Topic: Crimes
- A Lightweight IoT Cryptojacking Detection Mechanism in Heterogeneous Smart Home Networks
- SoK: Mitigation of Front-running in Decentralized Finance
- SoK: Cryptojacking Malware
- Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams
- Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale
- Dine and Dash: Static, Dynamic, and Economic Analysis of In-Browser Cryptojacking
- Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web
- Assessing the Threat of Blockchain-based Botnets
- The Economics of Cryptocurrency Pump and Dump Schemes
- Sex, drugs, and bitcoin: How much illegal activity is financed through cryptocurrencies?
- Ransomware payments in the Bitcoin ecosystem
- MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense
- Digging into Browser-based Crypto Mining
- COINHOARDER: Tracking a Ukrainian Bitcoin Phishing Ring DNS Style
- Analyzing the Bitcoin Ponzi Scheme Ecosystem
- Stressing Out: Bitcoin 'Stress Testing'
- Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin
- How Did Dread Pirate Roberts Acquire and Protect His Bitcoin Wealth?
Topic: DApps
- Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications
- As Strong As Its Weakest Link: How to Break Blockchain DApps at RPC Service
Topic: Deanonymization / Privacy
- How to Peel a Million: Validating and Expanding Bitcoin Clusters
- The Complex Shape of Anonymity in Cryptocurrencies: Case Studies from a Systematic Approach
- Resurrecting Address Clustering in Bitcoin
- PERIMETER: A network-layer attack on the anonymity of cryptocurrencies
- Everything You Ever Wanted to Know About Bitcoin Mixers
- Cross-Layer Deanonymization Methods in the Lightning Protocol
- An Empirical Analysis of Privacy in the Lightning Network
- Address clustering heuristics for Ethereum
- Privacy Aspects and Subliminal Channels in Zcash
- New Empirical Traceability Analysis of CryptoNote-Style Blockchains
- An Empirical Analysis of Monero Cross-Chain Traceability
- Could Network Information Facilitate Address Clustering in Bitcoin?
- Join Me on a Market for Anonymity
- A Fistful of Bitcoins: Characterizing Payments Among Men with No Names
Topic: Decentralized Systems
- An empirical study of two Bitcoin artifacts through deep learning
- What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network
- Timelocked Bribing
- SyncAttack: Double-spending in Bitcoin Without Mining Power
- Selfish & opaque transaction ordering in the Bitcoin blockchain: the case for chain neutrality
- Revisiting Nakamoto Consensus in Asynchronous Networks: A Comprehensive Analysis of Bitcoin Safety and Chain Quality
- On the Routing-Aware Peering against Network-Eclipse Attacks in Bitcoin
- How Does Blockchain Security Dictate Blockchain Implementation?
- Frontrunner Jones and the Raiders of the Dark Forest: An Empirical Study of Frontrunning on the Ethereum Blockchain
- DETER: Denial of Ethereum Txpool sERvices
- ConFuzzius: A Data Dependency-Aware Hybrid Fuzzer for Smart Contracts
- A Security Framework for Distributed Ledgers
- TXSPECTOR: Uncovering Attacks in Ethereum from Transactions
- Stake Shift in Major Cryptocurrencies: An Empirical Study
- Security Analysis on dBFT protocol of NEO
- Revisiting Transactional Statistics of High-scalability Blockchain
- Remote Side-Channel Attacks on Anonymous Transactions
- Leveraging Bitcoin Testnet for Bidirectional Botnet Command and Control Systems
- Exploring the Monero Peer-to-Peer Network
- A new wolf in town? Pump-and-dump manipulation in cryptocurrency markets
- An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem
- TokenScope: Automatically Detecting Inconsistent Behaviors of Cryptocurrency Tokens in Ethereum
- The Anatomy of a Cryptocurrency Pump-and-Dump Scheme
- Power Adjusting and Bribery Racing: Novel Mining Attacks in the Bitcoin System
- Measuring Ethereum-based ERC20 Token Networks
- I Can't Believe It's Not Stake! Resource Exhaustion Attacks on PoS
- Echoes of the Past: Recovering Blockchain Metrics From Merged Mining
- Coded Merkle Tree: Solving Data Availability Attacks in Blockchains
- Broken Metre: Attacking Resource Metering in EVM
- Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash?
