| Event | Time | Paper | 
  
    | ACM CCS | 2021 | 
         
          Multi-Threshold Byzantine Fault Tolerance.Revisiting Nakamoto Consensus in Asynchronous Networks: A Comprehensive Analysis of Bitcoin Safety and Chain Quality.BFT Protocol Forensics. Securing Parallel-chain Protocols under Variable Mining Power. A Security Framework for Distributed Ledgers.How Does Blockchain Security Dictate Blockchain Implementation?.DETER: Denial of Ethereum Txpool sERvices.SyncAttack: Double-spending in Bitcoin Without Mining Power. The Exact Security of BIP32 Wallets.  | 
  
    | IEEE S&P | 2021 | 
         
          Merkle^2: A Low-Latency Transparency Log System.High-Frequency Trading on Decentralized On-Chain Exchanges.Ebb-and-Flow Protocols: A Resolution of the Availability-Finality Dilemma.Red Belly: A Secure, Fair and Scalable Open Blockchain.SmartPulse: Automated Checking of Temporal Properties in Smart Contracts.Bitcoin-Compatible Virtual Channels.On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols.Lockable Signatures for Blockchains: Scriptless Scripts for all Signatures.SGUARD: Smart Contracts Made Vulnerability-Free.MAD-HTLC: Because HTLC is Crazy-Cheap to Attack.Compact Certificates of Collective Knowledge.CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability Many-out-of-Many Proofs and Applications to Anonymous Zether.On the Anonymity Guarantees of Anonymous Proof-of-Stake Protocols.A2L: Anonymous Atomic Locks for Scalability in Payment Channel Hubs.Poster: Scalable Log Auditing on Private Blockchains via Lightweight Log-Fork Prevention.  | 
  
    | USENIX Security | 2021 | 
         
        On the Routing-Aware Peering against Network-Eclipse Attacks in Bitcoin.EOSAFE: Security Analysis of EOSIO Smart Contracts.EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts.Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications.Smart Contract Vulnerabilities: Vulnerable Does Not Imply Exploited.Frontrunner Jones and the Raiders of the Dark Forest: An Empirical Study of Frontrunning on the Ethereum Blockchain.SmarTest: Effectively Hunting Vulnerable Transaction Sequences in Smart Contracts through Language Model-Guided Symbolic Execution.Blitz: Secure Multi-Hop Payments Without Two-Phase Commits.On the Usability of Authenticity Checks for Hardware Security Tokens. | 
  
    | USENIX ATC | 2021
 2020
 | 
         
          RainBlock: Faster Transaction Processing in Public Blockchains.[2021]An Off-The-Chain Execution Environment for Scalable Testing and Profiling of Smart Contracts.[2021]A Decentralized Blockchain with High Throughput and Fast Confirmation.[2020] | 
  
    | SOSP | 2021
 2019
 | 
         
          Basil: Breaking up BFT with ACID (transactions).[2021]Bidl: A High-throughput, Low-latency Permissioned Blockchain Framework for Datacenter Networks.[2021]Kauri: Scalable BFT Consensus with Pipelined Tree-Based Dissemination and Aggregation.[2021]Rabia: Simplifying State-Machine Replication Through Randomization.[2021]Log-structured Protocols in Delos.[2021]Shard Manager: A Generic Shard Management Framework for Geo-distributed Applications.[2021]Forerunner: Constraint-based Speculative Transaction Execution for Ethereum.[2021]Boki: Stateful Serverless Computing with Shared Logs.[2021]Teechain: a secure payment network with asynchronous blockchain access.[2019] | 
  
