SoK: Decentralized Finance (DeFi) Attacks

—Within just four years, the blockchain-based De- centralized Finance (DeFi) ecosystem has accumulated a peak total value locked (TVL) of more than 253 billion USD. This surge in DeFi’s popularity has, unfortunately, been accompanied by many impactful incidents. According to our data, users, liquidity providers, speculators, and protocol operators suffered a total loss of at least 3 . 24 billion USD from Apr 30 , 2018 to Apr 30 , 2022 . Given the blockchain’s transparency and increasing incident frequency, two questions arise: How can we systematically measure, evaluate, and compare DeFi incidents? How can we learn from past attacks to strengthen DeFi security? In this paper, we introduce a common reference frame to systematically evaluate and compare DeFi incidents , including both attacks and accidents. We investigate 77 academic papers, 30 audit reports, and 181 real-world incidents. Our open data reveals several gaps between academia and the practitioners’ community. For example, few academic papers address “price oracle attacks” and “permissonless interactions”, while our data suggests that they are the two most frequent incident types ( 15% and 10 . 5% correspondingly). We also investigate potential defenses, and find that: (i) 103 ( 56% ) of the attacks are not executed atomically, granting a rescue time frame for defenders; (ii) SoTA bytecode similarity analysis can at least detect 31 vulnerable/ 23 adversarial contracts; and (iii) 33 ( 15 . 3% ) of the adversaries leak potentially identifiable information by interacting with centralized exchanges.

[1]  Roger Wattenhofer,et al.  Risks and Returns of Uniswap V3 Liquidity Providers , 2022, Conference on Advances in Financial Technologies.

[2]  Roger Wattenhofer,et al.  TWAP Oracle Attacks: Easier Done than Said? , 2022, 2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).

[3]  Ye Wang,et al.  Impact and User Perception of Sandwich Attacks in the DeFi Ecosystem , 2022, CHI.

[4]  Roger Wattenhofer,et al.  SoK: Preventing Transaction Reordering Manipulations in Decentralized Finance , 2022, AFT.

[5]  Roger Wattenhofer,et al.  An Empirical Study of Market Inefficiencies in Uniswap and SushiSwap , 2022, Financial Cryptography Workshops.

[6]  F. Yue,et al.  Bytecode Similarity Detection of Smart Contract across Optimization Options and Compiler Versions Based on Triplet Network , 2022, Electronics.

[7]  Roger Wattenhofer,et al.  Eliminating Sandwich Attacks with the Help of Game Theory , 2022, AsiaCCS.

[8]  Arthur Gervais,et al.  On How Zero-Knowledge Proof Blockchain Mixers Improve, and Worsen User Privacy , 2022 .

[9]  Ye Wang,et al.  Cyclic Arbitrage in Decentralized Exchanges , 2021, WWW.

[10]  Giovanni Vigna,et al.  SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds , 2021, 2022 IEEE Symposium on Security and Privacy (SP).

[11]  Arthur Gervais,et al.  Quantifying Blockchain Extractable Value: How dark is the forest? , 2021, 2022 IEEE Symposium on Security and Privacy (SP).

[12]  Gilad Stern,et al.  Uncle Maker: (Time)Stamping Out The Competition in Ethereum , 2023, IACR Cryptol. ePrint Arch..

[13]  David Mohaisen,et al.  Revisiting Nakamoto Consensus in Asynchronous Networks: A Comprehensive Analysis of Bitcoin Safety and ChainQuality , 2021, CCS.

[14]  Kai Li,et al.  DETER: Denial of Ethereum Txpool sERvices , 2021, CCS.

[15]  David Mohaisen,et al.  SyncAttack: Double-spending in Bitcoin Without Mining Power , 2021, CCS.

[16]  Sebastian Faust,et al.  The Exact Security of BIP32 Wallets , 2021, IACR Cryptol. ePrint Arch..

[17]  Alex Groce,et al.  SMARTIAN: Enhancing Smart Contract Fuzzing with Static and Dynamic Data-Flow Analyses , 2021, 2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE).