- Bitcoin Security under Temporary Dishonest Majority
- BDoS: Blockchain Denial-of-Service
- An Exploration of Code Diversity in the Cryptocurrency Landscape
- An Empirical Analysis of Blockchain Forks in Bitcoin
- A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network
- TxProbe: Discovering Bitcoin's Network Topology Using Orphan Transactions
- Tracing Transactions Across Cryptocurrency Ledgers
- SABRE: Protecting Bitcoin against Routing Attacks
- Measuring Ethereum Network Peers
- Hostile Blockchain Takeovers
- Exploiting Transaction Accumulation and Double Spends for Topology Inference in Bitcoin
- Detecting Token Systems on Ethereum
- Decentralization in Bitcoin and Ethereum Networks
- Analyzing Ethereum's Contract Topology
- Analysis of the Bitcoin UTXO set
- An Empirical Analysis of Anonymity in Zcash
- A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin
- Measuring Profitability of Alternative Crypto-currencies
- Incentivizing Double-Spend Collusion in Bitcoin
- Blockchain explorer: An analytical process and investigation environment for bitcoin
- BlockSci: Design and applications of a blockchain analysis platform
- Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin
- An analysis of Bitcoin OP_RETURN metadata
- Why buy when you can rent? Bribery attacks on Bitcoin-style consensus
- Hijacking Bitcoin: Routing Attacks on Cryptocurrencies
- ZombieCoin: Powering Next-Generation Botnets with Bitcoin
- Trends, Tips, Tolls: A Longitudinal Study of Bitcoin Transaction Fees
- Towards Risk Scoring of Bitcoin Transactions
- The Bitcoin P2P network
- Rational Zero: Economic Security for Zerocoin with Everlasting Anonymity
- Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem
- Challenges and Opportunities Associated with a Bitcoin-based Transaction Rating System
Topic: Defi
- Speculative Multipliers on DeFi: Quantifying On-Chain Leverage Risks
- On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols
- How to Exploit a DeFi Project
- Formal Analysis of Composable DeFi Protocols
- An empirical study of DeFi liquidations: incentives, risks, and instabilities
- Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit
Topic: Digital ID
- India's 'Aadhaar' Biometric ID: Structure, Security, and Vulnerabilities
- Real Hidden Identity-Based Signatures
- An efficient self-blindable attribute-based credential scheme
Topic: Economics
- The Case for Variable Fees in Constant Product Markets: An Agent Based Simulation
- An Empirical Study of Market Inefficiencies in Uniswap and SushiSwap
- A Short Survey on Business Models of Decentralized Finance
- Understand Volatility of Algorithmic Stablecoin: Modeling, Verification and Empirical Analysis
- Out of the Dark: The Effect of Law Enforcement Actions on Cryptocurrency Market Prices
- Measuring Asset Composability as a Proxy for Ecosystem Integration
- Disentangling Decentralized Finance (DeFi) Compositions
- Why Bitcoin will Fail to Scale?
- Price Manipulation in the Bitcoin Ecosystem
- The Bitcoin Market Potential Index
Topic: Exchanges
- Cyclic Arbitrage in Decentralized Exchange Markets
- Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability
- Identifying the Arbitrageurs on Mt. Gox: First Insights from the Leaked Dataset
- Determining an Optimal Threshold on the Online Reserves of a Bitcoin Exchange
- The Impact of DDoS and Other Security Shocks on Bitcoin Currency Exchanges: Evidence from Mt. Gox
- Exchange Pattern Mining in the Bitcoin Transaction Directed Hypergraph
Topic: Initial Coin Offerings (ICOs)
- Rust, but verify: The economics of scams in initial coin offerings
- The rise and fall of cryptocurrencies
Topic: Layer-Two Protocols
- A Centrality Analysis of the Lightning Network
- Analysis and Probing of Parallel Channels in the Lightning Network
- SoK: Layer-Two Blockchain Protocols
- LockDown: Balance Availability Attack against Lightning Network Channels
- Congestion Attacks in Payment Channel Networks
- How to profit from payments channels
Topic: Legal, Public Policy and Governance
- Centralized Governance in Decentralized Finance
- Virtual currencies and fundamental rights
- Bitcoin redux
- Egalitarian Society or Benevolent Dictatorship: The State of Cryptocurrency Governance
- Cryptographic Currencies from a Tech-Policy Perspective: Key Policy Issues and Technical Directions
- Bitcoin: A First Legal Analysis - with Reference to German and American Law
Topic: Mining
