Papers By Topic

Topic: Crimes

  1. A Lightweight IoT Cryptojacking Detection Mechanism in Heterogeneous Smart Home Networks
  2. SoK: Mitigation of Front-running in Decentralized Finance
  3. SoK: Cryptojacking Malware
  4. Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams
  5. Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale
  6. Dine and Dash: Static, Dynamic, and Economic Analysis of In-Browser Cryptojacking
  7. Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web
  8. Assessing the Threat of Blockchain-based Botnets
  9. The Economics of Cryptocurrency Pump and Dump Schemes
  10. Sex, drugs, and bitcoin: How much illegal activity is financed through cryptocurrencies?
  11. Ransomware payments in the Bitcoin ecosystem
  12. MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense
  13. Digging into Browser-based Crypto Mining
  14. COINHOARDER: Tracking a Ukrainian Bitcoin Phishing Ring DNS Style
  15. Analyzing the Bitcoin Ponzi Scheme Ecosystem
  16. Stressing Out: Bitcoin 'Stress Testing'
  17. Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin
  18. How Did Dread Pirate Roberts Acquire and Protect His Bitcoin Wealth?

Topic: DApps

  1. Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications
  2. As Strong As Its Weakest Link: How to Break Blockchain DApps at RPC Service

Topic: Deanonymization / Privacy

  1. How to Peel a Million: Validating and Expanding Bitcoin Clusters
  2. The Complex Shape of Anonymity in Cryptocurrencies: Case Studies from a Systematic Approach
  3. Resurrecting Address Clustering in Bitcoin
  4. PERIMETER: A network-layer attack on the anonymity of cryptocurrencies
  5. Everything You Ever Wanted to Know About Bitcoin Mixers
  6. Cross-Layer Deanonymization Methods in the Lightning Protocol
  7. An Empirical Analysis of Privacy in the Lightning Network
  8. Address clustering heuristics for Ethereum
  9. Privacy Aspects and Subliminal Channels in Zcash
  10. New Empirical Traceability Analysis of CryptoNote-Style Blockchains
  11. An Empirical Analysis of Monero Cross-Chain Traceability
  12. Could Network Information Facilitate Address Clustering in Bitcoin?
  13. Join Me on a Market for Anonymity
  14. A Fistful of Bitcoins: Characterizing Payments Among Men with No Names

