{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T17:02:14Z","timestamp":1726851734939},"reference-count":161,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","funder":[{"DOI":"10.13039\/501100004826","name":"Beijing Natural Science Foundation","doi-asserted-by":"publisher","award":["4212008"],"id":[{"id":"10.13039\/501100004826","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272031"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002881","name":"Civil Aviation University of China","doi-asserted-by":"publisher","award":["ISECCA-202101"],"id":[{"id":"10.13039\/501100002881","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U21A20463,U22B2027"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/CAA J. Autom. Sinica"],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1109\/jas.2023.123642","type":"journal-article","created":{"date-parts":[[2023,7,25]],"date-time":"2023-07-25T17:41:03Z","timestamp":1690306863000},"page":"1647-1667","source":"Crossref","is-referenced-by-count":19,"title":["Attacks Against Cross-Chain Systems and Defense Approaches: A Contemporary Survey"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-1825-7416","authenticated-orcid":false,"given":"Li","family":"Duan","sequence":"first","affiliation":[{"name":"Beijing Jiaotong University,Beijing Key Laboratory of Security and Privacy in Intelligent Transportation,Beijing,China,100044"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-0429-2146","authenticated-orcid":false,"given":"Yangyang","family":"Sun","sequence":"additional","affiliation":[{"name":"Beijing Jiaotong University,Beijing Key Laboratory of Security and Privacy in Intelligent Transportation,Beijing,China,100044"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-0780-4637","authenticated-orcid":false,"given":"Wei","family":"Ni","sequence":"additional","affiliation":[{"name":"Data61 Business Unit, Commonwealth Scientific and Industrial Research Organisation (CSIRO),Communications and Signal Processing Team,Sydney,NSW,Australia,2109"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-8072-9007","authenticated-orcid":false,"given":"Weiping","family":"Ding","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Nantong University,Nantong,China,226019"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-1147-4327","authenticated-orcid":false,"given":"Jiqiang","family":"Liu","sequence":"additional","affiliation":[{"name":"Beijing Jiaotong University,Beijing Key Laboratory of Security and Privacy in Intelligent Transportation,Beijing,China,100044"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-5974-1589","authenticated-orcid":false,"given":"Wei","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing Jiaotong University,Beijing Key Laboratory of Security and Privacy in Intelligent Transportation,Beijing,China,100044"}]}],"member":"263","reference":[{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-9213-3_17"},{"key":"ref56","year":"2023","journal-title":"Wanchain"},{"key":"ref59","article-title":"Overview of Polkadot and its design considerations","author":"burdges","year":"2020","journal-title":"ArXiv Preprint"},{"key":"ref58","author":"davies","year":"2017","journal-title":"Web-Based Xcat Tool for Easy ZEC\/BTC Atomic Trading"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00057"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3190979"},{"key":"ref55","first-page":"1","article-title":"Bridges between islands: Cross-chain technology for distributed ledger technology","author":"kannengie\u00dfer","year":"2020","journal-title":"Proc 53rd Hawaii Int Conf System Sciences"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.3390\/sym11101198"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.3390\/app9091788"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.2174\/9781681088624121010007"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2957660"},{"key":"ref45","article-title":"Privacy in the internet of things: Where do we stand? A systematic literature review","author":"gupta","year":"2022","journal-title":"TechRxiv"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107529"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2018.1451660"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICPECA53709.2022.9719075"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109378"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.2968505"},{"key":"ref43","first-page":"287","article-title":"Development and application of blockchain cross-chain technology","volume":"49","author":"sun","year":"2022","journal-title":"Comput Sci"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/5307697"},{"key":"ref8","year":"2023","journal-title":"JPMorgan chase"},{"key":"ref7","author":"morgan","year":"2016","journal-title":"Quorum Whitepaper"},{"key":"ref9","year":"2023","journal-title":"Corda"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3473714.3473730"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2991734"},{"key":"ref6","year":"2023","journal-title":"Ethereum"},{"key":"ref5","year":"2023","journal-title":"Bitcoin"},{"key":"ref100","year":"2019","journal-title":"Doingblock\/smart-contract-security"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1145\/3505263"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-06791-4_23"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICMTMA52658.2021.00083"},{"key":"ref34","first-page":"1","article-title":"The research summary of the development and application of blockchain cross-chain technology","volume":"40","author":"he","year":"2021","journal-title":"J Xinhua Univ (Nat Sci Ed )"},{"key":"ref37","first-page":"35","article-title":"Analysis of cross-chain technology of blockchain","volume":"4","author":"guo","year":"2020","journal-title":"The Chinese internet of things"},{"key":"ref36","first-page":"341","article-title":"Survey on crosschain technology","volume":"38","author":"xu","year":"2021","journal-title":"Appl