skip to main content
10.1145/3479722.3480994acmconferencesArticle/Chapter ViewAbstractPublication PagesaftConference Proceedingsconference-collections
research-article

SoK: oracles from the ground truth to market manipulation

Published: 23 November 2021 Publication History

Abstract

One fundamental limitation of blockchain-based smart contracts is that they execute in a closed environment. Thus, they only have access to data and functionality that is already on the blockchain, or is fed into the blockchain. Any interactions with the real world need to be mediated by a bridge service, which is called an oracle. As decentralized applications mature, oracles are playing an increasingly prominent role. With their evolution comes more attacks, necessitating greater attention to their trust model. In this systemization of knowledge paper (SoK), we dissect the design alternatives for oracles, showcase attacks, and discuss attack mitigation strategies.

References

[1]
Hayden Adams. 2019. Uniswap. URl: https://uniswap.org/docs (2019).
[2]
Hayden Adams, Noah Zinsmeister, Moody Salem, River Keefer, and Dan Robinson. 2021. Uniswap v3 Core. (2021).
[3]
John Adler, Ryan Berryhill, Andreas Veneris, Zissis Poulos, Neil Veira, and Anastasia Kastania. 2018. Astraea: A decentralized blockchain oracle. In 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, 1145--1152.
[4]
Hamda Al-Breiki, Muhammad Habib Ur Rehman, Khaled Salah, and Davor Svetinovic. 2020. Trustworthy Blockchain Oracles: Review, Comparison, and Open Research Challenges. IEEE Access 8 (2020), 85675--85685.
[5]
Mojtaba Alizadeh, Mazdak Zamani, Ali Rafiei Shahemabad, Jafar Shayan, and Ahmad Azarnik. 2012. A survey on attacks in RFID networks. Open International Journal of Informatics (OIJI) 1, 1 (2012), 15--24.
[6]
Guillermo Angeris and Tarun Chitra. 2020. Improved Price Oracles: Constant Function Market Makers. arXiv preprint arXiv:2003.10001 (2020).
[7]
Nicola Atzei, Massimo Bartoletti, and Tiziana Cimoli. 2017. A survey of attacks on ethereum smart contracts (sok). In International conference on principles of security and trust. Springer, 164--186.
[8]
Balancer. 2020. A protocol for programmable liquidity. URl: https://balancer.finance/ (2020).
[9]
Burak Benligiray, Saša Milic, and Heikki Vänttinen. [n.d.]. Decentralized APIs for Web 3.0. ([n. d.]).
[10]
T Bernani. 2016. Oraclize. URl: https://www.oraclize.it/ (2016).
[11]
Alex Biryukov, Dmitry Khovratovich, and Sergei Tikhomirov. 2017. Findel: Secure derivative contracts for Ethereum. In International Conference on Financial Cryptography and Data Security. Springer, 453--467.
[12]
George Bissias, Brian Neil Levine, A Pinar Ozisik, and Gavin Andresen. 2016. An analysis of attacks on blockchain consensus. arXiv preprint arXiv:1610.07985 (2016).
[13]
Chainlink Blog. 2021. 16 Ways to Create Dynamic Non-Fungible Tokens (NFT) Using Chainlink Oracles. URl: https://blog.chain.link/create-dynamic-nfts-using-chainlink-oracles/ (2021).
[14]
Dan Boneh, Joseph Bonneau, Benedikt Bünz, and Ben Fisch. 2018. Verifiable Delay Functions. In Advances in Cryptology - CRYPTO 2018 (Lecture Notes in Computer Science, Vol. 10991). Springer, 757--788.
[15]
Gilles Brassard, David Chaum, and Claude Crépeau. 1988. Minimum disclosure proofs of knowledge. Journal of computer and system sciences 37, 2 (1988), 156--189.
[16]
Ferdinand Brasser, Urs Müller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, and Ahmad-Reza Sadeghi. 2017. Software grand exposure: {SGX} cache attacks are practical. In 11th {USENIX} Workshop on Offensive Technologies ({WOOT} 17).