Topic: Decentralized Systems

  1. An empirical study of two Bitcoin artifacts through deep learning
  2. What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network
  3. Timelocked Bribing
  4. SyncAttack: Double-spending in Bitcoin Without Mining Power
  5. Selfish & opaque transaction ordering in the Bitcoin blockchain: the case for chain neutrality
  6. Revisiting Nakamoto Consensus in Asynchronous Networks: A Comprehensive Analysis of Bitcoin Safety and Chain Quality
  7. On the Routing-Aware Peering against Network-Eclipse Attacks in Bitcoin
  8. How Does Blockchain Security Dictate Blockchain Implementation?
  9. Frontrunner Jones and the Raiders of the Dark Forest: An Empirical Study of Frontrunning on the Ethereum Blockchain
  10. DETER: Denial of Ethereum Txpool sERvices
  11. ConFuzzius: A Data Dependency-Aware Hybrid Fuzzer for Smart Contracts
  12. A Security Framework for Distributed Ledgers
  13. TXSPECTOR: Uncovering Attacks in Ethereum from Transactions
  14. Stake Shift in Major Cryptocurrencies: An Empirical Study
  15. Security Analysis on dBFT protocol of NEO
  16. Revisiting Transactional Statistics of High-scalability Blockchain
  17. Remote Side-Channel Attacks on Anonymous Transactions
  18. Leveraging Bitcoin Testnet for Bidirectional Botnet Command and Control Systems
  19. Exploring the Monero Peer-to-Peer Network
  20. A new wolf in town? Pump-and-dump manipulation in cryptocurrency markets
  21. An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem
  22. TokenScope: Automatically Detecting Inconsistent Behaviors of Cryptocurrency Tokens in Ethereum
  23. The Anatomy of a Cryptocurrency Pump-and-Dump Scheme
  24. Power Adjusting and Bribery Racing: Novel Mining Attacks in the Bitcoin System
  25. Measuring Ethereum-based ERC20 Token Networks
  26. I Can't Believe It's Not Stake! Resource Exhaustion Attacks on PoS
  27. Echoes of the Past: Recovering Blockchain Metrics From Merged Mining
  28. Coded Merkle Tree: Solving Data Availability Attacks in Blockchains
  29. Broken Metre: Attacking Resource Metering in EVM
  30. Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash?
  31. Bitcoin Security under Temporary Dishonest Majority
  32. BDoS: Blockchain Denial-of-Service
  33. An Exploration of Code Diversity in the Cryptocurrency Landscape
  34. An Empirical Analysis of Blockchain Forks in Bitcoin
  35. A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network
  36. TxProbe: Discovering Bitcoin's Network Topology Using Orphan Transactions
  37. Tracing Transactions Across Cryptocurrency Ledgers
  38. SABRE: Protecting Bitcoin against Routing Attacks
  39. Measuring Ethereum Network Peers
  40. Hostile Blockchain Takeovers
  41. Exploiting Transaction Accumulation and Double Spends for Topology Inference in Bitcoin
  42. Detecting Token Systems on Ethereum
  43. Decentralization in Bitcoin and Ethereum Networks
  44. Analyzing Ethereum's Contract Topology
  45. Analysis of the Bitcoin UTXO set
  46. An Empirical Analysis of Anonymity in Zcash
  47. A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin
  48. Measuring Profitability of Alternative Crypto-currencies
  49. Incentivizing Double-Spend Collusion in Bitcoin
  50. Blockchain explorer: An analytical process and investigation environment for bitcoin
  51. BlockSci: Design and applications of a blockchain analysis platform
  52. Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin
  53. An analysis of Bitcoin OP_RETURN metadata
  54. Why buy when you can rent? Bribery attacks on Bitcoin-style consensus
  55. Hijacking Bitcoin: Routing Attacks on Cryptocurrencies
  56. ZombieCoin: Powering Next-Generation Botnets with Bitcoin
  57. Trends, Tips, Tolls: A Longitudinal Study of Bitcoin Transaction Fees
  58. Towards Risk Scoring of Bitcoin Transactions
  59. The Bitcoin P2P network
  60. Rational Zero: Economic Security for Zerocoin with Everlasting Anonymity
  61. Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem
  62. Challenges and Opportunities Associated with a Bitcoin-based Transaction Rating System

Topic: Defi

  1. Speculative Multipliers on DeFi: Quantifying On-Chain Leverage Risks
  2. On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols
  3. How to Exploit a DeFi Project
  4. Formal Analysis of Composable DeFi Protocols
  5. An empirical study of DeFi liquidations: incentives, risks, and instabilities
  6. Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit

Topic: Digital ID

  1. India's 'Aadhaar' Biometric ID: Structure, Security, and Vulnerabilities
  2. Real Hidden Identity-Based Signatures
  3. An efficient self-blindable attribute-based credential scheme

Topic: Economics

  1. The Case for Variable Fees in Constant Product Markets: An Agent Based Simulation
  2. An Empirical Study of Market Inefficiencies in Uniswap and SushiSwap
  3. A Short Survey on Business Models of Decentralized Finance
  4. Understand Volatility of Algorithmic Stablecoin: Modeling, Verification and Empirical Analysis
  5. Out of the Dark: The Effect of Law Enforcement Actions on Cryptocurrency Market Prices
  6. Measuring Asset Composability as a Proxy for Ecosystem Integration
  7. Disentangling Decentralized Finance (DeFi) Compositions
  8. Why Bitcoin will Fail to Scale?
  9. Price Manipulation in the Bitcoin Ecosystem
  10. The Bitcoin Market Potential Index

Topic: Exchanges

  1. Cyclic Arbitrage in Decentralized Exchange Markets
  2. Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability
  3. Identifying the Arbitrageurs on Mt. Gox: First Insights from the Leaked Dataset
  4. Determining an Optimal Threshold on the Online Reserves of a Bitcoin Exchange
  5. The Impact of DDoS and Other Security Shocks on Bitcoin Currency Exchanges: Evidence from Mt. Gox
  6. Exchange Pattern Mining in the Bitcoin Transaction Directed Hypergraph

