A Methodology for Replicating Historical Exploits on EVM-Compatible Blockchains | IEEE Conference Publication | IEEE Xplore