[18]  Tim Roughgarden,et al.  How Does Blockchain Security Dictate Blockchain Implementation? , 2021, CCS.

[19]  D. Zhu,et al.  Similarity Measure for Smart Contract Bytecode Based on CFG Feature Extraction , 2021, 2021 International Conference on Computer Information Science and Artificial Intelligence (CISAI).

[20]  Yepang Liu,et al.  Characterizing Transaction-Reverting Statements in Ethereum Smart Contracts , 2021, 2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE).

[21]  Jeremy Clark,et al.  TokenHook: Secure ERC-20 smart contract , 2021, ArXiv.

[22]  Anna A. Igolkina,et al.  semopy 2: A Structural Equation Modeling Package with Random Effects in Python , 2021, ArXiv.

[23]  Arthur Gervais,et al.  CeFi vs. DeFi - Comparing Centralized to Decentralized Finance , 2021, ArXiv.

[24]  Ye Wang,et al.  Behavior of Liquidity Providers in Decentralized Exchanges , 2021, 2105.13822.

[25]  Isil Dillig,et al.  SmartPulse: Automated Checking of Temporal Properties in Smart Contracts , 2021, 2021 IEEE Symposium on Security and Privacy (SP).

[26]  Lei Wu,et al.  DeFiRanger: Detecting Price Manipulation Attacks on DeFi Applications , 2021, ArXiv.

[27]  Andrew C. Myers,et al.  Compositional Security for Reentrant Applications , 2021, 2021 IEEE Symposium on Security and Privacy (SP).

[28]  Benjamin Livshits,et al.  On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols , 2021, 2021 IEEE Symposium on Security and Privacy (SP).

[29]  Zibin Zheng,et al.  Understanding Code Reuse in Smart Contracts , 2021, 2021 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER).

[30]  Xiapu Luo,et al.  Smart Contract Security: A Practitioners' Perspective , 2021, 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE).

[31]  Radu State,et al.  Frontrunner Jones and the Raiders of the Dark Forest: An Empirical Study of Frontrunning on the Ethereum Blockchain , 2021, USENIX Security Symposium.

[32]  Sam M. Werner,et al.  SoK: Decentralized Finance (DeFi) , 2021, AFT.

[33]  Ghassan O. Karame,et al.  EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts , 2020, USENIX Security Symposium.

[34]  Arthur Gervais,et al.  High-Frequency Trading on Decentralized On-Chain Exchanges , 2020, 2021 IEEE Symposium on Security and Privacy (SP).

[35]  Fabian Schär Decentralized Finance: On Blockchain- and Smart Contract-Based Financial Markets , 2020, Review.

[36]  B. Livshits,et al.  Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit , 2020, Financial Cryptography.

[37]  Lingxiao Jiang,et al.  Checking Smart Contracts With Structural Code Embedding , 2020, IEEE Transactions on Software Engineering.

[38]  Pawel Szalachowski,et al.  The Security Reference Architecture for Blockchains: Toward a Standardized Model for Studying Vulnerabilities, Threats, and Defenses , 2019, IEEE Communications Surveys & Tutorials.

[39]  Irfan Ul Haq,et al.  A Survey of Binary Code Similarity , 2019, ACM Comput. Surv..

[40]  Hayden Adams,et al.  Uniswap v3 Core , 2021 .

[41]  Adam Doupé,et al.  Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask) , 2021, Financial Cryptography.

[42]  Baoxu Liu,et al.  Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications , 2021, USENIX Security Symposium.

[43]  Hakjoo Oh,et al.  SmarTest: Effectively Hunting Vulnerable Transaction Sequences in Smart Contracts through Language Model-Guided Symbolic Execution , 2021, USENIX Security Symposium.

[44]  A. Juels,et al.  SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Reinforcement Learning , 2021, NDSS.

[45]  Xiapu Luo,et al.  As Strong As Its Weakest Link: How to Break Blockchain DApps at RPC Service , 2021, NDSS.

[46]  Benjamin Livshits,et al.  Smart Contract Vulnerabilities: Vulnerable Does Not Imply Exploited , 2021, USENIX Security Symposium.