Topic: Initial Coin Offerings (ICOs)

  1. Rust, but verify: The economics of scams in initial coin offerings
  2. The rise and fall of cryptocurrencies

Topic: Layer-Two Protocols

  1. A Centrality Analysis of the Lightning Network
  2. Analysis and Probing of Parallel Channels in the Lightning Network
  3. SoK: Layer-Two Blockchain Protocols
  4. LockDown: Balance Availability Attack against Lightning Network Channels
  5. Congestion Attacks in Payment Channel Networks
  6. How to profit from payments channels

Topic: Legal, Public Policy and Governance

  1. Centralized Governance in Decentralized Finance
  2. Virtual currencies and fundamental rights
  3. Bitcoin redux
  4. Egalitarian Society or Benevolent Dictatorship: The State of Cryptocurrency Governance
  5. Cryptographic Currencies from a Tech-Policy Perspective: Key Policy Issues and Technical Directions
  6. Bitcoin: A First Legal Analysis - with Reference to German and American Law

Topic: Mining

  1. Extracting Godl [sic] from the Salt Mines: Ethereum Miners Extracting Value
  2. Selfish Mining Attacks Exacerbated by Elastic Hash Supply
  3. Selfish Mining Re-Examined
  4. Diversification Across Mining Pools: Optimal Mining Strategies under PoW
  5. A Deep Dive into Bitcoin Mining Pools An Empirical Analysis of Mining Shares
  6. When Bitcoin Mining Pools Run Dry: A Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining Pools
  7. Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools

Topic: New Systems and Protocols

  1. ZeeStar: Private Smart Contracts by Homomorphic Encryption and Zero-knowledge Proofs
  2. Universal Atomic Swaps: Secure Exchange of Coins Across All Blockchains
  3. Speeding Dumbo: Pushing Asynchronous BFT Closer to Practice
  4. Shaduf: Non-Cycle Payment Channel Rebalancing
  5. MatRiCT+: More Efficient Post-Quantum Private Blockchain Payments
  6. Foundations of Dynamic BFT
  7. COBRA: Dynamic Proactive Secret Sharing for Confidential BFT Services
  8. VerLoc: Verifiable Localization in Decentralized Systems
  9. Using Throughput-Centric Byzantine Broadcast to Tolerate Malicious Majority in Blockchains
  10. Kicking-the-Bucket: Fast Privacy-Preserving Trading Using Buckets
  11. Differential Privacy in Constant Function Market Makers
  12. Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing

Topic: Protocols

  1. Multi-Certificate Attacks against Proof-of-Elapsed-Time and Their Countermeasures
  2. Suborn Channels: Incentives Against Timelock Bribes
  3. Arbitrage attack: Miners of the world, unite!
  4. Under the Hood of the Ethereum Gossip Protocol
  5. Three Attacks on Proof-of-Stake Ethereum
  6. SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Reinforcement Learning
  7. Securing Parallel-chain Protocols under Variable Mining Power
  8. Maximizing Extractable Value from Automated Market Makers
  9. Be Aware of Your Leaders
  10. Pricing Security in Proof-of-Work Systems
  11. NC-Max: Breaking the Security-Performance Tradeoff in Nakamoto Consensus
  12. Everything is a Race and Nakamoto Always Wins
  13. BFT Protocol Forensics
  14. The Attack of the Clones Against Proof-of-Authority
  15. Replay Attacks and Defenses Against Cross-shard Consensus in Sharded Distributed Ledgers
  16. Lay Down the Common Metrics: Evaluating Proof-of-Work Consensus Protocols' Security
  17. The Gap Game
  18. A better method to analyze blockchain consistency
  19. Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services
  20. Refund Attacks on Bitcoin's Payment Protocol
  21. On the Security and Performance of Proof of Work Blockchains
  22. On the Instability of Bitcoin Without the Block Reward
  23. On the Malleability of Bitcoin Transactions
  24. Issues in Designing a Bitcoin-Like Community Currency

