Blockchian Research Resource


Call For Paper

Deadline

Event

Date

Location

Rank

April 15, 2023

SRDS 2023: The 42nd International Symposium on Reliable Distributed Systems

September 25-29, 2023

Marrakech, Morocco

★★★★

April 19, 2023

NDSS 2024: The Network and Distributed System Security Symposium

February 26 - March 01, 2024

San Diego, California, USA

★★★★★

April 27, 2023

NSDI 2024: 21th USENIX Symposium on Networked Systems Design and Implementation

April 16 - 18, 2024

SANTA CLARA, CA, USA

★★★★★

May 04, 2023

ACM CCS 2023: The 30th ACM Conference on Computer and Communications Security

November 26-30, 2023

Copenhagen, Denmark

★★★★★

May 06, 2023

SecureComm 2023: 19th EAI International Conference on Security and Privacy in Communication Networks

October 19-21, 2023

Hong Kong SAR, Hong Kong

★★★

May 13, 2023

AFT 2023: The 5th ACM conference on Advances in Financial Technologies

September 19-21, 2023

?, ?, ?

★★★

May 22, 2023

ACSAC 2023: The Annual Computer Security Applications Conference

December 04 - 08, 2023

Austin, Texas, USA

★★★★

May 28, 2023

ESORICS 2023: the 28th European Symposium on Research in Computer Security

September 25 - 29, 2023

The Hague, The Netherlands

★★★★

June 06, 2023

USENIX Security 2024: The 28th European Symposium on Research in Computer Security

August 14 – 16, 2024

PHILADELPHIA, PA, USA

★★★★★

Blockchain Paper

Event

Time

Paper

ACM CCS

2021

  • Multi-Threshold Byzantine Fault Tolerance.
  • Revisiting Nakamoto Consensus in Asynchronous Networks: A Comprehensive Analysis of Bitcoin Safety and Chain Quality.
  • BFT Protocol Forensics.
  • Securing Parallel-chain Protocols under Variable Mining Power.
  • A Security Framework for Distributed Ledgers.
  • How Does Blockchain Security Dictate Blockchain Implementation?.
  • DETER: Denial of Ethereum Txpool sERvices.
  • SyncAttack: Double-spending in Bitcoin Without Mining Power.
  • The Exact Security of BIP32 Wallets.

IEEE S&P

2021

  • Merkle^2: A Low-Latency Transparency Log System.
  • High-Frequency Trading on Decentralized On-Chain Exchanges.
  • Ebb-and-Flow Protocols: A Resolution of the Availability-Finality Dilemma.
  • Red Belly: A Secure, Fair and Scalable Open Blockchain.
  • SmartPulse: Automated Checking of Temporal Properties in Smart Contracts.
  • Bitcoin-Compatible Virtual Channels.
  • On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols.
  • Lockable Signatures for Blockchains: Scriptless Scripts for all Signatures.
  • SGUARD: Smart Contracts Made Vulnerability-Free.
  • MAD-HTLC: Because HTLC is Crazy-Cheap to Attack.
  • Compact Certificates of Collective Knowledge.
  • CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability
  • Many-out-of-Many Proofs and Applications to Anonymous Zether.
  • On the Anonymity Guarantees of Anonymous Proof-of-Stake Protocols.
  • A2L: Anonymous Atomic Locks for Scalability in Payment Channel Hubs.
  • Poster: Scalable Log Auditing on Private Blockchains via Lightweight Log-Fork Prevention.

USENIX Security

2021

  • On the Routing-Aware Peering against Network-Eclipse Attacks in Bitcoin.
  • EOSAFE: Security Analysis of EOSIO Smart Contracts.
  • EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts.
  • Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications.
  • Smart Contract Vulnerabilities: Vulnerable Does Not Imply Exploited.
  • Frontrunner Jones and the Raiders of the Dark Forest: An Empirical Study of Frontrunning on the Ethereum Blockchain.
  • SmarTest: Effectively Hunting Vulnerable Transaction Sequences in Smart Contracts through Language Model-Guided Symbolic Execution.
  • Blitz: Secure Multi-Hop Payments Without Two-Phase Commits.
  • On the Usability of Authenticity Checks for Hardware Security Tokens.