[47]  Manar H. Alalfi,et al.  A Survey of Security Vulnerabilities in Ethereum Smart Contracts , 2021, CASCON.

[48]  Shiping Chen,et al.  SoK: Diving into DAG-based Blockchain Systems , 2020, ArXiv.

[49]  Arthur Gervais,et al.  AMR: autonomous coin mixer with privacy preserving reward distribution , 2020, AFT.

[50]  Osamu Mizuno,et al.  Code cloning in smart contracts: a case study on verified contracts from the Ethereum blockchain platform , 2020, Empirical Software Engineering.

[51]  Yinxing Xue,et al.  Cross-Contract Static Analysis for Detecting Practical Reentrancy Vulnerabilities in Smart Contracts , 2020, 2020 35th IEEE/ACM International Conference on Automated Software Engineering (ASE).

[52]  A. Plastun,et al.  Daily abnormal price changes and trading strategies in the FOREX , 2020 .

[53]  Rastislav Bodik,et al.  Summary-Based Symbolic Evaluation for Smart Contracts , 2020, 2020 35th IEEE/ACM International Conference on Automated Software Engineering (ASE).

[54]  Savva Shanaev,et al.  Efficient scholars: academic attention and the disappearance of anomalies , 2020 .

[55]  Sungjae Hwang,et al.  Gap between Theory and Practice: An Empirical Study of Security Patches in Solidity , 2020, 2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE).

[56]  Constantin Enea,et al.  Behavioral simulation for smart contracts , 2020, PLDI.

[57]  Fan Long,et al.  Securing smart contract with runtime validation , 2020, PLDI.

[58]  Yannis Smaragdakis,et al.  Ethainter: a smart contract security analyzer for composite vulnerabilities , 2020, PLDI.

[59]  Clara Schneidewind,et al.  eThor: Practical and Provably Sound Static Analysis of Ethereum Smart Contracts , 2020, CCS.

[60]  Jun Sun,et al.  Semantic Understanding of Smart Contracts: Executable Operational Semantics of Solidity , 2020, 2020 IEEE Symposium on Security and Privacy (SP).

[61]  Ari Juels,et al.  Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability , 2020, 2020 IEEE Symposium on Security and Privacy (SP).

[62]  Dimitar Dimitrov,et al.  VerX: Safety Verification of Smart Contracts , 2020, 2020 IEEE Symposium on Security and Privacy (SP).

[63]  Jun Sun,et al.  sFuzz: An Efficient Adaptive Fuzzer for Solidity Smart Contracts , 2020, 2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE).

[64]  Benjamin Livshits,et al.  The Decentralized Financial Crisis: Attacking DeFi , 2020, ArXiv.

[65]  Pedro Moreno-Sanchez,et al.  SoK: Layer-Two Blockchain Protocols , 2020, Financial Cryptography.

[66]  Friedhelm Victor,et al.  Address Clustering Heuristics for Ethereum , 2020, Financial Cryptography.

[67]  Ari Juels,et al.  BDoS: Blockchain Denial-of-Service , 2019, CCS.

[68]  Rui Abreu,et al.  Empirical Review of Automated Analysis Tools on 47,587 Ethereum Smart Contracts , 2019, 2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE).

[69]  Daniel Perez,et al.  Broken Metre: Attacking Resource Metering in EVM , 2019, NDSS.

[70]  Heejo Lee,et al.  VERISMART: A Highly Precise Safety Verifier for Ethereum Smart Contracts , 2019, 2020 IEEE Symposium on Security and Privacy (SP).

[71]  Lei Wu,et al.  Characterizing Code Clones in the Ethereum Smart Contract Ecosystem , 2019, Financial Cryptography.

[72]  Daniel W. Woods Systematization of Knowledge: Quantifying Cyber Risk , 2020 .

[73]  Bitcoin Proof of Stake: A Peer-to-Peer Electronic Cash System , 2020 .

[74]  Yinqian Zhang,et al.  TXSPECTOR: Uncovering Attacks in Ethereum from Transactions , 2020, USENIX Security Symposium.

[75]  Yinzhi Cao,et al.  An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem , 2020, USENIX Security Symposium.

