Event |
Time |
Paper |
ACM CCS |
2021 |
- Multi-Threshold Byzantine Fault Tolerance.
- Revisiting Nakamoto Consensus in Asynchronous Networks: A Comprehensive Analysis of Bitcoin Safety and Chain Quality.
- BFT Protocol Forensics.
- Securing Parallel-chain Protocols under Variable Mining Power.
- A Security Framework for Distributed Ledgers.
- How Does Blockchain Security Dictate Blockchain Implementation?.
- DETER: Denial of Ethereum Txpool sERvices.
- SyncAttack: Double-spending in Bitcoin Without Mining Power.
- The Exact Security of BIP32 Wallets.
|
IEEE S&P |
2021 |
- Merkle^2: A Low-Latency Transparency Log System.
- High-Frequency Trading on Decentralized On-Chain Exchanges.
- Ebb-and-Flow Protocols: A Resolution of the Availability-Finality Dilemma.
- Red Belly: A Secure, Fair and Scalable Open Blockchain.
- SmartPulse: Automated Checking of Temporal Properties in Smart Contracts.
- Bitcoin-Compatible Virtual Channels.
- On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols.
- Lockable Signatures for Blockchains: Scriptless Scripts for all Signatures.
- SGUARD: Smart Contracts Made Vulnerability-Free.
- MAD-HTLC: Because HTLC is Crazy-Cheap to Attack.
- Compact Certificates of Collective Knowledge.
- CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability
- Many-out-of-Many Proofs and Applications to Anonymous Zether.
- On the Anonymity Guarantees of Anonymous Proof-of-Stake Protocols.
- A2L: Anonymous Atomic Locks for Scalability in Payment Channel Hubs.
- Poster: Scalable Log Auditing on Private Blockchains via Lightweight Log-Fork Prevention.
|
USENIX Security |
2021 |
- On the Routing-Aware Peering against Network-Eclipse Attacks in Bitcoin.
- EOSAFE: Security Analysis of EOSIO Smart Contracts.
- EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts.
- Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications.
- Smart Contract Vulnerabilities: Vulnerable Does Not Imply Exploited.
- Frontrunner Jones and the Raiders of the Dark Forest: An Empirical Study of Frontrunning on the Ethereum Blockchain.
- SmarTest: Effectively Hunting Vulnerable Transaction Sequences in Smart Contracts through Language Model-Guided Symbolic Execution.
- Blitz: Secure Multi-Hop Payments Without Two-Phase Commits.
- On the Usability of Authenticity Checks for Hardware Security Tokens.
|
USENIX ATC |
2021
2020 |
- RainBlock: Faster Transaction Processing in Public Blockchains.[2021]
- An Off-The-Chain Execution Environment for Scalable Testing and Profiling of Smart Contracts.[2021]
- A Decentralized Blockchain with High Throughput and Fast Confirmation.[2020]
|
SOSP |
2021
2019 |
- Basil: Breaking up BFT with ACID (transactions).[2021]
- Bidl: A High-throughput, Low-latency Permissioned Blockchain Framework for Datacenter Networks.[2021]
- Kauri: Scalable BFT Consensus with Pipelined Tree-Based Dissemination and Aggregation.[2021]
- Rabia: Simplifying State-Machine Replication Through Randomization.[2021]
- Log-structured Protocols in Delos.[2021]
- Shard Manager: A Generic Shard Management Framework for Geo-distributed Applications.[2021]
- Forerunner: Constraint-based Speculative Transaction Execution for Ethereum.[2021]
- Boki: Stateful Serverless Computing with Shared Logs.[2021]
- Teechain: a secure payment network with asynchronous blockchain access.[2019]
|
VLDB |
2021
2020
2019 |
- SChain: A Scalable Consortium Blockchain Exploiting Intra- and Inter-Block Concurrency.[2021]
- SlimChain: Scaling Blockchain Transactions through Off-Chain Storage and Parallel Processing.[2021]
- ByShard: Sharding in a Byzantine Environment.[2021]