    | VLDB | 2021 
 2020
 
 2019
 | 
         
          SChain: A Scalable Consortium Blockchain Exploiting Intra- and Inter-Block Concurrency.[2021]SlimChain: Scaling Blockchain Transactions through Off-Chain Storage and Parallel Processing.[2021]ByShard: Sharding in a Byzantine Environment.[2021]Scaling Replicated State Machines with Compartmentalization.[2021]Epoch-based Commit and Replication in Distributed OLTP Databases.[2021]Refiner: A Reliable Incentive-Driven Federated Learning System Powered by Blockchain.[2021]ResilientDB: Global Scale Resilient Blockchain Fabric.[2020]Atomic Commitment Across Blockchains.[2020]FireLedger: A High Throughput Blockchain Consensus Protocol.[2020]Scalable, Resilient and Configurable Permissioned Blockchain Fabric.[2020]Fine-Grained, Secure and Efficient Data Provenance for Blockchain.[2019]CAPER: A Cross-Application Permissioned Blockchain.[2019]Blockchain Meets Database: Design and Implementation of a Blockchain Relational Database.[2019]BlockchainDB - A Shared Database on Blockchains.[2019] | 
  
    | SIGMOD | 2021 
 2020
 
 2019
 | 
         
          SharPer: Sharding Permissioned Blockchains Over Network Clusters.[2021]Why Do My Blockchain Transactions Fail?: A Study of Hyperledger Fabric.[2021]PigPaxos: Devouring the Communication Bottlenecks in Distributed Consensus.[2021]SBlockchains vs. Distributed Databases: Dichotomy and Fusion.[2021]DIV: Resolving the Dynamic Issues of Zero-knowledge Set Membership Proof in the Blockchain.[2021]Do the Rich Get Richer? Fairness Analysis for Blockchain Incentives.[2021]A Byzantine Fault Tolerant Storage for Permissioned Blockchain.[2021]P^2B-Trace: Privacy-Preserving Blockchain-based Contact Tracing to Combat Pandemics.[2021]Crypt?: Crypto-Assisted Differential Privacy on Untrusted Servers.[2020]FalconDB: Blockchain-based Collaborative Database.[2020]A Transactional Perspective on Execute-order-validate Blockchains.[2020]Confidentiality Support over Financial Grade Consortium Blockchain.[2020]Towards Scaling Blockchain Systems via Sharding.[2019]vChain: Enabling Verifiable Boolean Range Queries over Blockchain Databases.[2019]Blurring the Lines between Blockchains and Database Systems: the Case of Hyperledger Fabric.[2019]State of Public and Private Blockchains: Myths and Reality.[2019] | 
  
    | NDSS | 2021 | 
         
          As Strong As Its Weakest Link: How to Break Blockchain DApps at RPC Service.RandRunner: Distributed Randomness from Trapdoor VDFs with Strong Uniqueness.LaKSA: A Probabilistic Proof-of-Stake Protocol.SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Reinforcement Learning.Bitcontracts: Supporting Smart Contracts in Legacy Blockchains. | 
  
    | USENIX NSDI | 2021 
 2020
 
 2019
 | 
         
          EPaxos Revisited.[2021]Fault-Tolerant Replication with Pull-Based Consensus in MongoDB.[2021]Fine-Grained Replicated State Machines for a Cluster Storage System.[2020]Scalog: Seamless Reconfiguration and Total Order in a Scalable Shared Log.[2020]Monoxide: Scale out Blockchains with Asynchronous Consensus Zones.[2019] | 
  
    | ESORICS | 2021 | 
         
          Revocable Policy-Based Chameleon Hash.Fair Peer-to-Peer Content Delivery via Blockchain.Conclave: A Collective Stake Pool Protocol.Probabilistic Micropayments with Transferability.MiniLedger: Compact-Sized Anonymous and Auditable Distributed Payments.Succinct Scriptable NIZK via Trusted Hardware. | 
  
    | EuroSys | 2021 
 2020
 
 2018
 | 
         
        Ethanos: Efficient Bootstrapping for Full Nodes on Account-based Blockchain.[2021]Zeus: Locality-aware Distributed Transactions.[2021]State-machine replication for planet-scale systems.[2020]HovercRaft: achieving scalability and fault-tolerance for microsecond-scale datacenter services.[2020]Hyperledger Fabric: a Distributed Operating System for Permissioned blockchains.[2018] | 
  