Topic: Security and Measurement

  1. Multi-Certificate Attacks against Proof-of-Elapsed-Time and Their Countermeasures
  2. An empirical study of two Bitcoin artifacts through deep learning
  3. The Case for Variable Fees in Constant Product Markets: An Agent Based Simulation
  4. Suborn Channels: Incentives Against Timelock Bribes
  5. Speculative Multipliers on DeFi: Quantifying On-Chain Leverage Risks
  6. Rust, but verify: The economics of scams in initial coin offerings
  7. India's 'Aadhaar' Biometric ID: Structure, Security, and Vulnerabilities
  8. How to Peel a Million: Validating and Expanding Bitcoin Clusters
  9. Extracting Godl [sic] from the Salt Mines: Ethereum Miners Extracting Value
  10. Arbitrage attack: Miners of the world, unite!
  11. An Empirical Study of Market Inefficiencies in Uniswap and SushiSwap
  12. A Short Survey on Business Models of Decentralized Finance
  13. A Lightweight IoT Cryptojacking Detection Mechanism in Heterogeneous Smart Home Networks
  14. A Centrality Analysis of the Lightning Network
  15. What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network
  16. Under the Hood of the Ethereum Gossip Protocol
  17. Understand Volatility of Algorithmic Stablecoin: Modeling, Verification and Empirical Analysis
  18. Timelocked Bribing
  19. Three Attacks on Proof-of-Stake Ethereum
  20. The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts
  21. The Exact Security of BIP32 Wallets
  22. The Complex Shape of Anonymity in Cryptocurrencies: Case Studies from a Systematic Approach
  23. SyncAttack: Double-spending in Bitcoin Without Mining Power
  24. SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Reinforcement Learning
  25. SoK: Mitigation of Front-running in Decentralized Finance
  26. SoK: Cryptojacking Malware
  27. SmartPulse: Automated Checking of Temporal Properties in Smart Contracts
  28. Smart Contract Vulnerabilities: Vulnerable Does Not Imply Exploited
  29. SmarTest: Effectively Hunting Vulnerable Transaction Sequences in Smart Contracts through Language Model-Guided Symbolic Execution
  30. Selfish & opaque transaction ordering in the Bitcoin blockchain: the case for chain neutrality
  31. Selfish Mining Attacks Exacerbated by Elastic Hash Supply
  32. Securing Parallel-chain Protocols under Variable Mining Power
  33. SGUARD: Towards Fixing Vulnerable Smart Contracts Automatically
  34. SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds
  35. Revisiting Nakamoto Consensus in Asynchronous Networks: A Comprehensive Analysis of Bitcoin Safety and Chain Quality
  36. Resurrecting Address Clustering in Bitcoin
  37. Quantifying Blockchain Extractable Value: How dark is the forest?
  38. PERIMETER: A network-layer attack on the anonymity of cryptocurrencies
  39. Out of the Dark: The Effect of Law Enforcement Actions on Cryptocurrency Market Prices
  40. On the Routing-Aware Peering against Network-Eclipse Attacks in Bitcoin
  41. On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols
  42. Measuring Asset Composability as a Proxy for Ecosystem Integration
  43. Maximizing Extractable Value from Automated Market Makers
  44. MAD-HTLC: Because HTLC is Crazy-Cheap to Attack
  45. How to Exploit a DeFi Project
  46. How Does Blockchain Security Dictate Blockchain Implementation?
  47. Frontrunner Jones and the Raiders of the Dark Forest: An Empirical Study of Frontrunning on the Ethereum Blockchain
  48. Formal Analysis of Composable DeFi Protocols
  49. Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications
  50. Everything You Ever Wanted to Know About Bitcoin Mixers
  51. EOSAFE: Security Analysis of EOSIO Smart Contracts
  52. Disentangling Decentralized Finance (DeFi) Compositions
  53. DETER: Denial of Ethereum Txpool sERvices
  54. Cyclic Arbitrage in Decentralized Exchange Markets
  55. Cross-Layer Deanonymization Methods in the Lightning Protocol
  56. ConFuzzius: A Data Dependency-Aware Hybrid Fuzzer for Smart Contracts
  57. Compositional Security for Reentrant Applications
  58. Centralized Governance in Decentralized Finance
  59. Be Aware of Your Leaders
  60. As Strong As Its Weakest Link: How to Break Blockchain DApps at RPC Service
  61. An empirical study of DeFi liquidations: incentives, risks, and instabilities
  62. Analysis and Probing of Parallel Channels in the Lightning Network
  63. A Security Framework for Distributed Ledgers
  64. eThor: Practical and Provably Sound Static Analysis of Ethereum Smart Contracts
  65. VerX: Safety Verification of Smart Contracts