Res Comput"},{"key":"ref31","first-page":"83","article-title":"Research on cross-chain technology of Blockchain","volume":"19","author":"lu","year":"2019","journal-title":"Netinfo Security"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2021.3057679"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2926880"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4268"},{"key":"ref33","first-page":"48","article-title":"Security threat analysis of blockchain technology","volume":"39","author":"sun","year":"2019","journal-title":"J Nanjing Univ Posts Telecommut (Nature Sci )"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9020255"},{"key":"ref32","first-page":"1649","article-title":"Research on the progress in cross-chain technology of blockchains","volume":"30","author":"li","year":"2019","journal-title":"J Software"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2019.2929420"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3228535"},{"key":"ref38","first-page":"2177","article-title":"Survey on cross-chain protocols of blockchain","volume":"16","author":"meng","year":"2022","journal-title":"Journal of Frontiers of Computer Science and Technology"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3527392"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3005361"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/ICSGEA53208.2021.00098"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-15979-4_19"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.5772\/intechopen.100096"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.08.007"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.01.017"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.17016\/FEDS.2022.057"},{"key":"ref23","author":"redman","year":"2022","journal-title":"Hacker siphons $80 million from Qubit cross-chain bridge largest Defi exploit of 2022 to date"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSEA54677.2022.9936330"},{"key":"ref25","author":"alam","year":"2022","journal-title":"Understanding the economies of blockchain games An empirical analysis of Axie Infinity"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1177\/15501477211059945"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1016\/S0262-4079(21)01450-0"},{"key":"ref22","year":"2021","journal-title":"Stablecoin $TSD comes under attack with 11 8B coins minted and sold by hacker"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3131711"},{"key":"ref21","article-title":"Holistic privacy and usability of a cryptocurrency wallet","author":"halpin","year":"2021","journal-title":"ArXiv Preprint"},{"key":"ref158","author":"liu","year":"2020","journal-title":"Enhancing IoT security with blockchain"},{"key":"ref28","article-title":"Towards atomic cross-chain token transfers: State of the art and open questions within TAST","author":"borkowski","year":"2018","journal-title":"Distributed Systems Group TU Wien"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-23679-2_7"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3333165.3333167"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1287\/mksc.1080.0369"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2908998"},{"key":"ref13","author":"h\u00e4fner","year":"2021","journal-title":"Research update The case for candle auctions"},{"key":"ref12","author":"relay","year":"2016","journal-title":"Frequently asked questions—BTC relay 1 0 documentation"},{"key":"ref15","author":"buterin","year":"2016","journal-title":"Chain Interoperability"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/IWBOSE.2018.8327565"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/fintech1020015"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2019.2932202"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.020"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2020.3038641"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain50366.2020.00048"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1145\/3391195"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488683"},{"key":"ref99","author":"vladimirov","year":"2018","journal-title":"ERC20 API An attack vector on the Approve\/TransferFrom methods"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1145\/3152434.3152449"},{"key":"ref10","year":"2023","journal-title":"Hyperledger fabric"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/JCC49151.2020.00009"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2020.2990103"},{"key":"ref17","author":"wegrzyn","year":"2021","journal-title":"Types of blockchain Public private or something in between"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2985577"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1631\/1\/012189"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.11.004"},{"key":"ref93","article-title":"Blockchain and cryptocurrency: A comparative framework of the main architectural drivers","author":"garriga","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1145\/3416262"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_24"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.03.011"},{"key":"ref95","year":"2021","journal-title":"Vulnerability details CVE-2021–44790"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1145\/3316615.3316689"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1145\/3377644.3377650"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100332"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-020-00363-x"},{"key":"ref91","article-title":"The curses of blockchain decentralization","author":"chu","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2975999"},{"key":"ref89","article-title":"Low-resource eclipse attacks on Ethereum's peer-to-peer network","author":"marcus","year":"2018","journal-title":"IACR