  
    | PODC | 2021 | 
         
        Hedging Against Sore Loser Attacks in Cross-Chain Transactions.All You Need is DAG.Embedding a Deterministic BFT Protocol in a Block DAG.Brief Announcement: Be Prepared When Network Goes Bad: An Asynchronous View-Change Protocol.Brief Announcement: Classifying Trusted Hardware via Unidirectional Communication.Brief Announcement: Malicious Security Comes for Free in Consensus with Leaders.Brief Announcement: Brokering with Hashed Timelock Contracts is NP-Hard.Breaking the O(√ n)-Bit Barrier: Byzantine Agreement with Polylog Bits Per Party.Good-case Latency of Byzantine Broadcast: a Complete Categorization.Revisiting Optimal Resilience of Fast Byzantine Consensus.A New Way to Achieve Round-Efficient Byzantine Agreement.Reaching Consensus for Asynchronous Distributed Key Generation.Brief Announcement: Making Synchronous BFT Protocols Secure in the Presence of Mobile Sluggish Faults.Approximate Byzantine Fault-Tolerance in Distributed Optimization. | 
  
  
    | DSN | 2021 
 2020
 | 
         
        Data-Driven Model-Based Analysis of the Ethereum Verifier's Dilemma.[2021]SMACS: Smart Contract Access Control Service.[2021]Smart Contracts on the Move.[2021]Impact of Geo-Distribution and Mining Pools on Blockchains: A Study of Ethereum.[2021]From Byzantine Replication to Blockchain: Consensus is Only the Beginning.[2021]EPIC: Efficient Asynchronous BFT with Adaptive Security.[2021]On Incentive Compatible Role-Based Reward Distribution in Algorand.[2021]FabZK: Supporting Privacy-Preserving, Auditable Smart Contracts in Hyperledger Fabric.[2021]FSTR: Funds Skewness Aware Transaction Routing for Payment Channel Networks.[2020]SBFT: A Scalable and Decentralized Trust Infrastructure.[2020] | 
  
  
    | ICDCS | 2021 | 
         
        Strengthened Fault Tolerance in Byzantine Fault Tolerant Replication.Behind Block Explorers: Public Blockchain Measurement and Security Implication.EPA-Route: Routing Payment Channel Network with High Success Rate and Low Payment Fees.Root Cause Analyses for the Deteriorating Bitcoin Network Synchronization.FastBlock: Accelerating Blockchains via Hardware Transactional Memory.LDSP: Shopping with Cryptocurrency Privately and Quickly under Leadership.Leaderless Consensus.A Game-Theoretic Analysis of Cross-Chain Atomic Swaps with HTLCs.Dissecting the Performance of Chained-BFT.Blockumulus: A Scalable Framework for Smart Contracts on the Cloud.Occam: A Secure and Adaptive Scaling Protocol for Permissionless Blockchain.MVCom: Scheduling Most Valuable Committees for the Large-Scale Sharded Blockchain.On the Synchronization Power of Token Smart Contracts.Game of Coins. | 
  