USENIX ATC

2021

2020

  • RainBlock: Faster Transaction Processing in Public Blockchains.[2021]
  • An Off-The-Chain Execution Environment for Scalable Testing and Profiling of Smart Contracts.[2021]
  • A Decentralized Blockchain with High Throughput and Fast Confirmation.[2020]

SOSP

2021

2019

  • Basil: Breaking up BFT with ACID (transactions).[2021]
  • Bidl: A High-throughput, Low-latency Permissioned Blockchain Framework for Datacenter Networks.[2021]
  • Kauri: Scalable BFT Consensus with Pipelined Tree-Based Dissemination and Aggregation.[2021]
  • Rabia: Simplifying State-Machine Replication Through Randomization.[2021]
  • Log-structured Protocols in Delos.[2021]
  • Shard Manager: A Generic Shard Management Framework for Geo-distributed Applications.[2021]
  • Forerunner: Constraint-based Speculative Transaction Execution for Ethereum.[2021]
  • Boki: Stateful Serverless Computing with Shared Logs.[2021]
  • Teechain: a secure payment network with asynchronous blockchain access.[2019]

VLDB

2021

2020

2019

  • SChain: A Scalable Consortium Blockchain Exploiting Intra- and Inter-Block Concurrency.[2021]
  • SlimChain: Scaling Blockchain Transactions through Off-Chain Storage and Parallel Processing.[2021]
  • ByShard: Sharding in a Byzantine Environment.[2021]
  • Scaling Replicated State Machines with Compartmentalization.[2021]
  • Epoch-based Commit and Replication in Distributed OLTP Databases.[2021]
  • Refiner: A Reliable Incentive-Driven Federated Learning System Powered by Blockchain.[2021]
  • ResilientDB: Global Scale Resilient Blockchain Fabric.[2020]
  • Atomic Commitment Across Blockchains.[2020]
  • FireLedger: A High Throughput Blockchain Consensus Protocol.[2020]
  • Scalable, Resilient and Configurable Permissioned Blockchain Fabric.[2020]
  • Fine-Grained, Secure and Efficient Data Provenance for Blockchain.[2019]
  • CAPER: A Cross-Application Permissioned Blockchain.[2019]
  • Blockchain Meets Database: Design and Implementation of a Blockchain Relational Database.[2019]
  • BlockchainDB - A Shared Database on Blockchains.[2019]

SIGMOD

2021

2020

2019

  • SharPer: Sharding Permissioned Blockchains Over Network Clusters.[2021]
  • Why Do My Blockchain Transactions Fail?: A Study of Hyperledger Fabric.[2021]
  • PigPaxos: Devouring the Communication Bottlenecks in Distributed Consensus.[2021]
  • SBlockchains vs. Distributed Databases: Dichotomy and Fusion.[2021]
  • DIV: Resolving the Dynamic Issues of Zero-knowledge Set Membership Proof in the Blockchain.[2021]
  • Do the Rich Get Richer? Fairness Analysis for Blockchain Incentives.[2021]
  • A Byzantine Fault Tolerant Storage for Permissioned Blockchain.[2021]
  • P^2B-Trace: Privacy-Preserving Blockchain-based Contact Tracing to Combat Pandemics.[2021]
  • Crypt?: Crypto-Assisted Differential Privacy on Untrusted Servers.[2020]
  • FalconDB: Blockchain-based Collaborative Database.[2020]
  • A Transactional Perspective on Execute-order-validate Blockchains.[2020]
  • Confidentiality Support over Financial Grade Consortium Blockchain.[2020]
  • Towards Scaling Blockchain Systems via Sharding.[2019]
  • vChain: Enabling Verifiable Boolean Range Queries over Blockchain Databases.[2019]
  • Blurring the Lines between Blockchains and Database Systems: the Case of Hyperledger Fabric.[2019]
  • State of Public and Private Blockchains: Myths and Reality.[2019]

NDSS

2021

  • As Strong As Its Weakest Link: How to Break Blockchain DApps at RPC Service.
  • RandRunner: Distributed Randomness from Trapdoor VDFs with Strong Uniqueness.
  • LaKSA: A Probabilistic Proof-of-Stake Protocol.
  • SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Reinforcement Learning.
  • Bitcontracts: Supporting Smart Contracts in Legacy Blockchains.