[17]
Lorenz Breidenbach, Christian Cachin, Alex Coventry, Ari Juels, and Andrew Miller. 2021. Chainlink Off-chain Reporting Protocol. URl: https://blog.chain.link/off-chain-reporting-live-on-mainnet/ (2021).
[18]
Benedikt Bünz, Steven Goldfeder, and Joseph Bonneau. 2017. Proofs-of-delay and randomness beacons in ethereum. IEEE Security and Privacy on the blockchain (IEEE S&B) (2017).
[19]
Vitalik Buterin. 2021. UNI should become an oracle token. URl: https://gov.uniswap.org/t/uni-should-become-an-oracle-token/11988 (2021).
[20]
Miguel Castro and Barbara Liskov. 2002. Practical Byzantine fault tolerance and proactive recovery. ACM Transactions on Computer Systems (TOCS) 20, 4 (2002), 398--461.
[21]
Chainlink. 2020. Chainlink VRF: On-chain Verifiable Randomness. URl: https://blog.chain.link/verifiable-random-functions-vrf-random-number-generation-rng-feature/ (2020).
[22]
ChainLink. 2020. What is the Blockchain Oracle Problem. URl: https://blog.chain.link/what-is-the-blockchain-oracle-problem/ (2020).
[23]
Krishnendu Chatterjee, Amir Kafshdar Goharshady, and Arash Pourdamghani. 2019. Probabilistic smart contracts: Secure randomness on the blockchain. In 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). IEEE, 403--412.
[24]
Huashan Chen, Marcus Pendleton, Laurent Njilla, and Shouhuai Xu. 2020. A Survey on Ethereum Systems Security: Vulnerabilities, Attacks, and Defenses. ACM Computing Surveys (CSUR) 53, 3 (2020), 1--43.
[25]
Jeremy Clark, Joseph Bonneau, Edward W Felten, Joshua A Kroll, Andrew Miller, and Arvind Narayanan. 2014. On decentralizing prediction markets and order books. In Workshop on the Economics of Information Security, State College, Pennsylvania.
[26]
Jeremy Clark, Didem Demirag, and Seyedehmahsa Moosavi. 2020. SoK: Demystifying Stablecoins. CACM (2020).
[27]
Jeremy Clark and Paul C Van Oorschot. 2013. SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements. In 2013 IEEE Symposium on Security and Privacy. IEEE, 511--525.
[28]
Coinmonk. 2019. Vulnerabilities in Maker: Oracle-Governance Attacks, Attack DAOs, and (De)Centralization. URl: https://medium.com/coinmonks/vulnerabilities-in-maker-oracle-governance-attacks-attack-daos-and-de-centralization-d943685adc2f (2019).
[29]
Compound. 2020. Open Price Feed. URl: https://compound.finance/docs/prices (2020).
[30]
Consensys. 2020. Ethereum Smart Contract Best Practices.
[31]
Tellor Core. 2019. Staking, Disputes, and Voting. URl: https://medium.com/tellor/staking-disputes-and-voting-ad09c66eb7bc/ (2019).
[32]
Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. IACR Cryptol. ePrint Arch. 2016, 86 (2016), 1--118.
[33]
The Block Crypto. 2020. Chainlink nodes were targeted in an attack last weekend that cost them at least 700 ETH. URl: https://www.theblockcrypto.com/post/76986/chainlink-nodes-attack-eth (2020).
[34]
The Block Crypto. 2021. DeFi attacks: the general picture. URl: https://www.theblockcrypto.com/research/105472/defi-attacks-the-general-picture (2021).
[35]
Philip Daian, Steven Goldfeder, Tyler Kell, Yunqi Li, Xueyuan Zhao, Iddo Bentov, Lorenz Breidenbach, and Ari Juels. 2020. Flash boys 2.0: Frontrunning in decentralized exchanges, miner extractable value, and consensus instability. In 2020 IEEE Symposium on Security and Privacy (SP). IEEE, 910--927.
[36]