  
    | FC | 2021 | 
         
          Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit.The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts.Timelocked Bribing.Shielded Computations in Smart Contracts Overcoming Forks.A Formal Model of Algorand Smart Contracts.Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask).Perimeter: A Network-Layer Attack on the Anonymity of Cryptocurrencies.An Empirical Analysis of Privacy in the Lightning Network.Cross-Layer Deanonymization Methods in the Lightning Protocol.The Complex Shape of Anonymity in Cryptocurrencies: Case Studies from a Systematic Approach.SoK: Communication Across Distributed Ledgers.Reparo: Publicly Verifiable Layer to Repair Blockchains.Short Paper: Debt Representation in UTXO Blockchains.Instant Block Confirmation in the Sleepy Model.Blockchain CAP Theorem Allows User-Dependent Adaptivity and Finality.PoSAT: Proof-of-Work Availability and Unpredictability, Without the Work.Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments.FPPW: A Fair and Privacy Preserving Watchtower for Bitcoin.Congestion Attacks in Payment Channel Networks.Payment Trees: Low Collateral Payments for Payment Channel Networks.Brick: Asynchronous Incentive-Compatible Payment Channels.Ignore the Extra Zeroes: Variance-Optimal Mining Pools.HaPPY-Mine: Designing a Mining Reward Function.Selfish Mining Attacks Exacerbated by Elastic Hash Supply.Fraud and Data Availability Proofs: Detecting Invalid Blocks in Light Clients.ACeD: Scalable Data Availability Oracle.Efficient State Management in Distributed Ledgers.Fast Isomorphic State Channels.Under the Hood of the Ethereum Gossip Protocol.Liquidations: DeFi on a Knife-Edge.Practical Witness-Key-Agreement for Blockchain-Based Dark Pools Financial Trading.Practical Post-quantum Few-Time Verifiable Random Function with Applications to Algorand. | 
  
  
    | ACM AFT | 2021 | 
         
        Coalition-Safe Equilibria with Virtual Payoffs.Achieving State Machine Replication without Honest Players.A verifiably secure and proportional committee election rule.Dynamic Posted-Price Mechanisms for the Blockchain Transaction-Fee Market.Dynamical Analysis of the EIP-1559 Ethereum Fee Market.Composing Networks of Automated Market Makers.Shard Scheduler: object placement and migration in sharded, account-based blockchains.Spear: Fast Multi-Path Payment with Redundancy.The Velvet Path to Superlight Blockchain Clients.PHANTOM GHOSTDAG: A Scalable Generalization of Nakamoto Consensus.Generalizing Weighted Trees: A bridge from Bitcoin to GHOST.Close Latency-Security Trade-off for the Nakamoto Consensus.On Bitcoin Cash’s Target Recalculation Functions.SoK: Oracles from the Ground Truth to Market Manipulation.Private Attacks in Longest Chain Proof-of-stake Protocols with Single Secret Leader Elections.AMR: Autonomous Coin Mixer with Privacy Preserving Reward Distribution. | 
  
  
    |  |  |  | 
  
    | ACM CCS | 2020 | 
         
          ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts.BDoS: Blockchain Denial-of-Service.eThor: Practical and Provably Sound Static Analysis of Ethereum Smart Contracts. WI is Almost Enough: Contingent Payment All Over Again. Dumbo: Faster Asynchronous BFT Protocols.Tight Consistency Bounds for Bitcoin.On the Optimality of Optimistic Responsiveness.Everything is a Race and Nakamoto Always Wins. Deterministic Wallets in a Quantum World.  | 
  
    | IEEE S&P | 2020 | 
         
          HydRand: Efficient Continuous Distributed Randomness.OHIE: Blockchain Scaling Made Simple.Sync HotStuff: Simple and Practical Synchronous State Machine Replication.Replicated State Machines Without Replicated Execution.A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network.
          Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability.FlyClient: Super-Light Clients for Cryptocurrencies.ZEXE: Enabling Decentralized Private Computation.VERISMART: A Highly Precise Safety Verifier for Ethereum Smart Contracts.VerX: Safety Verification of Smart Contracts.Poster: The Marriage of Fully Homomorphic Encryption and Blockchain.Poster: Transparent Certificate Revocation for CBE Based on Blockchain.Poster: Defining Actionable Rules for Verifying IoT Security. | 
  