Cryptology"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45237-7_7"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102635"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1486\/3\/032004"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-022-04941-5"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.8105"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/MENACOMM.2018.8371010"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2896108"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/MOBILESoft.2019.00031"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54455-6_8"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4142"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.23919\/FRUCT50888.2021.9347617"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_2"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.3390\/s20113268"},{"key":"ref84","author":"rodenburg","year":"2017","journal-title":"Blockchain and quantum computing"},{"key":"ref142","author":"venturo","year":"2021","journal-title":"Safemath"},{"key":"ref83","author":"laboratory","year":"2017","journal-title":"Top-tier backdoor of US NSA equation group"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2745"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3063770"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2971463"},{"key":"ref80","author":"mosakheil","year":"2018","journal-title":"Security Threats Classification in Blockchains"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS48256.2020.9027450"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-819816-2.00015-0"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23330"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1145\/3517189"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3559520"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME46990.2020.00023"},{"key":"ref75","author":"xu","year":"2019","journal-title":"BitXHub whitepaper"},{"key":"ref104","author":"reynolds","year":"2020","journal-title":"Cover protocol attack perpetrated by ‘White Hat ’ funds returned hacker claims"},{"key":"ref74","year":"2019","journal-title":"WeCross whitepaper"},{"key":"ref105","year":"2019","journal-title":"Slowmist\/Knowledge-base"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-7927-5.ch007"},{"key":"ref102","first-page":"157","article-title":"An ever-evolving game: Evaluation of real-world attacks and defenses in Ethereum ecosystem","author":"zhou","year":"0","journal-title":"Proc 29th USENIX Conf Security Symp"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2022.3228122"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1145\/3407023.3407072"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-021-00864-9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2018.2854904"},{"key":"ref71","author":"blummer","year":"2018","journal-title":"An introduction to Hyperledger"},{"key":"ref111","first-page":"28","article-title":"The challenge and prospect of distributed data management techniques in blockchain systems","volume":"44","author":"yu","year":"2021","journal-title":"Chin J Comput"},{"key":"ref70","author":"jimmyshi","year":"2023","journal-title":"WeCross A collaboration platform of crosschain"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1115\/IMECE2019-10135"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/DAPPS52256.2021.00015"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.05.033"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-95405-5_26"},{"key":"ref68","author":"wood","year":"2017","journal-title":"Polkadot Vision for a heterogeneous multi-chain framework"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-31500-9_16"},{"key":"ref67","author":"poon","year":"2016","journal-title":"The bitcoin lightning network Scalable off-chain instant payments"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.2000134"},{"key":"ref69","author":"kwon","year":"2016","journal-title":"Cosmos a network of distributed ledgers"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3096124"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-94340-4_12"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100162"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2300113"},{"key":"ref116","author":"qureshi","year":"2017","journal-title":"A hacker stole $31M of Ether - how it happened and what it means for Ethereum"},{"key":"ref66","author":"thomas","year":"2015","journal-title":"A Protocol for Interledger Payments"},{"key":"ref113","author":"wei","year":"2018","journal-title":"Blockchain security white paper"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00072"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-78184-2_6"},{"key":"ref60","author":"kwon","year":"2021","journal-title":"Cosmos Whitepaper"},{"key":"ref122","author":"kohler","year":"2022","journal-title":"One two or two hundred Internets? The politics of future internet architectures"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP48549.2020.00026"},{"key":"ref62","year":"2023","journal-title":"BTC Relay"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.3390\/s22228833"},{"key":"ref61","first-page":"294","article-title":"BitXHub: Side-relay Chain based heterogeneous blockchain interoperable platform","volume":"47","author":"ye","year":"2020","journal-title":"Comput Sci"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1145\/3465084.3467904"}],"container-title":["IEEE\/CAA Journal of Automatica Sinica"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6570654\/10193878\/10194241.pdf?arnumber=10194241","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,14]],"date-time":"2023-08-14T17:59:17Z","timestamp":1692035957000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10194241\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8]]},"references-count":161,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/jas.2023.123642","relation":{},"ISSN":["2329-9266","2329-9274"],"issn-type":[{"value":"2329-9266","type":"print"},{"value":"2329-9274","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8]]}}}