USENIX NSDI

2021

2020

2019

  • EPaxos Revisited.[2021]
  • Fault-Tolerant Replication with Pull-Based Consensus in MongoDB.[2021]
  • Fine-Grained Replicated State Machines for a Cluster Storage System.[2020]
  • Scalog: Seamless Reconfiguration and Total Order in a Scalable Shared Log.[2020]
  • Monoxide: Scale out Blockchains with Asynchronous Consensus Zones.[2019]

ESORICS

2021

  • Revocable Policy-Based Chameleon Hash.
  • Fair Peer-to-Peer Content Delivery via Blockchain.
  • Conclave: A Collective Stake Pool Protocol.
  • Probabilistic Micropayments with Transferability.
  • MiniLedger: Compact-Sized Anonymous and Auditable Distributed Payments.
  • Succinct Scriptable NIZK via Trusted Hardware.

EuroSys

2021

2020

2018

  • Ethanos: Efficient Bootstrapping for Full Nodes on Account-based Blockchain.[2021]
  • Zeus: Locality-aware Distributed Transactions.[2021]
  • State-machine replication for planet-scale systems.[2020]
  • HovercRaft: achieving scalability and fault-tolerance for microsecond-scale datacenter services.[2020]
  • Hyperledger Fabric: a Distributed Operating System for Permissioned blockchains.[2018]

PODC

2021

  • Hedging Against Sore Loser Attacks in Cross-Chain Transactions.
  • All You Need is DAG.
  • Embedding a Deterministic BFT Protocol in a Block DAG.
  • Brief Announcement: Be Prepared When Network Goes Bad: An Asynchronous View-Change Protocol.
  • Brief Announcement: Classifying Trusted Hardware via Unidirectional Communication.
  • Brief Announcement: Malicious Security Comes for Free in Consensus with Leaders.
  • Brief Announcement: Brokering with Hashed Timelock Contracts is NP-Hard.
  • Breaking the O(√ n)-Bit Barrier: Byzantine Agreement with Polylog Bits Per Party.
  • Good-case Latency of Byzantine Broadcast: a Complete Categorization.
  • Revisiting Optimal Resilience of Fast Byzantine Consensus.
  • A New Way to Achieve Round-Efficient Byzantine Agreement.
  • Reaching Consensus for Asynchronous Distributed Key Generation.
  • Brief Announcement: Making Synchronous BFT Protocols Secure in the Presence of Mobile Sluggish Faults.
  • Approximate Byzantine Fault-Tolerance in Distributed Optimization.

DSN

2021

2020

  • Data-Driven Model-Based Analysis of the Ethereum Verifier's Dilemma.[2021]
  • SMACS: Smart Contract Access Control Service.[2021]
  • Smart Contracts on the Move.[2021]
  • Impact of Geo-Distribution and Mining Pools on Blockchains: A Study of Ethereum.[2021]
  • From Byzantine Replication to Blockchain: Consensus is Only the Beginning.[2021]
  • EPIC: Efficient Asynchronous BFT with Adaptive Security.[2021]
  • On Incentive Compatible Role-Based Reward Distribution in Algorand.[2021]
  • FabZK: Supporting Privacy-Preserving, Auditable Smart Contracts in Hyperledger Fabric.[2021]
  • FSTR: Funds Skewness Aware Transaction Routing for Payment Channel Networks.[2020]
  • SBFT: A Scalable and Decentralized Trust Infrastructure.[2020]

ICDCS

2021

  • Strengthened Fault Tolerance in Byzantine Fault Tolerant Replication.
  • Behind Block Explorers: Public Blockchain Measurement and Security Implication.
  • EPA-Route: Routing Payment Channel Network with High Success Rate and Low Payment Fees.
  • Root Cause Analyses for the Deteriorating Bitcoin Network Synchronization.
  • FastBlock: Accelerating Blockchains via Hardware Transactional Memory.
  • LDSP: Shopping with Cryptocurrency Privately and Quickly under Leadership.
  • Leaderless Consensus.
  • A Game-Theoretic Analysis of Cross-Chain Atomic Swaps with HTLCs.
  • Dissecting the Performance of Chained-BFT.
  • Blockumulus: A Scalable Framework for Smart Contracts on the Cloud.
  • Occam: A Secure and Adaptive Scaling Protocol for Permissionless Blockchain.
  • MVCom: Scheduling Most Valuable Committees for the Large-Scale Sharded Blockchain.
  • On the Synchronization Power of Token Smart Contracts.
  • Game of Coins.