[76]  Thorsten Holz,et al.  ETHBMC: A Bounded Model Checker for Smart Contracts , 2020, USENIX Security Symposium.

[77]  Yuxing Tang,et al.  SODA: A Generic Online Detection Framework for Smart Contracts , 2020, NDSS.

[78]  George Bissias,et al.  Bobtail: Improved Blockchain Security with Low-Variance Mining , 2020, NDSS.

[79]  Mislav Balunovic,et al.  Learning to Fuzz from Symbolic Execution with Application to Smart Contracts , 2019, CCS.

[80]  Xiapu Luo,et al.  TokenScope: Automatically Detecting Inconsistent Behaviors of Cryptocurrency Tokens in Ethereum , 2019, CCS.

[81]  Sebastian Faust,et al.  A Formal Treatment of Deterministic Wallets , 2019, IACR Cryptol. ePrint Arch..

[82]  Robin Doss,et al.  Security Analysis Methods on Ethereum Smart Contract Vulnerabilities: A Survey , 2019, ArXiv.

[83]  Shouhuai Xu,et al.  A Survey on Ethereum Systems Security: Vulnerabilities, Attacks and Defenses , 2019 .

[84]  Jia-Guang Sun,et al.  Enabling Clone Detection For Ethereum Via Smart Contract Birthmarks , 2019, 2019 IEEE/ACM 27th International Conference on Program Comprehension (ICPC).

[85]  Yannis Smaragdakis,et al.  Gigahorse: Thorough, Declarative Decompilation of Smart Contracts , 2019, 2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE).

[86]  Mike Joy,et al.  Source-code Similarity Detection and Detection Tools Used in Academia , 2019, ACM Trans. Comput. Educ..

[87]  Pawel Szalachowski,et al.  StrongChain: Transparent and Collaborative Proof-of-Work Consensus , 2019, USENIX Security Symposium.

[88]  Aziz Mohaisen,et al.  Exploring the Attack Surface of Blockchain: A Systematic Overview , 2019, ArXiv.

[89]  Bart Preneel,et al.  Lay Down the Common Metrics: Evaluating Proof-of-Work Consensus Protocols' Security , 2019, 2019 IEEE Symposium on Security and Privacy (SP).

[90]  Mathis Steichen,et al.  The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts , 2019, USENIX Security Symposium.

[91]  Zeinab Amin,et al.  A practical road map for assessing cyber risk , 2019 .

[92]  Bernhard Haslhofer,et al.  An Empirical Analysis of Monero Cross-Chain Traceability , 2018, ArXiv.

[93]  Ghassan O. Karame,et al.  Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks , 2018, NDSS.

[94]  Sarah Meiklejohn,et al.  Tracing Transactions Across Cryptocurrency Ledgers , 2018, USENIX Security Symposium.

[95]  Pawel Szalachowski,et al.  PDFS: Practical Data Feed Service for Smart Contracts , 2018, ESORICS.

[96]  Ee-Chien Chang,et al.  Towards Scaling Blockchain Systems via Sharding , 2018, SIGMOD Conference.

[97]  Arthur Gervais,et al.  NOCUST – A Securely Scalable Commit-Chain , 2019 .

[98]  Ethan Heilman,et al.  Low-Resource Eclipse Attacks on Ethereum's Peer-to-Peer Network , 2020, IACR Cryptol. ePrint Arch..

[99]  Alan Mislove,et al.  Analyzing Ethereum's Contract Topology , 2018, Internet Measurement Conference.

[100]  Andrew Miller,et al.  Measuring Ethereum Network Peers , 2018, Internet Measurement Conference.

[101]  Abhi Shelat,et al.  A Better Method to Analyze Blockchain Consistency , 2018, CCS.

[102]  Mariana Raykova,et al.  RapidChain: Scaling Blockchain via Full Sharding , 2018, CCS.

[103]  Vincent Gramoli,et al.  Vandal: A Scalable Security Analysis Framework for Smart Contracts , 2018, ArXiv.

