:\/\/vyper.readthedocs.io\/en\/latest"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Amani, S., B\u00e9gel, M., Bortin, M., Staples, M.: Towards Verifying Ethereum Smart Contract Bytecode in Isabelle\/HOL. In: Proceedings of the 7th ACM SIGPLAN International Conference on Certified Programs and Proofs. pp. 66\u201377. CPP 2018, ACM, New York, NY, USA (2018)","DOI":"10.1145\/3176245.3167084"},{"key":"4_CR10","doi-asserted-by":"publisher","unstructured":"Atzei, N., Bartoletti, M., Cimoli, T.: A Survey of Attacks on Ethereum Smart Contracts (SoK). In: Maffei, M., Ryan, M. (eds.) Principles of Security and Trust - 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings. Lecture Notes in Computer Science, vol. 10204, pp. 164\u2013186. Springer (2017). https:\/\/doi.org\/10.1007\/978-3-662-54455-6_8","DOI":"10.1007\/978-3-662-54455-6_8"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Bartoletti, M., Galletta, L., Murgia, M.: A Minimal Core Calculus for Solidity Contracts. In: DPM\/CBT@ESORICS (2019)","DOI":"10.1007\/978-3-030-31500-9_15"},{"key":"4_CR12","unstructured":"Bhargavan, K., Delignat-Lavaud, A., Fournet, C., Gollamudi, A., Gonthier, G., Kobeissi, N., Kulatova, N., Rastogi, A., Sibut-Pinote, T., Swamy, N., B\u00e9guelin, S.Z.: Formal Verification of Smart Contracts: Short Paper. In: Murray, T.C., Stefan, D. (eds.) Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security, PLAS@CCS 2016, Vienna, Austria, October 24, 2016. pp. 91\u201396. ACM (2016)"},{"key":"4_CR13","unstructured":"Bogdanas, D., Rosu, G.: K-Java: A Complete Semantics of Java. In: Rajamani, S.K., Walker, D. (eds.) Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2015, Mumbai, India, January 15-17, 2015. pp. 445\u2013456. ACM (2015)"},{"key":"4_CR14","unstructured":"Chen, T., Zhang, Y., Li, Z., Luo, X., Wang, T., Cao, R., Xiao, X., Zhang, X.: TokenScope: Automatically Detecting Inconsistent Behaviors of Cryptocurrency Tokens in Ethereum. In: Cavallaro, L., Kinder, J., Wang, X., Katz, J. (eds.) Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, London, UK, November 11-15, 2019. pp. 1503\u20131520. ACM (2019)"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Crafa, S., Pirro, M., Zucca, E.: Is Solidity Solid Enough? In: Financial Cryptography Workshops (2019)","DOI":"10.1007\/978-3-030-43725-1_11"},{"key":"4_CR16","doi-asserted-by":"publisher","unstructured":"Delmolino, K., Arnett, M., Kosba, A.E., Miller, A., Shi, E.: Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab. In: Clark, J., Meiklejohn, S., Ryan, P.Y.A., Wallach, D.S., Brenner, M., Rohloff, K. (eds.) Financial Cryptography and Data Security - FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers. Lecture Notes in Computer Science, vol. 9604, pp. 79\u201394. Springer (2016). https:\/\/doi.org\/10.1007\/978-3-662-53357-4_6","DOI":"10.1007\/978-3-662-53357-4_6"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Drescher, D.: Blockchain Basics (2017)","DOI":"10.1007\/978-1-4842-2604-9"},{"key":"4_CR18","unstructured":"Ellison, C., Rosu, G.: An Executable Formal Semantics of C with Applications. In: Field, J., Hicks, M. (eds.) Proceedings of the 39th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2012, Philadelphia, Pennsylvania, USA, January 22-28, 2012. pp. 533\u2013544. ACM (2012)"},{"key":"4_CR19","unstructured":"Feist, J., Grieco, G., Groce, A.: Slither: A Static Analysis Framework for Smart Contracts. In: Proceedings of the 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain, WETSEB@ICSE 