Philip Daian, Tyler Kell, Ian Miers, and Ari Juels. 2018. On-Chain Vote Buying and the Rise of Dark DAOs. URl: https://hackingdistributed.com/2018/07/02/on-chain-vote-buying/ (2018).
[37]
Decrypt. 2020. Oracle Exploit Sees $89 Million Liquidated on Compound. URl: https://decrypt.co/49657/oracle-exploit-sees-100-million-liquidated-on-compound (2020).
[38]
DIA. 2020. DIA --- Transparent Oracles for a Decentralised Financial Ecosystem.
[39]
DODO. 2020. The DODO Advantage. URl: https://dodoex.github.io/docs/docs/advantages (2020).
[40]
John R Douceur. 2002. The sybil attack. In International workshop on peer-to-peer systems. Springer, 251--260.
[41]
Steve Ellis, Ari Juels, and Sergey Nazarov. 2017. Chainlink: A decentralized oracle network. Retrieved March 11 (2017), 2018.
[42]
Shayan Eskandari. 2020. EtherRoll Bug Thread. URl: https://twitter.com/sbetamc/status/1263220679937265671 (2020).
[43]
S Eskandari, D Barrera, E Stobert, and J Clark. 2015. A first look at the usability of Bitcoin key management. In USEC.
[44]
Shayan Eskandari, Jeremy Clark, Vignesh Sundaresan, and Moe Adham. 2017. On the feasibility of decentralized derivatives markets. In International Conference on Financial Cryptography and Data Security. Springer, 553--567.
[45]
Shayan Eskandari, Seyedehmahsa Moosavi, and Jeremy Clark. 2019. Sok: Transparent dishonesty: front-running attacks on blockchain. In International Conference on Financial Cryptography and Data Security. Springer, 170--189.
[46]
Ethereum. 2015. Official Go implementation of the Ethereum protocol.
[47]
Etheroll. 2020. Ethereum casino. URl: https://etheroll.com/ (2020).
[48]
Aykut Firat, Stuart Madnick, and Benjamin Grosof. 2002. Knowledge integration to overcome ontological heterogeneity: Challenges from financial information systems. (2002).
[49]
Flashbots. 2021. Flashbots. URl: https://github.com/flashbots/pm (2021).
[50]
Bryan Ford and Rainer Böhme. 2019. Rationality is Self-Defeating in Permissionless Systems. arXiv:1910.08820 [cs.CR]
[51]
MakerDAO Forum. 2020. Scientific Governance and Risk #120. URl: https://forum.makerdao.com/t/agenda-discussion-scientific-governance-and-risk-120-thursday-december-3-16-00-utc/5357 (2020).
[52]
Sharon Goldberg, Dimitrios Papadopoulos, and Jan Včelák. 2017. Verifiable Random Functions (VRFs). Internet-Draft draft-goldbe-vrf-01. Internet Engineering Task Force. https://datatracker.ietf.org/doc/html/draft-goldbe-vrf-01 Work in Progress.
[53]
Vincent Gramoli. 2020. From blockchain consensus back to Byzantine consensus. Future Generation Computer Systems 107 (2020), 760--769.
[54]
Wanyun Catherine Gu, Anika Raghuvanshi, and Dan Boneh. 2020. Empirical Measurements on Pricing Oracles and Decentralized Governance for Stablecoins. Available at SSRN 3611231 (2020).
[55]
Farshad Hakimpour and Andreas Geppert. 2001. Resolving semantic heterogeneity in schema integration. In Proceedings of the international conference on Formal Ontology in Information Systems-Volume 2001. 297--308.
[56]
Robin Hanson. 2003. Combinatorial information market design. Information Systems Frontiers 5, 1 (2003), 107--119.
[57]
Ethan Heilman, Alison Kendler, Aviv Zohar, and Sharon Goldberg. 2015. Eclipse attacks on bitcoin's peer-to-peer network. In 24th {USENIX} Security Symposium ({USENIX} Security 15). 129--144.
[58]
Sebastian Henningsen, Daniel Teunis, Martin Florian, and Björn Scheuermann. 2019. Eclipsing ethereum peers with false friends. In 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, 300--309.
[59]