- Scaling Replicated State Machines with Compartmentalization.[2021]
- Epoch-based Commit and Replication in Distributed OLTP Databases.[2021]
- Refiner: A Reliable Incentive-Driven Federated Learning System Powered by Blockchain.[2021]
- ResilientDB: Global Scale Resilient Blockchain Fabric.[2020]
- Atomic Commitment Across Blockchains.[2020]
- FireLedger: A High Throughput Blockchain Consensus Protocol.[2020]
- Scalable, Resilient and Configurable Permissioned Blockchain Fabric.[2020]
- Fine-Grained, Secure and Efficient Data Provenance for Blockchain.[2019]
- CAPER: A Cross-Application Permissioned Blockchain.[2019]
- Blockchain Meets Database: Design and Implementation of a Blockchain Relational Database.[2019]
- BlockchainDB - A Shared Database on Blockchains.[2019]
|
SIGMOD |
2021
2020
2019 |
- SharPer: Sharding Permissioned Blockchains Over Network Clusters.[2021]
- Why Do My Blockchain Transactions Fail?: A Study of Hyperledger Fabric.[2021]
- PigPaxos: Devouring the Communication Bottlenecks in Distributed Consensus.[2021]
- SBlockchains vs. Distributed Databases: Dichotomy and Fusion.[2021]
- DIV: Resolving the Dynamic Issues of Zero-knowledge Set Membership Proof in the Blockchain.[2021]
- Do the Rich Get Richer? Fairness Analysis for Blockchain Incentives.[2021]
- A Byzantine Fault Tolerant Storage for Permissioned Blockchain.[2021]
- P^2B-Trace: Privacy-Preserving Blockchain-based Contact Tracing to Combat Pandemics.[2021]
- Crypt?: Crypto-Assisted Differential Privacy on Untrusted Servers.[2020]
- FalconDB: Blockchain-based Collaborative Database.[2020]
- A Transactional Perspective on Execute-order-validate Blockchains.[2020]
- Confidentiality Support over Financial Grade Consortium Blockchain.[2020]
- Towards Scaling Blockchain Systems via Sharding.[2019]
- vChain: Enabling Verifiable Boolean Range Queries over Blockchain Databases.[2019]
- Blurring the Lines between Blockchains and Database Systems: the Case of Hyperledger Fabric.[2019]
- State of Public and Private Blockchains: Myths and Reality.[2019]
|
NDSS |
2021 |
- As Strong As Its Weakest Link: How to Break Blockchain DApps at RPC Service.
- RandRunner: Distributed Randomness from Trapdoor VDFs with Strong Uniqueness.
- LaKSA: A Probabilistic Proof-of-Stake Protocol.
- SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Reinforcement Learning.
- Bitcontracts: Supporting Smart Contracts in Legacy Blockchains.
|
USENIX NSDI |
2021
2020
2019 |
- EPaxos Revisited.[2021]
- Fault-Tolerant Replication with Pull-Based Consensus in MongoDB.[2021]
- Fine-Grained Replicated State Machines for a Cluster Storage System.[2020]
- Scalog: Seamless Reconfiguration and Total Order in a Scalable Shared Log.[2020]
- Monoxide: Scale out Blockchains with Asynchronous Consensus Zones.[2019]
|
ESORICS |
2021 |
- Revocable Policy-Based Chameleon Hash.
- Fair Peer-to-Peer Content Delivery via Blockchain.
- Conclave: A Collective Stake Pool Protocol.
- Probabilistic Micropayments with Transferability.
- MiniLedger: Compact-Sized Anonymous and Auditable Distributed Payments.
- Succinct Scriptable NIZK via Trusted Hardware.
|
EuroSys |
2021
2020
2018 |
- Ethanos: Efficient Bootstrapping for Full Nodes on Account-based Blockchain.[2021]
- Zeus: Locality-aware Distributed Transactions.[2021]
- State-machine replication for planet-scale systems.[2020]
- HovercRaft: achieving scalability and fault-tolerance for microsecond-scale datacenter services.[2020]
- Hyperledger Fabric: a Distributed Operating System for Permissioned blockchains.[2018]
|
PODC |
2021 |
- Hedging Against Sore Loser Attacks in Cross-Chain Transactions.