FC

2021

  • Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit.
  • The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts.
  • Timelocked Bribing.
  • Shielded Computations in Smart Contracts Overcoming Forks.
  • A Formal Model of Algorand Smart Contracts.
  • Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask).
  • Perimeter: A Network-Layer Attack on the Anonymity of Cryptocurrencies.
  • An Empirical Analysis of Privacy in the Lightning Network.
  • Cross-Layer Deanonymization Methods in the Lightning Protocol.
  • The Complex Shape of Anonymity in Cryptocurrencies: Case Studies from a Systematic Approach.
  • SoK: Communication Across Distributed Ledgers.
  • Reparo: Publicly Verifiable Layer to Repair Blockchains.
  • Short Paper: Debt Representation in UTXO Blockchains.
  • Instant Block Confirmation in the Sleepy Model.
  • Blockchain CAP Theorem Allows User-Dependent Adaptivity and Finality.
  • PoSAT: Proof-of-Work Availability and Unpredictability, Without the Work.
  • Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments.
  • FPPW: A Fair and Privacy Preserving Watchtower for Bitcoin.
  • Congestion Attacks in Payment Channel Networks.
  • Payment Trees: Low Collateral Payments for Payment Channel Networks.
  • Brick: Asynchronous Incentive-Compatible Payment Channels.
  • Ignore the Extra Zeroes: Variance-Optimal Mining Pools.
  • HaPPY-Mine: Designing a Mining Reward Function.
  • Selfish Mining Attacks Exacerbated by Elastic Hash Supply.
  • Fraud and Data Availability Proofs: Detecting Invalid Blocks in Light Clients.
  • ACeD: Scalable Data Availability Oracle.
  • Efficient State Management in Distributed Ledgers.
  • Fast Isomorphic State Channels.
  • Under the Hood of the Ethereum Gossip Protocol.
  • Liquidations: DeFi on a Knife-Edge.
  • Practical Witness-Key-Agreement for Blockchain-Based Dark Pools Financial Trading.
  • Practical Post-quantum Few-Time Verifiable Random Function with Applications to Algorand.

ACM AFT

2021

  • Coalition-Safe Equilibria with Virtual Payoffs.
  • Achieving State Machine Replication without Honest Players.
  • A verifiably secure and proportional committee election rule.
  • Dynamic Posted-Price Mechanisms for the Blockchain Transaction-Fee Market.
  • Dynamical Analysis of the EIP-1559 Ethereum Fee Market.
  • Composing Networks of Automated Market Makers.
  • Shard Scheduler: object placement and migration in sharded, account-based blockchains.
  • Spear: Fast Multi-Path Payment with Redundancy.
  • The Velvet Path to Superlight Blockchain Clients.
  • PHANTOM GHOSTDAG: A Scalable Generalization of Nakamoto Consensus.
  • Generalizing Weighted Trees: A bridge from Bitcoin to GHOST.
  • Close Latency-Security Trade-off for the Nakamoto Consensus.
  • On Bitcoin Cash’s Target Recalculation Functions.
  • SoK: Oracles from the Ground Truth to Market Manipulation.
  • Private Attacks in Longest Chain Proof-of-stake Protocols with Single Secret Leader Elections.
  • AMR: Autonomous Coin Mixer with Privacy Preserving Reward Distribution.

ACM CCS

2020

  • ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts.
  • BDoS: Blockchain Denial-of-Service.
  • eThor: Practical and Provably Sound Static Analysis of Ethereum Smart Contracts.
  • WI is Almost Enough: Contingent Payment All Over Again.
  • Dumbo: Faster Asynchronous BFT Protocols.
  • Tight Consistency Bounds for Bitcoin.
  • On the Optimality of Optimistic Responsiveness.
  • Everything is a Race and Nakamoto Always Wins.
  • Deterministic Wallets in a Quantum World.