[104]  Chao Liu,et al.  S-gram: Towards Semantic-Aware Security Auditing for Ethereum Smart Contracts , 2018, 2018 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE).

[105]  Christian Rossow,et al.  teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts , 2018, USENIX Security Symposium.

[106]  Ye Liu,et al.  ContractFuzzer: Fuzzing Smart Contracts for Vulnerability Detection , 2018, 2018 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE).

[107]  APPEARANCE AND DISAPPEARANCE OF ANOMALIES , 2018, Lecture Notes in Behavioral Finance.

[108]  Petar Tsankov,et al.  Securify: Practical Security Analysis of Smart Contracts , 2018, CCS.

[109]  Philipp Jovanovic,et al.  OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding , 2018, 2018 IEEE Symposium on Security and Privacy (SP).

[110]  Ittay Eyal,et al.  The Gap Game , 2018, SYSTOR.

[111]  Albert Rubio,et al.  EthIR: A Framework for High-Level Analysis of Ethereum Bytecode , 2018, ATVA.

[112]  Sarah Meiklejohn,et al.  An Empirical Analysis of Anonymity in Zcash , 2018, USENIX Security Symposium.

[113]  Prateek Saxena,et al.  Finding The Greedy, Prodigal, and Suicidal Contracts at Scale , 2018, ACSAC.

[114]  J. Cotter,et al.  Are Equity Market Anomalies Disappearing? Evidence from the U.K. , 2018 .

[115]  Ittai Abraham,et al.  Online detection of effectively callback free objects with applications to smart contracts , 2017, Proc. ACM Program. Lang..

[116]  S. Matthew Weinberg,et al.  Arbitrum: Scalable, private smart contracts , 2018, USENIX Security Symposium.

[117]  Yi Zhou,et al.  Erays: Reverse Engineering Ethereum's Opaque Smart Contracts , 2018, USENIX Security Symposium.

[118]  Sukrit Kalra,et al.  ZEUS: Analyzing Safety of Smart Contracts , 2018, NDSS.

[119]  Prateek Saxena,et al.  Obscuro: A Bitcoin Mixer using Trusted Execution Environments , 2018, IACR Cryptol. ePrint Arch..

[120]  Ari Juels,et al.  Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts , 2018, IACR Cryptol. ePrint Arch..

[121]  Jeffrey Quesnelle,et al.  On the linkability of Zcash transactions , 2017, ArXiv.

[122]  Tsz Hon Yuen,et al.  RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero , 2017, ESORICS.

[123]  Massimo Bartoletti,et al.  A Survey of Attacks on Ethereum Smart Contracts (SoK) , 2017, POST.

[124]  Xiapu Luo,et al.  Under-optimized smart contracts devour your money , 2017, 2017 IEEE 24th International Conference on Software Analysis, Evolution and Reengineering (SANER).

[125]  Prateek Saxena,et al.  A Secure Sharding Protocol For Open Blockchains , 2016, CCS.

[126]  Prateek Saxena,et al.  Making Smart Contracts Smarter , 2016, IACR Cryptol. ePrint Arch..

[127]  Hubert Ritzdorf,et al.  On the Security and Performance of Proof of Work Blockchains , 2016, IACR Cryptol. ePrint Arch..

[128]  Martin White,et al.  Deep learning code fragments for code clone detection , 2016, 2016 31st IEEE/ACM International Conference on Automated Software Engineering (ASE).

[129]  Arthur Gervais,et al.  Ethereum Eclipse Attacks , 2016 .

[130]  Hubert Ritzdorf,et al.  Tampering with the Delivery of Blocks and Transactions in Bitcoin , 2015, IACR Cryptol. ePrint Arch..

[131]  Emin Gün Sirer,et al.  Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.

[132]  Daniel Davis Wood,et al.  ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .

[133]  S A R A H M E I K L E J O H N,et al.  A Fistful of Bitcoins Characterizing Payments Among Men with No Names , 2013 .

[134]  Ghassan O. Karame,et al.  Evaluating User Privacy in Bitcoin , 2013, Financial Cryptography.

[135]  Rick H. Hoyle,et al.  Handbook of structural equation modeling , 2012 .