- All You Need is DAG.
- Embedding a Deterministic BFT Protocol in a Block DAG.
- Brief Announcement: Be Prepared When Network Goes Bad: An Asynchronous View-Change Protocol.
- Brief Announcement: Classifying Trusted Hardware via Unidirectional Communication.
- Brief Announcement: Malicious Security Comes for Free in Consensus with Leaders.
- Brief Announcement: Brokering with Hashed Timelock Contracts is NP-Hard.
- Breaking the O(√ n)-Bit Barrier: Byzantine Agreement with Polylog Bits Per Party.
- Good-case Latency of Byzantine Broadcast: a Complete Categorization.
- Revisiting Optimal Resilience of Fast Byzantine Consensus.
- A New Way to Achieve Round-Efficient Byzantine Agreement.
- Reaching Consensus for Asynchronous Distributed Key Generation.
- Brief Announcement: Making Synchronous BFT Protocols Secure in the Presence of Mobile Sluggish Faults.
- Approximate Byzantine Fault-Tolerance in Distributed Optimization.
|
DSN |
2021
2020 |
- Data-Driven Model-Based Analysis of the Ethereum Verifier's Dilemma.[2021]
- SMACS: Smart Contract Access Control Service.[2021]
- Smart Contracts on the Move.[2021]
- Impact of Geo-Distribution and Mining Pools on Blockchains: A Study of Ethereum.[2021]
- From Byzantine Replication to Blockchain: Consensus is Only the Beginning.[2021]
- EPIC: Efficient Asynchronous BFT with Adaptive Security.[2021]
- On Incentive Compatible Role-Based Reward Distribution in Algorand.[2021]
- FabZK: Supporting Privacy-Preserving, Auditable Smart Contracts in Hyperledger Fabric.[2021]
- FSTR: Funds Skewness Aware Transaction Routing for Payment Channel Networks.[2020]
- SBFT: A Scalable and Decentralized Trust Infrastructure.[2020]
|
ICDCS |
2021 |
- Strengthened Fault Tolerance in Byzantine Fault Tolerant Replication.
- Behind Block Explorers: Public Blockchain Measurement and Security Implication.
- EPA-Route: Routing Payment Channel Network with High Success Rate and Low Payment Fees.
- Root Cause Analyses for the Deteriorating Bitcoin Network Synchronization.
- FastBlock: Accelerating Blockchains via Hardware Transactional Memory.
- LDSP: Shopping with Cryptocurrency Privately and Quickly under Leadership.
- Leaderless Consensus.
- A Game-Theoretic Analysis of Cross-Chain Atomic Swaps with HTLCs.
- Dissecting the Performance of Chained-BFT.
- Blockumulus: A Scalable Framework for Smart Contracts on the Cloud.
- Occam: A Secure and Adaptive Scaling Protocol for Permissionless Blockchain.
- MVCom: Scheduling Most Valuable Committees for the Large-Scale Sharded Blockchain.
- On the Synchronization Power of Token Smart Contracts.
- Game of Coins.
|
FC |
2021 |
- Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit.
- The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts.
- Timelocked Bribing.
- Shielded Computations in Smart Contracts Overcoming Forks.
- A Formal Model of Algorand Smart Contracts.
- Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask).
- Perimeter: A Network-Layer Attack on the Anonymity of Cryptocurrencies.
- An Empirical Analysis of Privacy in the Lightning Network.
- Cross-Layer Deanonymization Methods in the Lightning Protocol.
- The Complex Shape of Anonymity in Cryptocurrencies: Case Studies from a Systematic Approach.
- SoK: Communication Across Distributed Ledgers.
- Reparo: Publicly Verifiable Layer to Repair Blockchains.
- Short Paper: Debt Representation in UTXO Blockchains.
- Instant Block Confirmation in the Sleepy Model.