  66. TXSPECTOR: Uncovering Attacks in Ethereum from Transactions
  67. Surviving the Cryptojungle: Perception and Management of Risk Among North American Cryptocurrency (Non)Users
  68. Stake Shift in Major Cryptocurrencies: An Empirical Study
  69. SoK: Layer-Two Blockchain Protocols
  70. Semantic Understanding of Smart Contracts: Executable Operational Semantics of Solidity
  71. Selfish Mining Re-Examined
  72. Security Analysis on dBFT protocol of NEO
  73. Revisiting Transactional Statistics of High-scalability Blockchain
  74. Remote Side-Channel Attacks on Anonymous Transactions
  75. Pricing Security in Proof-of-Work Systems
  76. NC-Max: Breaking the Security-Performance Tradeoff in Nakamoto Consensus
  77. LockDown: Balance Availability Attack against Lightning Network Channels
  78. Leveraging Bitcoin Testnet for Bidirectional Botnet Command and Control Systems
  79. Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability
  80. Exploring the Monero Peer-to-Peer Network
  81. Everything is a Race and Nakamoto Always Wins
  82. EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts
  83. ETHBMC: A Bounded Model Checker for Smart Contracts
  84. Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams
  85. Congestion Attacks in Payment Channel Networks
  86. BFT Protocol Forensics
  87. Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit
  88. A new wolf in town? Pump-and-dump manipulation in cryptocurrency markets
  89. An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem
  90. An Empirical Analysis of Privacy in the Lightning Network
  91. Address clustering heuristics for Ethereum
  92. Why Bitcoin will Fail to Scale?
  93. What are the Actual Flaws in Important Smart Contracts (and How Can We Find Them)?
  94. Virtual currencies and fundamental rights
  95. VeriSmart: A Highly Precise Safety Verifier for Ethereum Smart Contracts
  96. TokenScope: Automatically Detecting Inconsistent Behaviors of Cryptocurrency Tokens in Ethereum
  97. The Attack of the Clones Against Proof-of-Authority
  98. The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts
  99. The Anatomy of a Cryptocurrency Pump-and-Dump Scheme
  100. Replay Attacks and Defenses Against Cross-shard Consensus in Sharded Distributed Ledgers
  101. Privacy Aspects and Subliminal Channels in Zcash
  102. Power Adjusting and Bribery Racing: Novel Mining Attacks in the Bitcoin System
  103. New Empirical Traceability Analysis of CryptoNote-Style Blockchains
  104. Minimizing Trust in Hardware Wallets with Two Factor Signatures
  105. Measuring Ethereum-based ERC20 Token Networks
  106. MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol
  107. Lay Down the Common Metrics: Evaluating Proof-of-Work Consensus Protocols' Security
  108. Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale
  109. I Can't Believe It's Not Stake! Resource Exhaustion Attacks on PoS
  110. HyperService: Interoperability and Programmability Across Heterogeneous Blockchains
  111. How to profit from payments channels
  112. Echoes of the Past: Recovering Blockchain Metrics From Merged Mining
  113. Diversification Across Mining Pools: Optimal Mining Strategies under PoW
  114. Dine and Dash: Static, Dynamic, and Economic Analysis of In-Browser Cryptojacking
  115. Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web
  116. Coded Merkle Tree: Solving Data Availability Attacks in Blockchains
  117. Characterizing Code Clones in the Ethereum Smart Contract Ecosystem
  118. Broken Metre: Attacking Resource Metering in EVM
  119. Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash?
  120. Bitcoin redux
  121. Bitcoin Security under Temporary Dishonest Majority
  122. BDoS: Blockchain Denial-of-Service
  123. Assessing the Threat of Blockchain-based Botnets
  124. An Exploration of Code Diversity in the Cryptocurrency Landscape
  125. An Empirical Analysis of Blockchain Forks in Bitcoin
  126. A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network
  127. A Formal Treatment of Hardware Wallets
  128. A Formal Treatment of Deterministic Wallets
  129. A Deep Dive into Bitcoin Mining Pools An Empirical Analysis of Mining Shares
  130. Identifying the Arbitrageurs on Mt. Gox: First Insights from the Leaked Dataset
  131. teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts
  132. ZEUS: Analyzing Safety of Smart Contracts
  133. TxProbe: Discovering Bitcoin's Network Topology Using Orphan Transactions
  134. Tracing Transactions Across Cryptocurrency Ledgers