C. Herley and P. C. Van Oorschot. 2017. SoK: Science, Security and the Elusive Goal of Security as a Scientific Pursuit. In 2017 IEEE Symposium on Security and Privacy (SP). 99--120.
[60]
Eyal Hertzog, Guy Benartzi, and Galiar Benartzi. 2017. Bancor protocol: continuous liquidity for cryptographic tokens through their smart contracts. White paper (2017).
[61]
Huobi DeFiLabs Insight. 2020. Price Oracle - A Must Have Infrastructure. URl: https://www.huobidefilabs.io/en/Insight/1313163603254243330/ (2020).
[62]
Harry Kalodner, Steven Goldfeder, Xiaoqi Chen, S. Matthew Weinberg, and Edward W. Felten. 2018. Arbitrum: Scalable, private smart contracts. In USENIX Security.
[63]
Dmitry Khovratovich and Jason Law. 2017. Sovrin: digital identities in the blockchain era. Technical Report. Sovrin.
[64]
Joshua A Kroll, Ian C Davey, and Edward W Felten. 2013. The economics of Bitcoin mining, or Bitcoin in the presence of adversaries. In Proceedings of WEIS, Vol. 2013. 11.
[65]
Hart Lambur, Allison Lu, and Regina Cai. 2019. Uma data verification mechanism: Adding economic guarantees to blockchain oracles. Risk Labs, Inc., Tech. Rep., Jul (2019).
[66]
Langner. 2020. The Stuxnet Story. URl: https://www.langner.com/2020/07/the-stuxnet-story/ (2020).
[67]
Ralph Langner. 2011. Stuxnet: Dissecting a cyberwarfare weapon. IEEE Security & Privacy 9, 3 (2011), 49--51.
[68]
Clement Lesaege, Federico Ast, and William George. 2019. Kleros The Justice Protocol. URl: https://kleros.io/static/whitepaper_en-8bd3a0480b45c39899787e17049ded26.pdf (2019).
[69]
Iuon-Chang Lin and Tzu-Chun Liao. 2017. A survey of blockchain security issues and challenges. IJ Network Security 19, 5 (2017), 653--659.
[70]
Bowen Liu and Pawel Szalachowski. 2020. A First Look into DeFi Oracles. arXiv preprint arXiv:2005.04377 (2020).
[71]
Sin Kuang Lo, Xiwei Xu, Mark Staples, and Lina Yao. 2020. Reliability analysis for blockchain oracles. Computers & Electrical Engineering 83 (2020), 106582.
[72]
LongForWisdom. 2020. Flash Loans and securing the Maker Protocol. URl: https://forum.makerdao.com/t/urgent-flash-loans-and-securing-the-maker-protocol/4901 (2020).
[73]
Stuart Madnick and Hongwei Zhu. 2006. Improving data quality through effective use of data semantics. Data & Knowledge Engineering 59, 2 (2006), 460--475.
[74]
MakerDAO. 2019. Introducing Oracles V2 and DeFi Feeds.
[75]
Deepak Maram, Harjasleen Malvai, Fan Zhang, Nerla Jean-Louis, Alexander Frolov, Tyler Kell, Tyrone Lobban, Christine Moy, Ari Juels, and Andrew Miller. 2021. Candid: can-do decentralized identity with legacy compatibility, sybil-resistance, and accountability. In 2021 IEEE Symposium on Security and Privacy (SP). IEEE, 1348--1366.
[76]
Silvio Micali, Michael Rabin, and Salil Vadhan. 1999. Verifiable random functions. In 40th annual symposium on foundations of computer science (cat. No. 99CB37039). IEEE, 120--130.
[77]
Amani Moin, Kevin Sekniqi, and Emin Gun Sirer. 2020. SoK: A Classification Framework for Stablecoin Designs. In Financial Cryptography.
[78]
Saikat Mondal, Kanishka P Wijewardena, Saranraj Karuppuswami, Nitya Kriti, Deepak Kumar, and Premjeet Chahal. 2019. Blockchain inspired RFID-based information architecture for food supply chain. IEEE Internet of Things Journal 6, 3 (2019), 5803--5813.
[79]
Andreas Müller and Marcel Grandi. 2000. Weather derivatives: a risk management tool for weather-sensitive industries. The Geneva Papers on Risk and Insurance. Issues and Practice 25, 2 (2000), 273--287.
[80]