- Blockchain CAP Theorem Allows User-Dependent Adaptivity and Finality.
- PoSAT: Proof-of-Work Availability and Unpredictability, Without the Work.
- Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments.
- FPPW: A Fair and Privacy Preserving Watchtower for Bitcoin.
- Congestion Attacks in Payment Channel Networks.
- Payment Trees: Low Collateral Payments for Payment Channel Networks.
- Brick: Asynchronous Incentive-Compatible Payment Channels.
- Ignore the Extra Zeroes: Variance-Optimal Mining Pools.
- HaPPY-Mine: Designing a Mining Reward Function.
- Selfish Mining Attacks Exacerbated by Elastic Hash Supply.
- Fraud and Data Availability Proofs: Detecting Invalid Blocks in Light Clients.
- ACeD: Scalable Data Availability Oracle.
- Efficient State Management in Distributed Ledgers.
- Fast Isomorphic State Channels.
- Under the Hood of the Ethereum Gossip Protocol.
- Liquidations: DeFi on a Knife-Edge.
- Practical Witness-Key-Agreement for Blockchain-Based Dark Pools Financial Trading.
- Practical Post-quantum Few-Time Verifiable Random Function with Applications to Algorand.
|
ACM AFT |
2021 |
- Coalition-Safe Equilibria with Virtual Payoffs.
- Achieving State Machine Replication without Honest Players.
- A verifiably secure and proportional committee election rule.
- Dynamic Posted-Price Mechanisms for the Blockchain Transaction-Fee Market.
- Dynamical Analysis of the EIP-1559 Ethereum Fee Market.
- Composing Networks of Automated Market Makers.
- Shard Scheduler: object placement and migration in sharded, account-based blockchains.
- Spear: Fast Multi-Path Payment with Redundancy.
- The Velvet Path to Superlight Blockchain Clients.
- PHANTOM GHOSTDAG: A Scalable Generalization of Nakamoto Consensus.
- Generalizing Weighted Trees: A bridge from Bitcoin to GHOST.
- Close Latency-Security Trade-off for the Nakamoto Consensus.
- On Bitcoin Cash’s Target Recalculation Functions.
- SoK: Oracles from the Ground Truth to Market Manipulation.
- Private Attacks in Longest Chain Proof-of-stake Protocols with Single Secret Leader Elections.
- AMR: Autonomous Coin Mixer with Privacy Preserving Reward Distribution.
|
|
|
|
ACM CCS |
2020 |
- ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts.
- BDoS: Blockchain Denial-of-Service.
- eThor: Practical and Provably Sound Static Analysis of Ethereum Smart Contracts.
- WI is Almost Enough: Contingent Payment All Over Again.
- Dumbo: Faster Asynchronous BFT Protocols.
- Tight Consistency Bounds for Bitcoin.
- On the Optimality of Optimistic Responsiveness.
- Everything is a Race and Nakamoto Always Wins.
- Deterministic Wallets in a Quantum World.
|
IEEE S&P |
2020 |
- HydRand: Efficient Continuous Distributed Randomness.
- OHIE: Blockchain Scaling Made Simple.
- Sync HotStuff: Simple and Practical Synchronous State Machine Replication.
- Replicated State Machines Without Replicated Execution.
- A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network.
- Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability.
- FlyClient: Super-Light Clients for Cryptocurrencies.
- ZEXE: Enabling Decentralized Private Computation.
- VERISMART: A Highly Precise Safety Verifier for Ethereum Smart Contracts.
- VerX: Safety Verification of Smart Contracts.
- Poster: The Marriage of Fully Homomorphic Encryption and Blockchain.
- Poster: Transparent Certificate Revocation for CBE Based on Blockchain.
- Poster: Defining Actionable Rules for Verifying IoT Security.
|
USENIX Security |
2020 |
- BlockSci: Design and applications of a blockchain analysis platform.
- Remote Side-Channel Attacks on Anonymous Transactions.
- ETHBMC: A Bounded Model Checker for Smart Contracts.