IEEE S&P

2020

  • HydRand: Efficient Continuous Distributed Randomness.
  • OHIE: Blockchain Scaling Made Simple.
  • Sync HotStuff: Simple and Practical Synchronous State Machine Replication.
  • Replicated State Machines Without Replicated Execution.
  • A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network.
  • Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability.
  • FlyClient: Super-Light Clients for Cryptocurrencies.
  • ZEXE: Enabling Decentralized Private Computation.
  • VERISMART: A Highly Precise Safety Verifier for Ethereum Smart Contracts.
  • VerX: Safety Verification of Smart Contracts.
  • Poster: The Marriage of Fully Homomorphic Encryption and Blockchain.
  • Poster: Transparent Certificate Revocation for CBE Based on Blockchain.
  • Poster: Defining Actionable Rules for Verifying IoT Security.

USENIX Security

2020

  • BlockSci: Design and applications of a blockchain analysis platform.
  • Remote Side-Channel Attacks on Anonymous Transactions.
  • ETHBMC: A Bounded Model Checker for Smart Contracts.
  • TXSPECTOR: Uncovering Attacks in Ethereum from Transactions.
  • An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem.
  • Pixel: Multi-signatures for Consensus.
  • Scaling Verifiable Computation Using Efficient Set Accumulators.
  • The Ballot is Busted Before the Blockchain: A Security Analysis of Voatz, the First Internet Voting Application Used in U.S. Federal Elections.
  • An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem.

NDSS

2020

  • Bobtail: Improved Blockchain Security with Low-Variance Mining.
  • Snappy: Fast On-chain Payments with Practical Collaterals.
  • The Attack of the Clones Against Proof-of-Authority.
  • Broken Metre: Attacking Resource Metering in EVM.
  • SODA: A Generic Online Detection Framework for Smart Contracts.

OSDI

2020

2018

  • Blockene: A High-throughput Blockchain Over Mobile Devices.[2020]
  • Virtual Consensus in Delos.[2020]
  • Byzantine Ordered Consensus without Byzantine Oligarchy.[2020]
  • Tolerating Slowdowns in Replicated State Machines using Copilots.[2020]
  • Write Dependency Disentanglement with HORAE .[2020]
  • The FuzzyLog: A Partially Ordered Shared Log.[2018]

ESORICS

2020

  • How to Model the Bribery Attack: A Practical Quantification Method in Blockchain.
  • Updatable Blockchains.
  • PrivacyGuard: Enforcing Private Data Usage Control with Blockchain and Attested Off-Chain Contract Execution.
  • 2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake Securely.
  • Generic Superlight Client for Permissionless Blockchains.
  • LNBot: A Covert Hybrid Botnet on Bitcoin Lightning Network for Fun and Profit.

PODC

2020

  • Dumbo-MVBA: Optimal Multi-Valued Validated Asynchronous Byzantine Agreement, Revisited.
  • Revisiting Asynchronous Fault Tolerant Computation with Optimal Resilience.
  • Asynchronous Byzantine Approximate Consensus in Directed Networks.
  • Asynchronous Byzantine Approximate Consensus in Directed Networks.
  • On the Subject of Non-Equivocation: Defining Non-Equivocation in Synchronous Agreement Systems.
  • Brief Announcement: Almost-surely Terminating Asynchronous Byzantine Agreement Protocols with a Constant Expected Running Time.
  • Brief Announcement: On the Significance of Consecutive Ballots in Paxos.
  • Brief Announcement: Not a COINcidence: Sub-Quadratic Asynchronous Byzantine Agreement WHP.
  • Brief Announcement: Byzantine Agreement with Unknown Participants and Failures.

ICDCS

2020

  • An Analysis of Blockchain Consistency in Asynchronous Networks: Deriving a Neat Bound.
  • Fair and Efficient Gossip in Hyperledger Fabric.
  • Towards Privacy-assured and Lightweight On-chain Auditing of Decentralized Storage.
  • Game Theoretical Analysis of Cross-Chain Swaps.
  • A Certificateless Consortium Blockchain for IoTs.
  • TinyEVM: Off-Chain Smart Contracts on Low-Power IoT Devices.
  • Permissioned Blockchain Through the Looking Glass: Architectural and Implementation Lessons Learned.
  • Toward Trustworthy Blockchain-as-a-Service with Auditing.
  • Consistency of Proof-of-Stake Blockchains with Concurrent Honest Slot Leaders.
  • LVQ: A Lightweight Verifiable Query Approach for Transaction History in Bitcoin.
  • A Study on Nine Years of Bitcoin Transactions: Understanding Real-world Behaviors of Bitcoin Miners and Users.
  • On Exploiting Transaction Concurrency To Speed Up Blockchains.