[136]  C. Stein,et al.  Structural equation modeling. , 2012, Methods in molecular biology.

[137]  M. Asif Khan,et al.  Cyber security quantification model , 2010, SIN.

[138]  Chanchal Kumar Roy,et al.  Comparison and evaluation of code clone detection techniques and tools: A qualitative approach , 2009, Sci. Comput. Program..

[139]  Phil Wood Confirmatory Factor Analysis for Applied Research , 2008 .

[140]  S. Nakamoto,et al.  Bitcoin: A Peer-to-Peer Electronic Cash System , 2008 .

[141]  Sushil Jajodia,et al.  Toward measuring network security using attack graphs , 2007, QoP '07.

[142]  P. Barrett Structural equation modelling : Adjudging model fit , 2007 .

[143]  Chanchal K. Roy,et al.  A Survey on Software Clone Detection Research , 2007 .

[144]  Brady T. West,et al.  Linear Mixed Models: A Practical Guide Using Statistical Software , 2006 .

[145]  Dianne M. Finkelstein,et al.  A Beginner's Guide to Structural Equation Modeling , 2005, Technometrics.

[146]  Jun Sun,et al.  Assessing Goodness of Fit in Confirmatory Factor Analysis , 2005 .

[147]  Somesh Jha,et al.  Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[148]  Susan Horwitz,et al.  Using Slicing to Identify Duplication in Source Code , 2001, SAS.

[149]  B. Byrne Structural equation modeling with EQS : basic concepts, applications, and programming , 2000 .

[150]  Rick H. Hoyle,et al.  Confirmatory Factor Analysis , 1983 .

[151]  Detmar W. Straub,et al.  Structural Equation Modeling and Regression: Guidelines for Research Practice , 2000, Commun. Assoc. Inf. Syst..

[152]  Stéphane Ducasse,et al.  A language independent approach for detecting duplicated code , 1999, Proceedings IEEE International Conference on Software Maintenance - 1999 (ICSM'99). 'Software Maintenance for Business Change' (Cat. No.99CB36360).

[153]  Rex B. Kline,et al.  Principles and Practice of Structural Equation Modeling , 1998 .

[154]  L. D. Moura,et al.  Clone detection using abstract syntax trees , 1998, Proceedings. International Conference on Software Maintenance (Cat. No. 98CB36272).

[155]  Murray D. Smith,et al.  Structural Equation Modeling: Concepts, Issues, and Applications , 1996 .

[156]  Brenda S. Baker,et al.  On finding duplication and near-duplication in large software systems , 1995, Proceedings of 2nd Working Conference on Reverse Engineering.

[157]  R. Hoyle The structural equation modeling approach: Basic concepts and fundamental issues. , 1995 .

[158]  A. Satorra,et al.  Corrections to test statistics and standard errors in covariance structure analysis. , 1994 .

[159]  Karl G. Jöreskog,et al.  Lisrel 8: Structural Equation Modeling With the Simplis Command Language , 1993 .

[160]  N. Strong,et al.  MODELLING ABNORMAL RETURNS: A REVIEW ARTICLE , 1992 .

[161]  P. Bentler,et al.  Comparative fit indexes in structural models. , 1990, Psychological bulletin.

[162]  Robert T. Braden,et al.  Requirements for Internet Hosts - Communication Layers , 1989, RFC.

[163]  Janet L. Yellen,et al.  A Near-Rational Model of the Business Cycle , 1985 .

[164]  Karl G. Jöreskog,et al.  Recent Developments in Structural Equation Modeling , 1982 .

[165]  C. Fornell,et al.  Structural Equation Models with Unobservable Variables and Measurement Error: Algebra and Statistics , 1981 .

[166]  M. Rubin,et al.  Dynamics of dimensional reduction , 1980 .

[167]  P. Bentler,et al.  Significance Tests and Goodness of Fit in the Analysis of Covariance Structures , 1980 .

[168]  B. Muthén,et al.  Assessing Reliability and Stability in Panel Models , 1977 .

[169]  K. Jöreskog A General Method for Estimating a Linear Structural Equation System. , 1970 .