- TXSPECTOR: Uncovering Attacks in Ethereum from Transactions.
- An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem.
- Pixel: Multi-signatures for Consensus.
- Scaling Verifiable Computation Using Efficient Set Accumulators.
- The Ballot is Busted Before the Blockchain: A Security Analysis of Voatz, the First Internet Voting Application Used in U.S. Federal Elections.
- An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem.
|
NDSS |
2020 |
- Bobtail: Improved Blockchain Security with Low-Variance Mining.
- Snappy: Fast On-chain Payments with Practical Collaterals.
- The Attack of the Clones Against Proof-of-Authority.
- Broken Metre: Attacking Resource Metering in EVM.
- SODA: A Generic Online Detection Framework for Smart Contracts.
|
OSDI |
2020
2018 |
- Blockene: A High-throughput Blockchain Over Mobile Devices.[2020]
- Virtual Consensus in Delos.[2020]
- Byzantine Ordered Consensus without Byzantine Oligarchy.[2020]
- Tolerating Slowdowns in Replicated State Machines using Copilots.[2020]
- Write Dependency Disentanglement with HORAE .[2020]
- The FuzzyLog: A Partially Ordered Shared Log.[2018]
|
ESORICS |
2020 |
- How to Model the Bribery Attack: A Practical Quantification Method in Blockchain.
- Updatable Blockchains.
- PrivacyGuard: Enforcing Private Data Usage Control with Blockchain and Attested Off-Chain Contract Execution.
- 2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake Securely.
- Generic Superlight Client for Permissionless Blockchains.
- LNBot: A Covert Hybrid Botnet on Bitcoin Lightning Network for Fun and Profit.
|
PODC |
2020 |
- Dumbo-MVBA: Optimal Multi-Valued Validated Asynchronous Byzantine Agreement, Revisited.
- Revisiting Asynchronous Fault Tolerant Computation with Optimal Resilience.
- Asynchronous Byzantine Approximate Consensus in Directed Networks.
- Asynchronous Byzantine Approximate Consensus in Directed Networks.
- On the Subject of Non-Equivocation: Defining Non-Equivocation in Synchronous Agreement Systems.
- Brief Announcement: Almost-surely Terminating Asynchronous Byzantine Agreement Protocols with a Constant Expected Running Time.
- Brief Announcement: On the Significance of Consecutive Ballots in Paxos.
- Brief Announcement: Not a COINcidence: Sub-Quadratic Asynchronous Byzantine Agreement WHP.
- Brief Announcement: Byzantine Agreement with Unknown Participants and Failures.
|
ICDCS |
2020 |
- An Analysis of Blockchain Consistency in Asynchronous Networks: Deriving a Neat Bound.
- Fair and Efficient Gossip in Hyperledger Fabric.
- Towards Privacy-assured and Lightweight On-chain Auditing of Decentralized Storage.
- Game Theoretical Analysis of Cross-Chain Swaps.
- A Certificateless Consortium Blockchain for IoTs.
- TinyEVM: Off-Chain Smart Contracts on Low-Power IoT Devices.
- Permissioned Blockchain Through the Looking Glass: Architectural and Implementation Lessons Learned.
- Toward Trustworthy Blockchain-as-a-Service with Auditing.
- Consistency of Proof-of-Stake Blockchains with Concurrent Honest Slot Leaders.
- LVQ: A Lightweight Verifiable Query Approach for Transaction History in Bitcoin.
- A Study on Nine Years of Bitcoin Transactions: Understanding Real-world Behaviors of Bitcoin Miners and Users.
- On Exploiting Transaction Concurrency To Speed Up Blockchains.
|
FC |
2020 |
- Leveraging Bitcoin Testnet for Bidirectional Botnet Command and Control Systems.
- Security Analysis on dBFT Protocol of NEO.
- Selfish Mining Re-Examined.
- Fairness and Efficiency in DAG-Based Cryptocurrencies.
- Stake Shift in Major Cryptocurrencies: An Empirical Study.
- Coded Merkle Tree: Solving Data Availability Attacks in Blockchains.