    | USENIX Security | 2020 | 
         
          BlockSci: Design and applications of a blockchain analysis platform.Remote Side-Channel Attacks on Anonymous Transactions.ETHBMC: A Bounded Model Checker for Smart Contracts.TXSPECTOR: Uncovering Attacks in Ethereum from Transactions.An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem.Pixel: Multi-signatures for Consensus.Scaling Verifiable Computation Using Efficient Set Accumulators.The Ballot is Busted Before the Blockchain: A Security Analysis of Voatz, the First Internet Voting Application Used in U.S. Federal Elections.An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem. | 
  
    | NDSS | 2020 | 
         
          Bobtail: Improved Blockchain Security with Low-Variance Mining.Snappy: Fast On-chain Payments with Practical Collaterals.The Attack of the Clones Against Proof-of-Authority.Broken Metre: Attacking Resource Metering in EVM.SODA: A Generic Online Detection Framework for Smart Contracts. | 
  
    | OSDI | 2020 
 2018
 | 
         
          Blockene: A High-throughput Blockchain Over Mobile Devices.[2020]Virtual Consensus in Delos.[2020]Byzantine Ordered Consensus without Byzantine Oligarchy.[2020]Tolerating Slowdowns in Replicated State Machines using Copilots.[2020]Write Dependency Disentanglement with HORAE .[2020]The FuzzyLog: A Partially Ordered Shared Log.[2018] | 
  
    | ESORICS | 2020 | 
         
          How to Model the Bribery Attack: A Practical Quantification Method in Blockchain.Updatable Blockchains.PrivacyGuard: Enforcing Private Data Usage Control with Blockchain and Attested Off-Chain Contract Execution.2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake Securely.Generic Superlight Client for Permissionless Blockchains.LNBot: A Covert Hybrid Botnet on Bitcoin Lightning Network for Fun and Profit. | 
  
    | PODC | 2020 | 
         
        Dumbo-MVBA: Optimal Multi-Valued Validated Asynchronous Byzantine Agreement, Revisited.Revisiting Asynchronous Fault Tolerant Computation with Optimal Resilience.Asynchronous Byzantine Approximate Consensus in Directed Networks.Asynchronous Byzantine Approximate Consensus in Directed Networks.On the Subject of Non-Equivocation: Defining Non-Equivocation in Synchronous Agreement Systems.Brief Announcement: Almost-surely Terminating Asynchronous Byzantine Agreement Protocols with a Constant Expected Running Time.Brief Announcement: On the Significance of Consecutive Ballots in Paxos.Brief Announcement: Not a COINcidence: Sub-Quadratic Asynchronous Byzantine Agreement WHP.Brief Announcement: Byzantine Agreement with Unknown Participants and Failures. | 
  
  
    | ICDCS | 2020 | 
         
        An Analysis of Blockchain Consistency in Asynchronous Networks: Deriving a Neat Bound.Fair and Efficient Gossip in Hyperledger Fabric.Towards Privacy-assured and Lightweight On-chain Auditing of Decentralized Storage.Game Theoretical Analysis of Cross-Chain Swaps.A Certificateless Consortium Blockchain for IoTs.TinyEVM: Off-Chain Smart Contracts on Low-Power IoT Devices.Permissioned Blockchain Through the Looking Glass: Architectural and Implementation Lessons Learned.Toward Trustworthy Blockchain-as-a-Service with Auditing.Consistency of Proof-of-Stake Blockchains with Concurrent Honest Slot Leaders.LVQ: A Lightweight Verifiable Query Approach for Transaction History in Bitcoin.A Study on Nine Years of Bitcoin Transactions: Understanding Real-world Behaviors of Bitcoin Miners and Users.On Exploiting Transaction Concurrency To Speed Up Blockchains. | 
  