  135. The rise and fall of cryptocurrencies
  136. The Gap Game
  137. The Economics of Cryptocurrency Pump and Dump Schemes
  138. Smart Contracts for Bribing Miners
  139. Sex, drugs, and bitcoin: How much illegal activity is financed through cryptocurrencies?
  140. Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks
  141. SECURIFY: Practical Security Analysis of Smart Contracts
  142. SABRE: Protecting Bitcoin against Routing Attacks
  143. Ransomware payments in the Bitcoin ecosystem
  144. MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense
  145. Measuring Ethereum Network Peers
  146. Hostile Blockchain Takeovers
  147. Exploiting Transaction Accumulation and Double Spends for Topology Inference in Bitcoin
  148. Erays: Reverse Engineering Ethereum's Opaque Smart Contracts
  149. Egalitarian Society or Benevolent Dictatorship: The State of Cryptocurrency Governance
  150. Digging into Browser-based Crypto Mining
  151. Determining an Optimal Threshold on the Online Reserves of a Bitcoin Exchange
  152. Detecting Token Systems on Ethereum
  153. Decentralization in Bitcoin and Ethereum Networks
  154. COINHOARDER: Tracking a Ukrainian Bitcoin Phishing Ring DNS Style
  155. Analyzing the Bitcoin Ponzi Scheme Ecosystem
  156. Analyzing Ethereum's Contract Topology
  157. Analysis of the Bitcoin UTXO set
  158. An Empirical Analysis of Monero Cross-Chain Traceability
  159. An Empirical Analysis of Anonymity in Zcash
  160. A better method to analyze blockchain consistency
  161. A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin
  162. Measuring Profitability of Alternative Crypto-currencies
  163. Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services
  164. The Impact of DDoS and Other Security Shocks on Bitcoin Currency Exchanges: Evidence from Mt. Gox
  165. Smart Contracts Make Bitcoin Mining Pools Vulnerable
  166. Real Hidden Identity-Based Signatures
  167. Price Manipulation in the Bitcoin Ecosystem
  168. Incentivizing Double-Spend Collusion in Bitcoin
  169. Exchange Pattern Mining in the Bitcoin Transaction Directed Hypergraph
  170. Designing Secure Ethereum Smart Contracts: A Finite State Machine Based Approach
  171. Could Network Information Facilitate Address Clustering in Bitcoin?
  172. Blockchain explorer: An analytical process and investigation environment for bitcoin
  173. BlockSci: Design and applications of a blockchain analysis platform
  174. Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin
  175. An efficient self-blindable attribute-based credential scheme
  176. An analysis of Bitcoin OP_RETURN metadata
  177. Why buy when you can rent? Bribery attacks on Bitcoin-style consensus
  178. The Ring of Gyges: Investigating the Future of Criminal Smart Contracts
  179. The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy
  180. The Bitcoin Brain Drain: A Short Paper on the Use and Abuse of Bitcoin Brain Wallets
  181. Stressing Out: Bitcoin 'Stress Testing'
  182. Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab
  183. Refund Attacks on Bitcoin's Payment Protocol
  184. On the Security and Performance of Proof of Work Blockchains
  185. On the Instability of Bitcoin Without the Block Reward
  186. Making Smart Contracts Smarter
  187. Join Me on a Market for Anonymity
  188. Hijacking Bitcoin: Routing Attacks on Cryptocurrencies
  189. Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin
  190. ZombieCoin: Powering Next-Generation Botnets with Bitcoin
  191. When Bitcoin Mining Pools Run Dry: A Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining Pools
  192. On the Malleability of Bitcoin Transactions
  193. Issues in Designing a Bitcoin-Like Community Currency
  194. Cryptographic Currencies from a Tech-Policy Perspective: Key Policy Issues and Technical Directions
  195. Trends, Tips, Tolls: A Longitudinal Study of Bitcoin Transaction Fees
  196. Towards Risk Scoring of Bitcoin Transactions
  197. The Bitcoin P2P network
  198. The Bitcoin Market Potential Index
  199. Rational Zero: Economic Security for Zerocoin with Everlasting Anonymity
  200. How Did Dread Pirate Roberts Acquire and Protect His Bitcoin Wealth?
  201. Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools
  202. Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem
  203. Challenges and Opportunities Associated with a Bitcoin-based Transaction Rating System
  204. Bitcoin: A First Legal Analysis - with Reference to German and American Law
  205. A Fistful of Bitcoins: Characterizing Payments Among Men with No Names