- Decentralized Privacy-Preserving Netting Protocol on Blockchain for Payment Systems.
- The Arwen Trading Protocols.
- SoK: A Classification Framework for Stablecoin Designs.
- SoK: Layer-Two Blockchain Protocols.
- MicroCash: Practical Concurrent Processing of Micropayments.
- LockDown: Balance Availability Attack Against Lightning Network Channels.
- Ride the Lightning: The Game Theory of Payment Channels.
- How to Profit from Payments Channels.
- Boomerang: Redundancy Improves Latency and Throughput in Payment-Channel Networks.
- DLSAG: Non-interactive Refund Transactions for Interoperable Payment Channels in Monero.
- Cerberus Channels: Incentivizing Watchtowers for Bitcoin.
- Zether: Towards Privacy in a Smart Contract World.
- RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security.
- Non-interactive Proofs of Proof-of-Work.
- Proof-of-Burn.
- Non-interactive Cryptographic Timestamping Based on Verifiable Delay Functions.
- Open Market or Ghost Town? The Curious Case of OpenBazaar.
- Exploring the Monero Peer-to-Peer Network.
- Surviving the Cryptojungle: Perception and Management of Risk Among North American Cryptocurrency (Non)Users.
- Address Clustering Heuristics for Ethereum.
- What are the Actual Flaws in Important Smart Contracts (And How Can We Find Them)?.
- Characterizing Code Clones in the Ethereum Smart Contract Ecosystem.
- Smart Contracts for Government Processes: Case Study and Prototype Implementation (Short Paper).
|
ACM AFT |
2020 |
- Streamlet: Textbook Streamlined Blockchains.
- Single Secret Leader Election.
- Wendy, the Good Little Fairness Widget: Achieving Order Fairness for Blockchains.
- How to Pick Your Friends A Game Theoretic Approach to P2P Overlay Construction.
- Defending Against Malicious Reorgs in Tezos Proof-of-Stake.
- Stablecoins 2.0: Economic Foundations and Risk-based Models.
- Improved Price Oracles: Constant Function Market Makers.
- DeFi Protocols for Loanable Funds: Interest Rates, Liquidity and Market Efficiency.
- Efficient MDP Analysis for Selfish-Mining in Blockchains.
- A Gas-Efficient Superlight Bitcoin Client in Solidity.
- SmartOTPs: An Air-Gapped 2-Factor Authentication for Smart-Contract Wallets.
- FastPay: High-Performance Byzantine Fault Tolerant Settlement.
- Asynchronous Byzantine Agreement in Incomplete Networks.
- Winkle: Foiling Long-Range Attacks in Proof-of-Stake Systems.
- Flood & Loot: A Systemic Attack on The Lightning Network.
- Counting Down Thunder: Timing Attacks on Privacy in Payment Channel Networks.
- Route Hijacking and DoS in Off-Chain Networks.
- Encrypted Blockchain Databases.
- Privacy-preserving auditable token payments in a permissioned blockchain system.
|
|
|
|
ACM CCS |
2019 |
- HyperService: Interoperability and Programmability Across Heterogeneous Blockchains.
- MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol.
- Prism: Deconstructing the Blockchain to Approach Physical Limits.
- Atomic Multi-Channel Updates with Constant Collateral in Bitcoin-Compatible Payment-Channel Networks.
- Erlay: Efficient Transaction Relay for Bitcoin.
- Power Adjusting and Bribery Racing: Novel Mining Attacks in the Bitcoin System.
- Balance: Dynamic Adjustment of Cryptocurrency Deposits.
- TokenScope: Automatically Detecting Inconsistent Behaviors of Cryptocurrency Tokens in Ethereum.
- Tesseract: Real-Time Cryptocurrency Exchange Using Trusted Hardware.
- zkay: Specifying and Enforcing Data Privacy in Smart Contracts.
- Privacy Aspects and Subliminal Channels in Zcash.
- POIROT: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting.