  
    | FC | 2020 | 
         
          Leveraging Bitcoin Testnet for Bidirectional Botnet Command and Control Systems.Security Analysis on dBFT Protocol of NEO.Selfish Mining Re-Examined.Fairness and Efficiency in DAG-Based Cryptocurrencies.Stake Shift in Major Cryptocurrencies: An Empirical Study.Coded Merkle Tree: Solving Data Availability Attacks in Blockchains.Decentralized Privacy-Preserving Netting Protocol on Blockchain for Payment Systems.The Arwen Trading Protocols.SoK: A Classification Framework for Stablecoin Designs.SoK: Layer-Two Blockchain Protocols.MicroCash: Practical Concurrent Processing of Micropayments.LockDown: Balance Availability Attack Against Lightning Network Channels.Ride the Lightning: The Game Theory of Payment Channels.How to Profit from Payments Channels.Boomerang: Redundancy Improves Latency and Throughput in Payment-Channel Networks.DLSAG: Non-interactive Refund Transactions for Interoperable Payment Channels in Monero.Cerberus Channels: Incentivizing Watchtowers for Bitcoin.Zether: Towards Privacy in a Smart Contract World.RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security.Non-interactive Proofs of Proof-of-Work.Proof-of-Burn.Non-interactive Cryptographic Timestamping Based on Verifiable Delay Functions.Open Market or Ghost Town? The Curious Case of OpenBazaar.Exploring the Monero Peer-to-Peer Network.Surviving the Cryptojungle: Perception and Management of Risk Among North American Cryptocurrency (Non)Users.Address Clustering Heuristics for Ethereum.What are the Actual Flaws in Important Smart Contracts (And How Can We Find Them)?.Characterizing Code Clones in the Ethereum Smart Contract Ecosystem.Smart Contracts for Government Processes: Case Study and Prototype Implementation (Short Paper). | 
  
  
    | ACM AFT | 2020 | 
         
        Streamlet: Textbook Streamlined Blockchains.Single Secret Leader Election.Wendy, the Good Little Fairness Widget: Achieving Order Fairness for Blockchains.How to Pick Your Friends A Game Theoretic Approach to P2P Overlay Construction.Defending Against Malicious Reorgs in Tezos Proof-of-Stake.Stablecoins 2.0: Economic Foundations and Risk-based Models.Improved Price Oracles: Constant Function Market Makers.DeFi Protocols for Loanable Funds: Interest Rates, Liquidity and Market Efficiency.Efficient MDP Analysis for Selfish-Mining in Blockchains.A Gas-Efficient Superlight Bitcoin Client in Solidity.SmartOTPs: An Air-Gapped 2-Factor Authentication for Smart-Contract Wallets.FastPay: High-Performance Byzantine Fault Tolerant Settlement.Asynchronous Byzantine Agreement in Incomplete Networks.Winkle: Foiling Long-Range Attacks in Proof-of-Stake Systems.Flood & Loot: A Systemic Attack on The Lightning Network.Counting Down Thunder: Timing Attacks on Privacy in Payment Channel Networks.Route Hijacking and DoS in Off-Chain Networks.Encrypted Blockchain Databases.Privacy-preserving auditable token payments in a permissioned blockchain system. | 
  
  
    |  |  |  | 
  
    | ACM CCS | 2019 | 
         
          HyperService: Interoperability and Programmability Across Heterogeneous Blockchains.MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol. Prism: Deconstructing the Blockchain to Approach Physical Limits. Atomic Multi-Channel Updates with Constant Collateral in Bitcoin-Compatible Payment-Channel Networks. Erlay: Efficient Transaction Relay for Bitcoin.Power Adjusting and Bribery Racing: Novel Mining Attacks in the Bitcoin System. Balance: Dynamic Adjustment of Cryptocurrency Deposits. TokenScope: Automatically Detecting Inconsistent Behaviors of Cryptocurrency Tokens in Ethereum. Tesseract: Real-Time Cryptocurrency Exchange Using Trusted Hardware.zkay: Specifying and Enforcing Data Privacy in Smart Contracts. Privacy Aspects and Subliminal Channels in Zcash. POIROT: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting. Effective and Light-Weight Deobfuscation and Semantic-Aware Attack Detection for PowerShell Scripts. MalMax: Multi-Aspect Execution for Automated Dynamic Web Server Malware Analysis.Efficient Publicly Verifiable 2PC over a Blockchain with Applications to Financially-Secure Computations. Omniring: Scaling Up Private Payments Without Trusted Setup — Formal Foundations and a Construction of Ring Confidential Transactions with Log-size Proofs. Learning to Fuzz from Symbolic Execution with Application to Smart Contracts.
          SAMPL: Scalable Auditability of Monitoring Processes using Public Ledgers.Atomic Multi-Channel Updates with Constant Collateral in Payment-Channel Networks. Poster: A Proof-of-Stake (PoS) Blockchain Protocol using Fair and Dynamic Sharding Management. Poster: A Reliable and Accountable Privacy-Preserving Federated Learning Framework using the Blockchain.  | 
  
