{"id":"https://openalex.org/W4213385795","doi":"https://doi.org/10.1155/2022/5307697","title":"Multiple-Layer Security Threats on the Ethereum Blockchain and Their Countermeasures","display_name":"Multiple-Layer Security Threats on the Ethereum Blockchain and Their Countermeasures","publication_year":2022,"publication_date":"2022-02-14","ids":{"openalex":"https://openalex.org/W4213385795","doi":"https://doi.org/10.1155/2022/5307697"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1155/2022/5307697","pdf_url":"https://downloads.hindawi.com/journals/scn/2022/5307697.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0122","issn":["1939-0122","1939-0114"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://downloads.hindawi.com/journals/scn/2022/5307697.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019931070","display_name":"Li Duan","orcid":"https://orcid.org/0000-0002-1825-7416"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Li Duan","raw_affiliation_strings":["Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing 100044, China","Guangxi Key Laboratory of Cryptography and Information Security, Guilin, Guangxi, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing 100044, China","institution_ids":["https://openalex.org/I21193070"]},{"raw_affiliation_string":"Guangxi Key Laboratory of Cryptography and Information Security, Guilin, Guangxi, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089371917","display_name":"Yangyang Sun","orcid":"https://orcid.org/0000-0003-0429-2146"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yangyang Sun","raw_affiliation_strings":["Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing 100044, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing 100044, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100614380","display_name":"Kejia Zhang","orcid":"https://orcid.org/0000-0001-9715-6076"},"institutions":[{"id":"https://openalex.org/I55022517","display_name":"Heilongjiang University","ror":"https://ror.org/04zyhq975","country_code":"CN","type":"education","lineage":["https://openalex.org/I55022517"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Kejia Zhang","raw_affiliation_strings":["Cryptology and Cyberspace Security Laboratory of Heilongjiang University, Harbin 150080, China","School of Mathematical Science, Heilongjiang University, Harbin 150080, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematical Science, Heilongjiang University, Harbin 150080, China","institution_ids":["https://openalex.org/I55022517"]},{"raw_affiliation_string":"Cryptology and Cyberspace Security Laboratory of Heilongjiang University, Harbin 150080, China","institution_ids":["https://openalex.org/I55022517"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078775578","display_name":"Yong Ding","orcid":"https://orcid.org/0000-0002-3571-7576"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong Ding","raw_affiliation_strings":["Guangxi Key Laboratory of Cryptography and Information Security, Guilin, Guangxi, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Cryptography and Information Security, Guilin, Guangxi, China","institution_ids":["https://openalex.org/I4210132990"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5019931070","https://openalex.org/A5100614380"],"corresponding_institution_ids":["https://openalex.org/I21193070","https://openalex.org/I4210132990","https://openalex.org/I55022517"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100,"provenance":"doaj"},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100,"provenance":"doaj"},"fwci":6.942,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":17,"citation_normalized_percentile":{"value":0.99998,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":"2022","issue":null,"first_page":"1","last_page":"11"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14319","display_name":"Currency Recognition and Detection","score":0.9225,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9043,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.54289}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7814728},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.78018665},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.7708917},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.58017737},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.54289},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.4821336},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.47197682},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.28927618},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.21217349},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0882552},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1155/2022/5307697","pdf_url":"https://downloads.hindawi.com/journals/scn/2022/5307697.