- Effective and Light-Weight Deobfuscation and Semantic-Aware Attack Detection for PowerShell Scripts.
- MalMax: Multi-Aspect Execution for Automated Dynamic Web Server Malware Analysis.
- Efficient Publicly Verifiable 2PC over a Blockchain with Applications to Financially-Secure Computations.
- Omniring: Scaling Up Private Payments Without Trusted Setup — Formal Foundations and a Construction of Ring Confidential Transactions with Log-size Proofs.
- Learning to Fuzz from Symbolic Execution with Application to Smart Contracts.
- SAMPL: Scalable Auditability of Monitoring Processes using Public Ledgers.
- Atomic Multi-Channel Updates with Constant Collateral in Payment-Channel Networks.
- Poster: A Proof-of-Stake (PoS) Blockchain Protocol using Fair and Dynamic Sharding Management.
- Poster: A Reliable and Accountable Privacy-Preserving Federated Learning Framework using the Blockchain.
|
IEEE S&P |
2019 |
- Perun: Virtual Payment Hubs over Cryptocurrencies.
- Redactable Blockchain in the Permissionless Setting.
- Proof-of-Stake Sidechains.
- Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake.
- Lay Down the Common Metrics: Evaluating Proof-of-Work Consensus Protocols' Security.
- XCLAIM: Trustless, Interoperable, Cryptocurrency-Backed Assets.
- Blind Certificate Authorities.
- Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash?
|
USENIX Security |
2019 |
- BITE: Bitcoin Lightweight Client Privacy using Trusted Execution
- FastKitten: Practical Smart Contracts on Bitcoin
- StrongChain: Transparent and Collaborative Proof-of-Work Consensus
- Tracing Transactions Across Cryptocurrency Ledgers
- The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts
- The Anatomy of a Cryptocurrency Pump-and-Dump Scheme
- Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale
|
NDSS |
2019 |
- SABRE: Protecting Bitcoin against Routing Attacks.
- A Treasury System for Cryptocurrencies: Enabling Better Collaborative Intelligence.
- Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based.
- YODA: Enabling computationally intensive contracts on blockchains with Byzantine and Selfish nodes.
- Giving State to the Stateless: Augmenting Trustworthy Computation with Ledgers.
- Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web.
- Vault: Fast Bootstrapping for the Algorand Cryptocurrency.
- Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks.
- Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability
Constructing an Adversary Solver for Equihash.
- Privacy-preserving Multi-hop Locks for Blockchain Scalability and Interoperability.
|
ESORICS |
2019 |
- Incentives for Harvesting Attack in Proof of Work Mining Pools.
- A Lattice-Based Linkable Ring Signature Supporting Stealth Addresses.
- Annotary: A Concolic Execution System for Developing Secure Smart Contracts.
- PDFS: Practical Data Feed Service for Smart Contracts.
- Towards a Marketplace for Secure Outsourced Computations.
|
PODC |
2019 |
- Self-Stabilizing Leader Election.
- Coded State Machine - Scaling State Machine Execution under Byzantine Faults.
- Exact Byzantine Consensus on Undirected Graphs under Local Broadcast Model.
- Asymptotically Optimal Validated Asynchronous Byzantine Agreement.
- The Consensus Number of a Cryptocurrency.
- Communication Complexity of Byzantine Agreement, Revisited.
- HotStuff: BFT Consensus with Linearity and Responsiveness.
- Fault Tolerant Gradient Clock Synchronization.
- Bootstrapping Public Blockchains Without a Trusted Setup.
|
ICDCS |
2019 |
- OptChain: Optimal Transactions Placement for Scalable Blockchain Sharding.
- Fast Fault-Tolerant Sampling via Random Walk in Dynamic Networks.
- ezBFT: Decentralizing Byzantine Fault-Tolerant State Machine Replication.
- Partitioning Attacks on Bitcoin: Colliding Space, Time, and Logic.
- Selfish Mining in Ethereum.
- Jidar: A Jigsaw-like Data Reduction Approach Without Trust Assumptions for Bitcoin System.