Topic: Smart Contracts

  1. The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts
  2. SmartPulse: Automated Checking of Temporal Properties in Smart Contracts
  3. Smart Contract Vulnerabilities: Vulnerable Does Not Imply Exploited
  4. SmarTest: Effectively Hunting Vulnerable Transaction Sequences in Smart Contracts through Language Model-Guided Symbolic Execution
  5. SGUARD: Towards Fixing Vulnerable Smart Contracts Automatically
  6. SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds
  7. Quantifying Blockchain Extractable Value: How dark is the forest?
  8. MAD-HTLC: Because HTLC is Crazy-Cheap to Attack
  9. EOSAFE: Security Analysis of EOSIO Smart Contracts
  10. Compositional Security for Reentrant Applications
  11. eThor: Practical and Provably Sound Static Analysis of Ethereum Smart Contracts
  12. VerX: Safety Verification of Smart Contracts
  13. Semantic Understanding of Smart Contracts: Executable Operational Semantics of Solidity
  14. EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts
  15. ETHBMC: A Bounded Model Checker for Smart Contracts
  16. What are the Actual Flaws in Important Smart Contracts (and How Can We Find Them)?
  17. VeriSmart: A Highly Precise Safety Verifier for Ethereum Smart Contracts
  18. The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts
  19. MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol
  20. HyperService: Interoperability and Programmability Across Heterogeneous Blockchains
  21. Characterizing Code Clones in the Ethereum Smart Contract Ecosystem
  22. teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts
  23. ZEUS: Analyzing Safety of Smart Contracts
  24. Smart Contracts for Bribing Miners
  25. Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks
  26. SECURIFY: Practical Security Analysis of Smart Contracts
  27. Erays: Reverse Engineering Ethereum's Opaque Smart Contracts
  28. Smart Contracts Make Bitcoin Mining Pools Vulnerable
  29. Designing Secure Ethereum Smart Contracts: A Finite State Machine Based Approach
  30. The Ring of Gyges: Investigating the Future of Criminal Smart Contracts
  31. Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab
  32. Making Smart Contracts Smarter

Topic: Usable Security

  1. Surviving the Cryptojungle: Perception and Management of Risk Among North American Cryptocurrency (Non)Users
  2. The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy

Topic: Wallets

  1. The Exact Security of BIP32 Wallets
  2. Minimizing Trust in Hardware Wallets with Two Factor Signatures
  3. A Formal Treatment of Hardware Wallets
  4. A Formal Treatment of Deterministic Wallets
  5. The Bitcoin Brain Drain: A Short Paper on the Use and Abuse of Bitcoin Brain Wallets