Nexus Mutual. 2020. Responsible Vulnerability Disclosure. URl: https://medium.com/nexus-mutual/responsible-vulnerability-disclosure-ece3fe3bcefa (2020).
[81]
NEST. 2020. NEST Protocol: A Distributed Price Oracle Network. URl: https://nestprotocol.org/doc/ennestwhitepaper.pdf (2020).
[82]
Till Neudecker, Philipp Andelfinger, and Hannes Hartenstein. 2015. A simulation model for analysis of attacks on the bitcoin peer-to-peer network. In 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM). IEEE, 1327--1332.
[83]
Till Neudecker and Hannes Hartenstein. 2019. Short paper: An empirical analysis of blockchain forks in bitcoin. In International Conference on Financial Cryptography and Data Security. Springer, 84--92.
[84]
ChainLink Oracle. 2021. Explicit Staking in Chainlink 2.0: An Overview. URl: https://blog.chain.link/explicit-staking-in-chainlink-2-0/ (2021).
[85]
PeckShield. 2020. bZx Hack II Full Disclosure (With Detailed Profit Analysis).
[86]
Ingolf G A Pernice, Sebastian Henningsen, Roman Proskalovich, Martin Florian, and Hermann Elendner. 2019. Monetary Stabilization in Cryptocurrencies: Design Approaches and Open Questions. In CVCBT.
[87]
Jack Peterson and Joseph Krug. 2015. Augur: a decentralized, open-source platform for prediction markets. arXiv preprint arXiv: 1501.01042 (2015).
[88]
PoolTogether. 2020. PoolTogether is a no-loss, audited savings game powered by blockchain technology. URl: https://www.pooltogether.com/ (2020).
[89]
Band Protocol. 2020. BandChain Whitepaper. URl: https://docs.bandchain.org/whitepaper/system-overview.html (2020).
[90]
Kaihua Qin, Liyi Zhou, Benjamin Livshits, and Arthur Gervais. 2020. Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit. arXiv preprint arXiv:2003.03810 (2020).
[91]
Haseeb Qureshi. 2020. Introducing CoFiX: a Next-Generation AMM. URl: https://medium.com/dragonfly-research/introducing-cofix-a-next-generation-amm-199aea686b6b (2020).
[92]
Scott Ruoti, Ben Kaiser, Arkady Yerukhimovich, Jeremy Clark, and Robert Cunningham. 2020. Blockchain Technology: What is It Good For? Commun. ACM 63, 1 (2020), 46--53.
[93]
Mehdi Salehi, Jeremy Clark, and Mohammad Mannan. 2021. Red-Black Coins: Dai without liquidations. In Financial Cryptography: DeFi.
[94]
Suzan Sallam and Babak D Beheshti. 2018. A survey on lightweight cryptographic algorithms. In TENCON 2018-2018 IEEE Region 10 Conference. IEEE, 1784--1789.
[95]
Andrey Shevchenko. 2020. Uniswap and automated market makers, explained. URl: https://cointelegraph.com/explained/uniswap-and-automated-market-makers-explained (2020).
[96]
Krushang Sonar and Hardik Upadhyay. 2014. A survey: DDOS attack on Internet of Things. International Journal of Engineering Research and Development 10, 11 (2014), 58--63.
[97]
Synthetix. 2019. Synthetix Response to Oracle Incident. URl: https://blog.synthetix.io/response-to-oracle-incident/ (2019).
[98]
Synthetix. 2020. A derivatives liquidity protocol. URl: https://www.synthetix.io/ (2020).
[99]
Paul Sztorc. 2015. Truthcoin. peer-to-peer oracle system and prediction marketplace. (2015).
[100]
Tellor. [n.d.]. A decentralized Oracle. https://tellor.io/storage/TellorWhitepaper.pdf
[101]
Tellor-io. 2020. EIP-2362: Pull Oracle Interface. URl: https://github.com/tellor-io/EIP-2362 (2020).
[102]
Feng Tian. 2016. An agri-food supply chain traceability system for China based on RFID & blockchain technology. In 2016 13th international conference on service systems and service management (ICSSSM). IEEE, 1--6.
[103]