- Hierarchical Edge-Cloud Computing for Mobile Blockchain Mining Game.
- ParBlockchain: Leveraging Transaction Parallelism in Permissioned Blockchain Systems.
- B-IoT: Blockchain Driven Internet of Things with Credit-Based Consensus Mechanism.
- Trust Mends Blockchains: Living up to Expectations.
- DataEther: Data Exploration Framework For Ethereum.
|
FC |
2019 |
- Biased Nonce Sense: Lattice Attacks Against Weak ECDSA Signatures in Cryptocurrencies.
- Snow White: Robustly Reconfigurable Consensus and Applications to Provably Secure Proof of Stake.
- Compounding of Wealth in Proof-of-Stake Cryptocurrencies.
- Short Paper: I Can't Believe It's Not Stake! Resource Exhaustion Attacks on PoS.
- Short Paper: An Exploration of Code Diversity in the Cryptocurrency Landscape.
- Short Paper: An Empirical Analysis of Blockchain Forks in Bitcoin.
- Detecting Token Systems on Ethereum.
- Measuring Ethereum-Based ERC20 Token Networks.
- New Empirical Traceability Analysis of CryptoNote-Style Blockchains.
- Short Paper: An Empirical Analysis of Monero Cross-chain Traceability.
- PRCash: Fast, Private and Regulated Transactions for Digital Currencies.
- ZLiTE: Lightweight Clients for Shielded Zcash Transactions Using Trusted Execution.
- Designed to Be Broken: A Reverse Engineering Study of the 3D Secure 2.0 Payment Protocol.
- Short Paper: Making Contactless EMV Robust Against Rogue Readers Colluding with Relay Attackers.
- Short Paper: How to Attack PSD2 Internet Banking.
- Your Money or Your Life - Modeling and Analyzing the Security of Electronic Payment in the UC Framework.
- Oblivious PRF on Committed Vector Inputs and Application to Deduplication of Encrypted Data.
- Short Paper: The Proof is in the Pudding - Proofs of Work for Solving Discrete Logarithms.
- Minimizing Trust in Hardware Wallets with Two Factor Signatures.
- A Formal Treatment of Hardware Wallets.
- VeriSolid: Correct-by-Design Smart Contracts for Ethereum.
- Bitcoin Security Under Temporary Dishonest Majority.
- VAPOR: A Value-Centric Blockchain that is Scale-out, Decentralized, and Flexible by Design.
- Sprites and State Channels: Payment Networks that Go Faster Than Lightning.
- Echoes of the Past: Recovering Blockchain Metrics from Merged Mining.
- TxProbe: Discovering Bitcoin's Network Topology Using Orphan Transactions.
- Forecasting Suspicious Account Activity at Large-Scale Online Service Providers.
- Thinking Like a Fraudster: Detecting Fraudulent Transactions via Statistical Sequential Features.
- Secure Multiparty PageRank Algorithm for Collaborative Fraud Detection.
|
ACM AFT |
2019 |
- Paralysis Proofs: Secure Dynamic Access Structures for Cryptocurrency Custody and More.
- Pisa: Arbitration Outsourcing for State Channels.
- Outpost: A Responsive Lightweight Watchtower.
- SoK: Sharding on Blockchain.
- On the optionality and fairness of Atomic Swaps.
- Spams meet Cryptocurrencies: Sextortion in the Bitcoin Ecosystem.
- Competing (Semi-)Selfish Miners in Bitcoin.
- Impossibility of Full Decentralization in Permissionless Blockchains.
- An Axiomatic Approach to Block Rewards.
- Semi-Quantum Money.
- Quantum Algorithms for Portfolio Optimization.
- Libra: Fair Order-Matching for Electronic Financial Exchanges.
- An Eye for an Eye: Economics of Retaliation in Mining Pools.
- SoK: Consensus in the Age of Blockchains.
- Kadcast: A Structured Approach to Broadcast in Blockchain Networks.
- Aleph: Efficient Atomic Broadcast in Asynchronous Networks with Byzantine Nodes.
|
|
|
|