FC

2020

  • Leveraging Bitcoin Testnet for Bidirectional Botnet Command and Control Systems.
  • Security Analysis on dBFT Protocol of NEO.
  • Selfish Mining Re-Examined.
  • Fairness and Efficiency in DAG-Based Cryptocurrencies.
  • Stake Shift in Major Cryptocurrencies: An Empirical Study.
  • Coded Merkle Tree: Solving Data Availability Attacks in Blockchains.
  • Decentralized Privacy-Preserving Netting Protocol on Blockchain for Payment Systems.
  • The Arwen Trading Protocols.
  • SoK: A Classification Framework for Stablecoin Designs.
  • SoK: Layer-Two Blockchain Protocols.
  • MicroCash: Practical Concurrent Processing of Micropayments.
  • LockDown: Balance Availability Attack Against Lightning Network Channels.
  • Ride the Lightning: The Game Theory of Payment Channels.
  • How to Profit from Payments Channels.
  • Boomerang: Redundancy Improves Latency and Throughput in Payment-Channel Networks.
  • DLSAG: Non-interactive Refund Transactions for Interoperable Payment Channels in Monero.
  • Cerberus Channels: Incentivizing Watchtowers for Bitcoin.
  • Zether: Towards Privacy in a Smart Contract World.
  • RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security.
  • Non-interactive Proofs of Proof-of-Work.
  • Proof-of-Burn.
  • Non-interactive Cryptographic Timestamping Based on Verifiable Delay Functions.
  • Open Market or Ghost Town? The Curious Case of OpenBazaar.
  • Exploring the Monero Peer-to-Peer Network.
  • Surviving the Cryptojungle: Perception and Management of Risk Among North American Cryptocurrency (Non)Users.
  • Address Clustering Heuristics for Ethereum.
  • What are the Actual Flaws in Important Smart Contracts (And How Can We Find Them)?.
  • Characterizing Code Clones in the Ethereum Smart Contract Ecosystem.
  • Smart Contracts for Government Processes: Case Study and Prototype Implementation (Short Paper).

ACM AFT

2020

  • Streamlet: Textbook Streamlined Blockchains.
  • Single Secret Leader Election.
  • Wendy, the Good Little Fairness Widget: Achieving Order Fairness for Blockchains.
  • How to Pick Your Friends A Game Theoretic Approach to P2P Overlay Construction.
  • Defending Against Malicious Reorgs in Tezos Proof-of-Stake.
  • Stablecoins 2.0: Economic Foundations and Risk-based Models.
  • Improved Price Oracles: Constant Function Market Makers.
  • DeFi Protocols for Loanable Funds: Interest Rates, Liquidity and Market Efficiency.
  • Efficient MDP Analysis for Selfish-Mining in Blockchains.
  • A Gas-Efficient Superlight Bitcoin Client in Solidity.
  • SmartOTPs: An Air-Gapped 2-Factor Authentication for Smart-Contract Wallets.
  • FastPay: High-Performance Byzantine Fault Tolerant Settlement.
  • Asynchronous Byzantine Agreement in Incomplete Networks.
  • Winkle: Foiling Long-Range Attacks in Proof-of-Stake Systems.
  • Flood & Loot: A Systemic Attack on The Lightning Network.
  • Counting Down Thunder: Timing Attacks on Privacy in Payment Channel Networks.
  • Route Hijacking and DoS in Off-Chain Networks.
  • Encrypted Blockchain Databases.
  • Privacy-preserving auditable token payments in a permissioned blockchain system.