2019, Montreal, QC, Canada, May 27, 2019. pp. 8\u201315. IEEE \/ ACM (2019)"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Grech, N., Kong, M., Jurisevic, A., Brent, L., Scholz, B., Smaragdakis, Y.: MadMax: Surviving Out-of-gas Conditions in Ethereum Smart Contracts. PACMPL 2(OOPSLA), 116:1\u2013116:27 (2018)","DOI":"10.1145\/3276486"},{"key":"4_CR21","doi-asserted-by":"publisher","unstructured":"Grishchenko, I., Maffei, M., Schneidewind, C.: A Semantic Framework for the Security Analysis of Ethereum Smart Contracts. In: Bauer, L., K\u00fcsters, R. (eds.) Principles of Security and Trust - 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings. Lecture Notes in Computer Science, vol. 10804, pp. 243\u2013269. Springer (2018). https:\/\/doi.org\/10.1007\/978-3-319-89722-6_10","DOI":"10.1007\/978-3-319-89722-6_10"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Grossman, S., Abraham, I., Golan-Gueta, G., Michalevsky, Y., Rinetzky, N., Sagiv, M., Zohar, Y.: Online Detection of Effectively Callback Free Objects with Applications to Smart Contracts. PACMPL 2(POPL), 48:1\u201348:28 (2018)","DOI":"10.1145\/3158136"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Hajdu, \u00c1., Jovanovic, D.: solc-verify: A Modular Verifier for Solidity Smart Contracts. arXiv preprint abs\/1907.04262 (2019)","DOI":"10.1007\/978-3-030-41600-3_11"},{"key":"4_CR24","unstructured":"Hildenbrandt, E., Saxena, M., Rodrigues, N., Zhu, X., Daian, P., Guth, D., Moore, B.M., Park, D., Zhang, Y., Stefanescu, A., Ro\u015fu, G.: KEVM: A Complete Formal Semantics of the Ethereum Virtual Machine. In: 31st IEEE Computer Security Foundations Symposium, CSF 2018, Oxford, United Kingdom, July 9-12, 2018. pp. 204\u2013217. IEEE Computer Society (2018)"},{"key":"4_CR25","doi-asserted-by":"publisher","unstructured":"Hirai, Y.: Defining the Ethereum Virtual Machine for Interactive Theorem Provers. In: Brenner, M., Rohloff, K., Bonneau, J., Miller, A., Ryan, P.Y.A., Teague, V., Bracciali, A., Sala, M., Pintore, F., Jakobsson, M. (eds.) Financial Cryptography and Data Security - FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers. Lecture Notes in Computer Science, vol. 10323, pp. 520\u2013535. Springer (2017). https:\/\/doi.org\/10.1007\/978-3-319-70278-0_33","DOI":"10.1007\/978-3-319-70278-0_33"},{"key":"4_CR26","unstructured":"Jiang, B., Liu, Y., Chan, W.K.: ContractFuzzer: Fuzzing Smart Contracts for Vulnerability Detection. In: Huchard, M., K\u00e4stner, C., Fraser, G. (eds.) Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering, ASE 2018, Montpellier, France, September 3-7, 2018. pp. 259\u2013269. ACM (2018)"},{"key":"4_CR27","unstructured":"Jiao, J., Kan, S., Lin, S., San\u00e1n, D., Liu, Y., Sun, J.: Executable Operational Semantics of Solidity. arXiv preprint abs\/1804.01295 (2018)"},{"key":"4_CR28","unstructured":"Kalra, S., Goel, S., Dhawan, M., Sharma, S.: ZEUS: Analyzing Safety of Smart Contracts. In: 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 18-21, 2018. The Internet Society (2018)"},{"key":"4_CR29","unstructured":"Kolluri, A., Nikolic, I., Sergey, I., Hobor, A., Saxena, P.: Exploiting the Laws of Order in Smart Contracts. In: Zhang, D., M\u00f8ller, A. (eds.) Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 2019, Beijing, China, July 15-19, 2019. pp. 363\u2013373. ACM (2019)"},{"key":"4_CR30","unstructured":"Krupp, J., Rossow, C.: teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts. In: Enck, W., Felt, A.P. (eds.) 27th USENIX Security Symposium, USENIX Security 2018, Baltimore, MD, USA, August 15-17, 2018. pp. 1317\u20131333. USENIX Association (2018)"},{"key":"4_CR31","unstructured":"Lahiri, S.K., Chen, S., Wang, Y., Dillig, I.: Formal Specification and Verification of Smart Contracts for Azure Blockchain. arXiv preprint abs\/1812.08829 (2018)"},{"key":"4_CR32","unstructured":"Luu, L., Chu, D., Olickel, H., Saxena, P., Hobor, A.: Making Smart Contracts Smarter. In: Weippl, E.R., Katzenbeisser, S., Kruegel, C., Myers, A.C., Halevi, S. (eds.) Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016. pp. 254\u2013269. ACM (2016)"},{"key":"4_CR33","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/S0304-3975(01)00357-7","volume":"285","author":"N Mart\u00ed-Oliet","year":"2002","unstructured":"Mart\u00ed-Oliet, N., Meseguer, J.: Rewriting Logic: Roadmap and Bibliography. Theor. Comput. Sci. 285, 121\u2013154 (2002)","journal-title":"Theor. Comput. Sci."},{"key":"4_CR34","unstructured":"Mossberg, M., Manzano, F., Hennenfent, E., Groce, A., Grieco, G., Feist, J., Brunson, T., Dinaburg, A.: Manticore: A User-Friendly Symbolic Execution Framework for Binaries and Smart Contracts. In: 34th IEEE\/ACM International Conference on Automated Software Engineering, ASE 2019, San Diego, CA, USA, November 11-15, 2019. pp. 1186\u20131189. IEEE (2019)"},{"key":"4_CR35","doi-asserted-by":"crossref","unstructured":"Nehai, Z., Bobot, F.: Deductive Proof of Ethereum Smart Contracts Using Why3. arXiv preprint abs\/1904.11281 (2019)","DOI":"10.1007\/978-3-030-54994-7_22"},{"key":"4_CR36","unstructured":"Nikolic, I., Kolluri, A., Sergey, I., Saxena, P., Hobor, A.: Finding the Greedy, Prodigal, and Suicidal Contracts at Scale. In: Proceedings of the 34th Annual Computer Security Applications Conference, ACSAC 2018, San Juan, PR, USA, December 03-07, 2018. pp. 653\u2013663. ACM (2018)"},{"volume-title":"IMP: A Simple Imperative Language","year":"2014","author":"T Nipkow","key":"4_CR37","unstructured":"Nipkow, T., Klein, G.: IMP: A Simple Imperative Language. Concrete Semantics. Springer, Cham (2014)"},{"key":"4_CR38","unstructured":"Rodler, M., Li, W., Karame, G.O., Davi, L.: Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks. In: 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24-27, 2019. The Internet Society (2019)"},{"issue":"6","key":"4_CR39","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1016\/j.jlap.2010.03.012","volume":"79","author":"G Ro\u015fu","year":"2010","unstructured":"Ro\u015fu, G., \u015eerb\u0103nu\u0163\u0103, T.F.: An Overview of the K Semantic Framework. Journal of Logic and Algebraic Programming 79(6), 397\u2013434 (2010)","journal-title":"Journal of Logic and Algebraic Programming"},{"key":"4_CR40","unstructured":"Sergey, I., Kumar, A., Hobor, A.: Scilla: A Smart Contract Intermediate-level Language. arXiv preprint abs\/1801.00687 (2018)"},{"key":"4_CR41","unstructured":"Siegel, D.: Understanding the DAO Attack (2016), https:\/\/www.coindesk.com\/understanding-dao-hack-journalists"},{"key":"4_CR42","unstructured":"Stefanescu, A., Park, D., Yuwen, S., Li, Y., Ro\u015fu, G.: Semantics-based Program Verifiers for All Languages. In: Visser, E., Smaragdakis, Y. (eds.) Proceedings of the 2016 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2016, part of SPLASH 2016, Amsterdam, The Netherlands, October 30 - November 4, 2016. pp. 74\u201391. ACM (2016)"},{"key":"4_CR43","unstructured":"Tikhomirov, S., Voskresenskaya, E., Ivanitskiy, I., Takhaviev, R., Marchenko, E., Alexandrov, Y.: SmartCheck: Static Analysis of Ethereum Smart Contracts. In: 1st IEEE\/ACM International Workshop on Emerging Trends in Software Engineering for Blockchain, WETSEB@ICSE 2018, Gothenburg, Sweden, May 27 - June 3, 2018. pp. 9\u201316. ACM (2018)"},{"key":"4_CR44","unstructured":"Tsankov, P., Dan, A.M., Drachsler-Cohen, D., Gervais, A., B\u00fcnzli, F., Vechev, M.T.: Securify: Practical Security Analysis of Smart Contracts. In: Lie, D., Mannan, M., Backes, M., Wang, X. (eds.) Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, ON, Canada, October 15-19, 2018. pp. 67\u201382. ACM (2018)"},{"key":"4_CR45","unstructured":"Wang, H., Li, Y., Lin, S., Ma, L., Liu, Y.: VULTRON: Catching Vulnerable Smart Contracts Once and for All. In: Sarma, A., Murta, L. (eds.) Proceedings of the 41st International Conference on Software Engineering: New Ideas and Emerging Results, ICSE (NIER) 2019, Montreal, QC, Canada, May 29-31, 2019. pp. 1\u20134. IEEE \/ ACM (2019)"},{"key":"4_CR46","doi-asserted-by":"crossref","unstructured":"Wang, S., Zhang, C., Su, Z.: Detecting Nondeterministic Payment Bugs in Ethereum Smart Contracts. PACMPL 3(OOPSLA), 189:1\u2013189:29 (2019)","DOI":"10.1145\/3360615"},{"key":"4_CR47","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood, G.: Ethereum: A Secure Decentralised Generalised Transaction Ledger. Ethereum project yellow paper 151, 1\u201332 (2014)","journal-title":"Ethereum project yellow paper"},{"key":"4_CR48","unstructured":"Yang, Z., Lei, H.: Lolisa: Formal Syntax and Semantics for a Subset of the Solidity Programming Language. arXiv preprint abs\/1803.09885 (2018)"},{"key":"4_CR49","doi-asserted-by":"publisher","unstructured":"Zakrzewski, J.: Towards Verification of Ethereum Smart Contracts: A Formalization of Core of Solidity. In: Piskac, R., R\u00fcmmer, P. (eds.) Verified Software. Theories, Tools, and Experiments - 10th International Conference, VSTTE 2018, Oxford, UK, July 18-19, 2018, Revised Selected Papers. Lecture Notes in Computer Science, vol. 11294, pp. 229\u2013247. Springer (2018). https:\/\/doi.org\/10.1007\/978-3-030-03592-1_13","DOI":"10.1007\/978-3-030-03592-1_13"}],"container-title":["Lecture Notes in Computer Science","Fundamental Approaches to Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-45234-6_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,21]],"date-time":"2022-10-21T16:33:31Z","timestamp":1666370011000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-45234-6_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030452339","9783030452346"],"references-count":49,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-45234-6_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"17 April 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FASE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Fundamental Approaches to Software Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dublin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ireland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 April 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 April 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fase2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.etaps.org\/2020\/fase","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"81","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference could not take place due to the COVID-19 pandemic. There was an online event on July 2, 2020.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}