TLSnotary. 2014. A mechanism for independently audited https sessions. URl: https://tlsnotary.org/TLSNotary.pdf (2014).
[104]
UMA. 2020. UMA Data Verification Mechanism: Adding Economic Guarantees to Blockchain Oracles. URl: https://github.com/UMAprotocol/whitepaper/blob/master/UMA-DVM-oracle-whitepaper.pdf (2020).
[105]
Uniswap. 2020. Uniswap Oracle. URl: https://uniswap.org/docs/v2/core-concepts/oracles (2020).
[106]
Marie Vasek, Micah Thornton, and Tyler Moore. 2014. Empirical analysis of denial-of-service attacks in the Bitcoin ecosystem. In International conference on financial cryptography and data security. Springer, 57--71.
[107]
Yongge Wang. 2020. Automated Market Makers for Decentralized Finance (DeFi). arXiv preprint arXiv:2009.01676 (2020).
[108]
whiterabbit. 2020. Black Thursday for MakerDAO: $8.32 million was liquidated for 0 DAI.
[109]
Austin K Williams and Jack Peterson. 2019. Decentralized Common Knowledge Oracles. arXiv preprint arXiv:1912.01215 (2019).
[110]
Anthony D Wood and John A Stankovic. 2002. Denial of service in sensor networks. computer 35, 10 (2002), 54--62.
[111]
Gavin Wood et al. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151, 2014 (2014), 1--32.
[112]
Michael F. Worboys and S. Misbah Deen. 1991. Semantic heterogeneity in distributed geographic databases. ACM Sigmod Record 20, 4 (1991), 30--34.
[113]
Zaugust. 2020. CoFiX: A Computable Trading System. URl: https://cofix.io/doc/Trading_Compensation_CoFiX.pdf (2020).
[114]
Pamela J Zelbst, Kenneth W Green, Victor E Sower, and Philip L Bond. 2019. The impact of RFID, IIoT, and Blockchain technologies on supply chain transparency. Journal of Manufacturing Technology Management (2019).
[115]
Fan Zhang, Ethan Cecchetti, Kyle Croman, Ari Juels, and Elaine Shi. 2016. Town crier: An authenticated data feed for smart contracts. In Proceedings of the 2016 aCM sIGSAC conference on computer and communications security. ACM, 270--282.
[116]
Fan Zhang, Sai Krishna Deepak Maram, Harjasleen Malvai, Steven Goldfeder, and Ari Juels. 2019. DECO: Liberating Web Data Using Decentralized Oracles for TLS. arXiv preprint arXiv:1909.00938 (2019).
[117]
Shijie Zhang and Jong-Hyouk Lee. 2019. Double-spending with a Sybil attack in the Bitcoin decentralized network. IEEE Transactions on Industrial Informatics 15, 10 (2019), 5715--5722.

Cited By

View all

Index Terms

  1. SoK: oracles from the ground truth to market manipulation
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image ACM Conferences
          AFT '21: Proceedings of the 3rd ACM Conference on Advances in Financial Technologies
          September 2021
          225 pages
          ISBN:9781450390828
          DOI:10.1145/3479722
          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Sponsors

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          Published: 23 November 2021

          Permissions

          Request permissions for this article.

          Check for updates

          Qualifiers

          • Research-article

          Funding Sources

          • NSERC
          • AMF ð Finance Montréal

          Conference

          AFT '21
          Sponsor:

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)110
          • Downloads (Last 6 weeks)9
          Reflects downloads up to 18 Jan 2025

          Other Metrics

          Citations

          Cited By

          View all

          View Options

          Login options

          View options

          PDF

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media