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0122","issn":["1939-0122","1939-0114"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":false,"landing_page_url":"https://doaj.org/article/3e43eb7b36c54d2a8bca20a93d6cd174","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1155/2022/5307697","pdf_url":"https://downloads.hindawi.com/journals/scn/2022/5307697.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0122","issn":["1939-0122","1939-0114"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"score":0.51,"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16"}],"grants":[{"funder":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China","award_id":"2018GXNSFDA281054"},{"funder":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China","award_id":"2020YFB1006003"},{"funder":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China","award_id":"61902021"},{"funder":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China","award_id":"2020YFB1005604"},{"funder":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China","award_id":"GCIS201915"},{"funder":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China","award_id":"4212008"},{"funder":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China","award_id":"2020B0101090002"}],"datasets":[],"versions":[],"referenced_works_count":27,"referenced_works":["https://openalex.org/W1969344535","https://openalex.org/W2075144441","https://openalex.org/W2535104337","https://openalex.org/W2539190473","https://openalex.org/W2604844934","https://openalex.org/W2790202156","https://openalex.org/W2794657757","https://openalex.org/W2888928288","https://openalex.org/W2916931547","https://openalex.org/W2949557841","https://openalex.org/W2963264685","https://openalex.org/W2997496941","https://openalex.org/W3014171364","https://openalex.org/W3031032747","https://openalex.org/W3034459010","https://openalex.org/W3101970570","https://openalex.org/W3105687330","https://openalex.org/W3143486787","https://openalex.org/W3151748982","https://openalex.org/W3155100939","https://openalex.org/W3155347870","https://openalex.org/W3159494182","https://openalex.org/W3167877708","https://openalex.org/W3198996574","https://openalex.org/W3204546036","https://openalex.org/W3211401014","https://openalex.org/W4248175462"],"related_works":["https://openalex.org/W4286539397","https://openalex.org/W3091388705","https://openalex.org/W2958385475","https://openalex.org/W2921433547","https://openalex.org/W2898696280","https://openalex.org/W2783466926","https://openalex.org/W2383770723","https://openalex.org/W2370216173","https://openalex.org/W2360429410","https://openalex.org/W2204131204"],"abstract_inverted_index":{"Blockchain":[0],"technology":[1],"has":[2,159],"been":[3],"widely":[4],"used":[5],"in":[6,47,65,85],"digital":[7],"currency,":[8],"Internet":[9],"of":[10,17,26,113,122],"Things,":[11],"and":[12,21,69,118,146,154],"other":[13],"important":[14],"fields":[15],"because":[16],"its":[18],"decentralization,":[19],"nontampering,":[20],"anonymity.":[22],"The":[23],"vigorous":[24],"development":[25],"blockchain":[27,43],"cannot":[28],"be":[29],"separated":[30],"from":[31],"the":[32,42,48,60,66,71,156],"security":[33,39,62,72],"guarantee.":[34],"However,":[35],"there":[36],"are":[37,80,89,134],"various":[38],"threats":[40,63],"within":[41],"that":[44,141,155],"have":[45],"shown":[46],"past":[49],"to":[50],"cause":[51],"huge":[52],"financial":[53],"losses.":[54],"This":[55,125],"paper":[56,126],"aims":[57],"at":[58,161],"studying":[59],"multi-level":[61],"existing":[64],"Ethereum":[67],"blockchain,":[68],"exploring":[70],"protection":[73,129],"schemes":[74,133],"under":[75],"multiple":[76],"attack":[77,82],"scenarios.":[78],"There":[79],"ten":[81],"scenarios":[83],"studied":[84],"this":[86],"paper,":[87],"which":[88],"replay":[90],"attack,":[91,94,97,101,104,106,108,111,117],"short":[92],"url":[93],"false":[95],"top-up":[96],"transaction":[98],"order":[99],"dependence":[100],"integer":[102],"overflow":[103],"re-entrancy":[105],"honeypot":[107],"airdrop":[109],"hunting":[110],"writing":[112],"arbitrary":[114],"storage":[115],"address":[116],"gas":[119],"exhaustion":[120],"denial":[121],"service":[123],"attack.":[124],"also":[127],"proposes":[128],"schemes.":[130],"Finally,":[131],"these":[132],"evaluated":[135],"by":[136],"experiments.":[137],"Experimental":[138],"results":[139],"show":[140],"our":[142],"approach":[143],"is":[144],"efficient":[145],"does":[147],"not":[148],"bring":[149],"too":[150],"much":[151],"extra":[152],"cost":[153,158],"time":[157],"doubled":[160],"most.":[162]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4213385795","counts_by_year":[{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":9},{"year":2022,"cited_by_count":4}],"updated_date":"2025-01-01T23:16:08.033389","created_date":"2022-02-24"}