    | IEEE S&P | 2019 | 
         
          Perun: Virtual Payment Hubs over Cryptocurrencies.Redactable Blockchain in the Permissionless Setting.Proof-of-Stake Sidechains.Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake.Lay Down the Common Metrics: Evaluating Proof-of-Work Consensus Protocols' Security.XCLAIM: Trustless, Interoperable, Cryptocurrency-Backed Assets.Blind Certificate Authorities.Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash? | 
  
    | USENIX Security | 2019 | 
         
        BITE: Bitcoin Lightweight Client Privacy using Trusted ExecutionFastKitten: Practical Smart Contracts on BitcoinStrongChain: Transparent and Collaborative Proof-of-Work ConsensusTracing Transactions Across Cryptocurrency LedgersThe Art of The Scam: Demystifying Honeypots in Ethereum Smart ContractsThe Anatomy of a Cryptocurrency Pump-and-Dump SchemeInadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale | 
  
    | NDSS | 2019 | 
         
          SABRE: Protecting Bitcoin against Routing Attacks.A Treasury System for Cryptocurrencies: Enabling Better Collaborative Intelligence.Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based.YODA: Enabling computationally intensive contracts on blockchains with Byzantine and Selfish nodes.Giving State to the Stateless: Augmenting Trustworthy Computation with Ledgers.Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web.Vault: Fast Bootstrapping for the Algorand Cryptocurrency.Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks.Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability
          Constructing an Adversary Solver for Equihash.Privacy-preserving Multi-hop Locks for Blockchain Scalability and Interoperability. | 
  
    | ESORICS | 2019 | 
         
          Incentives for Harvesting Attack in Proof of Work Mining Pools.A Lattice-Based Linkable Ring Signature Supporting Stealth Addresses.Annotary: A Concolic Execution System for Developing Secure Smart Contracts.PDFS: Practical Data Feed Service for Smart Contracts.Towards a Marketplace for Secure Outsourced Computations. | 
  
    | PODC | 2019 | 
         
        Self-Stabilizing Leader Election.Coded State Machine - Scaling State Machine Execution under Byzantine Faults.Exact Byzantine Consensus on Undirected Graphs under Local Broadcast Model.Asymptotically Optimal Validated Asynchronous Byzantine Agreement.The Consensus Number of a Cryptocurrency.Communication Complexity of Byzantine Agreement, Revisited.HotStuff: BFT Consensus with Linearity and Responsiveness.Fault Tolerant Gradient Clock Synchronization.Bootstrapping Public Blockchains Without a Trusted Setup. | 
  
  
    | ICDCS | 2019 | 
         
        OptChain: Optimal Transactions Placement for Scalable Blockchain Sharding.Fast Fault-Tolerant Sampling via Random Walk in Dynamic Networks.ezBFT: Decentralizing Byzantine Fault-Tolerant State Machine Replication.Partitioning Attacks on Bitcoin: Colliding Space, Time, and Logic.Selfish Mining in Ethereum.Jidar: A Jigsaw-like Data Reduction Approach Without Trust Assumptions for Bitcoin System.Hierarchical Edge-Cloud Computing for Mobile Blockchain Mining Game.ParBlockchain: Leveraging Transaction Parallelism in Permissioned Blockchain Systems.B-IoT: Blockchain Driven Internet of Things with Credit-Based Consensus Mechanism.Trust Mends Blockchains: Living up to Expectations.DataEther: Data Exploration Framework For Ethereum. | 
  