ACM CCS

2019

  • HyperService: Interoperability and Programmability Across Heterogeneous Blockchains.
  • MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol.
  • Prism: Deconstructing the Blockchain to Approach Physical Limits.
  • Atomic Multi-Channel Updates with Constant Collateral in Bitcoin-Compatible Payment-Channel Networks.
  • Erlay: Efficient Transaction Relay for Bitcoin.
  • Power Adjusting and Bribery Racing: Novel Mining Attacks in the Bitcoin System.
  • Balance: Dynamic Adjustment of Cryptocurrency Deposits.
  • TokenScope: Automatically Detecting Inconsistent Behaviors of Cryptocurrency Tokens in Ethereum.
  • Tesseract: Real-Time Cryptocurrency Exchange Using Trusted Hardware.
  • zkay: Specifying and Enforcing Data Privacy in Smart Contracts.
  • Privacy Aspects and Subliminal Channels in Zcash.
  • POIROT: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting.
  • Effective and Light-Weight Deobfuscation and Semantic-Aware Attack Detection for PowerShell Scripts.
  • MalMax: Multi-Aspect Execution for Automated Dynamic Web Server Malware Analysis.
  • Efficient Publicly Verifiable 2PC over a Blockchain with Applications to Financially-Secure Computations.
  • Omniring: Scaling Up Private Payments Without Trusted Setup — Formal Foundations and a Construction of Ring Confidential Transactions with Log-size Proofs.
  • Learning to Fuzz from Symbolic Execution with Application to Smart Contracts.
  • SAMPL: Scalable Auditability of Monitoring Processes using Public Ledgers.
  • Atomic Multi-Channel Updates with Constant Collateral in Payment-Channel Networks.
  • Poster: A Proof-of-Stake (PoS) Blockchain Protocol using Fair and Dynamic Sharding Management.
  • Poster: A Reliable and Accountable Privacy-Preserving Federated Learning Framework using the Blockchain.

IEEE S&P

2019

  • Perun: Virtual Payment Hubs over Cryptocurrencies.
  • Redactable Blockchain in the Permissionless Setting.
  • Proof-of-Stake Sidechains.
  • Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake.
  • Lay Down the Common Metrics: Evaluating Proof-of-Work Consensus Protocols' Security.
  • XCLAIM: Trustless, Interoperable, Cryptocurrency-Backed Assets.
  • Blind Certificate Authorities.
  • Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash?

USENIX Security

2019

  • BITE: Bitcoin Lightweight Client Privacy using Trusted Execution
  • FastKitten: Practical Smart Contracts on Bitcoin
  • StrongChain: Transparent and Collaborative Proof-of-Work Consensus
  • Tracing Transactions Across Cryptocurrency Ledgers
  • The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts
  • The Anatomy of a Cryptocurrency Pump-and-Dump Scheme
  • Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale

NDSS

2019

  • SABRE: Protecting Bitcoin against Routing Attacks.
  • A Treasury System for Cryptocurrencies: Enabling Better Collaborative Intelligence.
  • Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based.
  • YODA: Enabling computationally intensive contracts on blockchains with Byzantine and Selfish nodes.
  • Giving State to the Stateless: Augmenting Trustworthy Computation with Ledgers.
  • Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web.
  • Vault: Fast Bootstrapping for the Algorand Cryptocurrency.
  • Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks.
  • Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability Constructing an Adversary Solver for Equihash.
  • Privacy-preserving Multi-hop Locks for Blockchain Scalability and Interoperability.

ESORICS

2019

  • Incentives for Harvesting Attack in Proof of Work Mining Pools.
  • A Lattice-Based Linkable Ring Signature Supporting Stealth Addresses.
  • Annotary: A Concolic Execution System for Developing Secure Smart Contracts.
  • PDFS: Practical Data Feed Service for Smart Contracts.
  • Towards a Marketplace for Secure Outsourced Computations.

PODC

2019

  • Self-Stabilizing Leader Election.
  • Coded State Machine - Scaling State Machine Execution under Byzantine Faults.
  • Exact Byzantine Consensus on Undirected Graphs under Local Broadcast Model.
  • Asymptotically Optimal Validated Asynchronous Byzantine Agreement.
  • The Consensus Number of a Cryptocurrency.
  • Communication Complexity of Byzantine Agreement, Revisited.
  • HotStuff: BFT Consensus with Linearity and Responsiveness.
  • Fault Tolerant Gradient Clock Synchronization.
  • Bootstrapping Public Blockchains Without a Trusted Setup.