  
    | FC | 2019 | 
         
          Biased Nonce Sense: Lattice Attacks Against Weak ECDSA Signatures in Cryptocurrencies.Snow White: Robustly Reconfigurable Consensus and Applications to Provably Secure Proof of Stake.Compounding of Wealth in Proof-of-Stake Cryptocurrencies.Short Paper: I Can't Believe It's Not Stake! Resource Exhaustion Attacks on PoS.Short Paper: An Exploration of Code Diversity in the Cryptocurrency Landscape.Short Paper: An Empirical Analysis of Blockchain Forks in Bitcoin.Detecting Token Systems on Ethereum.Measuring Ethereum-Based ERC20 Token Networks.New Empirical Traceability Analysis of CryptoNote-Style Blockchains.Short Paper: An Empirical Analysis of Monero Cross-chain Traceability.PRCash: Fast, Private and Regulated Transactions for Digital Currencies.ZLiTE: Lightweight Clients for Shielded Zcash Transactions Using Trusted Execution.Designed to Be Broken: A Reverse Engineering Study of the 3D Secure 2.0 Payment Protocol.Short Paper: Making Contactless EMV Robust Against Rogue Readers Colluding with Relay Attackers.Short Paper: How to Attack PSD2 Internet Banking.Your Money or Your Life - Modeling and Analyzing the Security of Electronic Payment in the UC Framework.Oblivious PRF on Committed Vector Inputs and Application to Deduplication of Encrypted Data.Short Paper: The Proof is in the Pudding - Proofs of Work for Solving Discrete Logarithms.Minimizing Trust in Hardware Wallets with Two Factor Signatures.A Formal Treatment of Hardware Wallets.VeriSolid: Correct-by-Design Smart Contracts for Ethereum.Bitcoin Security Under Temporary Dishonest Majority.VAPOR: A Value-Centric Blockchain that is Scale-out, Decentralized, and Flexible by Design.Sprites and State Channels: Payment Networks that Go Faster Than Lightning.Echoes of the Past: Recovering Blockchain Metrics from Merged Mining.TxProbe: Discovering Bitcoin's Network Topology Using Orphan Transactions.Forecasting Suspicious Account Activity at Large-Scale Online Service Providers.Thinking Like a Fraudster: Detecting Fraudulent Transactions via Statistical Sequential Features.Secure Multiparty PageRank Algorithm for Collaborative Fraud Detection. | 
  
  
    | ACM AFT | 2019 | 
         
          Paralysis Proofs: Secure Dynamic Access Structures for Cryptocurrency Custody and More.Pisa: Arbitration Outsourcing for State Channels.Outpost: A Responsive Lightweight Watchtower.SoK: Sharding on Blockchain.On the optionality and fairness of Atomic Swaps.Spams meet Cryptocurrencies: Sextortion in the Bitcoin Ecosystem.Competing (Semi-)Selfish Miners in Bitcoin.Impossibility of Full Decentralization in Permissionless Blockchains.An Axiomatic Approach to Block Rewards.Semi-Quantum Money.Quantum Algorithms for Portfolio Optimization.Libra: Fair Order-Matching for Electronic Financial Exchanges.An Eye for an Eye: Economics of Retaliation in Mining Pools.SoK: Consensus in the Age of Blockchains.Kadcast: A Structured Approach to Broadcast in Blockchain Networks.Aleph: Efficient Atomic Broadcast in Asynchronous Networks with Byzantine Nodes. | 
  
  
    |  |  |  |