ICDCS

2019

  • OptChain: Optimal Transactions Placement for Scalable Blockchain Sharding.
  • Fast Fault-Tolerant Sampling via Random Walk in Dynamic Networks.
  • ezBFT: Decentralizing Byzantine Fault-Tolerant State Machine Replication.
  • Partitioning Attacks on Bitcoin: Colliding Space, Time, and Logic.
  • Selfish Mining in Ethereum.
  • Jidar: A Jigsaw-like Data Reduction Approach Without Trust Assumptions for Bitcoin System.
  • Hierarchical Edge-Cloud Computing for Mobile Blockchain Mining Game.
  • ParBlockchain: Leveraging Transaction Parallelism in Permissioned Blockchain Systems.
  • B-IoT: Blockchain Driven Internet of Things with Credit-Based Consensus Mechanism.
  • Trust Mends Blockchains: Living up to Expectations.
  • DataEther: Data Exploration Framework For Ethereum.

FC

2019

  • Biased Nonce Sense: Lattice Attacks Against Weak ECDSA Signatures in Cryptocurrencies.
  • Snow White: Robustly Reconfigurable Consensus and Applications to Provably Secure Proof of Stake.
  • Compounding of Wealth in Proof-of-Stake Cryptocurrencies.
  • Short Paper: I Can't Believe It's Not Stake! Resource Exhaustion Attacks on PoS.
  • Short Paper: An Exploration of Code Diversity in the Cryptocurrency Landscape.
  • Short Paper: An Empirical Analysis of Blockchain Forks in Bitcoin.
  • Detecting Token Systems on Ethereum.
  • Measuring Ethereum-Based ERC20 Token Networks.
  • New Empirical Traceability Analysis of CryptoNote-Style Blockchains.
  • Short Paper: An Empirical Analysis of Monero Cross-chain Traceability.
  • PRCash: Fast, Private and Regulated Transactions for Digital Currencies.
  • ZLiTE: Lightweight Clients for Shielded Zcash Transactions Using Trusted Execution.
  • Designed to Be Broken: A Reverse Engineering Study of the 3D Secure 2.0 Payment Protocol.
  • Short Paper: Making Contactless EMV Robust Against Rogue Readers Colluding with Relay Attackers.
  • Short Paper: How to Attack PSD2 Internet Banking.
  • Your Money or Your Life - Modeling and Analyzing the Security of Electronic Payment in the UC Framework.
  • Oblivious PRF on Committed Vector Inputs and Application to Deduplication of Encrypted Data.
  • Short Paper: The Proof is in the Pudding - Proofs of Work for Solving Discrete Logarithms.
  • Minimizing Trust in Hardware Wallets with Two Factor Signatures.
  • A Formal Treatment of Hardware Wallets.
  • VeriSolid: Correct-by-Design Smart Contracts for Ethereum.
  • Bitcoin Security Under Temporary Dishonest Majority.
  • VAPOR: A Value-Centric Blockchain that is Scale-out, Decentralized, and Flexible by Design.
  • Sprites and State Channels: Payment Networks that Go Faster Than Lightning.
  • Echoes of the Past: Recovering Blockchain Metrics from Merged Mining.
  • TxProbe: Discovering Bitcoin's Network Topology Using Orphan Transactions.
  • Forecasting Suspicious Account Activity at Large-Scale Online Service Providers.
  • Thinking Like a Fraudster: Detecting Fraudulent Transactions via Statistical Sequential Features.
  • Secure Multiparty PageRank Algorithm for Collaborative Fraud Detection.

ACM AFT

2019

  • Paralysis Proofs: Secure Dynamic Access Structures for Cryptocurrency Custody and More.
  • Pisa: Arbitration Outsourcing for State Channels.
  • Outpost: A Responsive Lightweight Watchtower.
  • SoK: Sharding on Blockchain.
  • On the optionality and fairness of Atomic Swaps.
  • Spams meet Cryptocurrencies: Sextortion in the Bitcoin Ecosystem.
  • Competing (Semi-)Selfish Miners in Bitcoin.
  • Impossibility of Full Decentralization in Permissionless Blockchains.
  • An Axiomatic Approach to Block Rewards.
  • Semi-Quantum Money.
  • Quantum Algorithms for Portfolio Optimization.
  • Libra: Fair Order-Matching for Electronic Financial Exchanges.
  • An Eye for an Eye: Economics of Retaliation in Mining Pools.
  • SoK: Consensus in the Age of Blockchains.
  • Kadcast: A Structured Approach to Broadcast in Blockchain Networks.
  • Aleph: Efficient Atomic Broadcast in Asynchronous Networks with Byzantine Nodes.

Blockchain Lab

Blockchain People

Blockchain Project

Blockchain Book

Blockchain Other