- Extracting Godl [sic] from the Salt Mines: Ethereum Miners Extracting Value
- Selfish Mining Attacks Exacerbated by Elastic Hash Supply
- Selfish Mining Re-Examined
- Diversification Across Mining Pools: Optimal Mining Strategies under PoW
- A Deep Dive into Bitcoin Mining Pools An Empirical Analysis of Mining Shares
- When Bitcoin Mining Pools Run Dry: A Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining Pools
- Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools
Topic: New Systems and Protocols
- ZeeStar: Private Smart Contracts by Homomorphic Encryption and Zero-knowledge Proofs
- Universal Atomic Swaps: Secure Exchange of Coins Across All Blockchains
- Speeding Dumbo: Pushing Asynchronous BFT Closer to Practice
- Shaduf: Non-Cycle Payment Channel Rebalancing
- MatRiCT+: More Efficient Post-Quantum Private Blockchain Payments
- Foundations of Dynamic BFT
- COBRA: Dynamic Proactive Secret Sharing for Confidential BFT Services
- VerLoc: Verifiable Localization in Decentralized Systems
- Using Throughput-Centric Byzantine Broadcast to Tolerate Malicious Majority in Blockchains
- Kicking-the-Bucket: Fast Privacy-Preserving Trading Using Buckets
- Differential Privacy in Constant Function Market Makers
- Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing
Topic: Protocols
- Multi-Certificate Attacks against Proof-of-Elapsed-Time and Their Countermeasures
- Suborn Channels: Incentives Against Timelock Bribes
- Arbitrage attack: Miners of the world, unite!
- Under the Hood of the Ethereum Gossip Protocol
- Three Attacks on Proof-of-Stake Ethereum
- SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Reinforcement Learning
- Securing Parallel-chain Protocols under Variable Mining Power
- Maximizing Extractable Value from Automated Market Makers
- Be Aware of Your Leaders
- Pricing Security in Proof-of-Work Systems
- NC-Max: Breaking the Security-Performance Tradeoff in Nakamoto Consensus
- Everything is a Race and Nakamoto Always Wins
- BFT Protocol Forensics
- The Attack of the Clones Against Proof-of-Authority
- Replay Attacks and Defenses Against Cross-shard Consensus in Sharded Distributed Ledgers
- Lay Down the Common Metrics: Evaluating Proof-of-Work Consensus Protocols' Security
- The Gap Game
- A better method to analyze blockchain consistency
- Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services
- Refund Attacks on Bitcoin's Payment Protocol
- On the Security and Performance of Proof of Work Blockchains
- On the Instability of Bitcoin Without the Block Reward
- On the Malleability of Bitcoin Transactions
- Issues in Designing a Bitcoin-Like Community Currency
Topic: Security and Measurement
- Multi-Certificate Attacks against Proof-of-Elapsed-Time and Their Countermeasures
- An empirical study of two Bitcoin artifacts through deep learning
- The Case for Variable Fees in Constant Product Markets: An Agent Based Simulation
- Suborn Channels: Incentives Against Timelock Bribes
- Speculative Multipliers on DeFi: Quantifying On-Chain Leverage Risks
- Rust, but verify: The economics of scams in initial coin offerings
- India's 'Aadhaar' Biometric ID: Structure, Security, and Vulnerabilities
- How to Peel a Million: Validating and Expanding Bitcoin Clusters
- Extracting Godl [sic] from the Salt Mines: Ethereum Miners Extracting Value
- Arbitrage attack: Miners of the world, unite!
- An Empirical Study of Market Inefficiencies in Uniswap and SushiSwap
- A Short Survey on Business Models of Decentralized Finance
- A Lightweight IoT Cryptojacking Detection Mechanism in Heterogeneous Smart Home Networks
- A Centrality Analysis of the Lightning Network
- What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network
- Under the Hood of the Ethereum Gossip Protocol
- Understand Volatility of Algorithmic Stablecoin: Modeling, Verification and Empirical Analysis
- Timelocked Bribing
- Three Attacks on Proof-of-Stake Ethereum
- The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts
- The Exact Security of BIP32 Wallets
- The Complex Shape of Anonymity in Cryptocurrencies: Case Studies from a Systematic Approach
- SyncAttack: Double-spending in Bitcoin Without Mining Power
- SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Reinforcement Learning
- SoK: Mitigation of Front-running in Decentralized Finance
- SoK: Cryptojacking Malware
- SmartPulse: Automated Checking of Temporal Properties in Smart Contracts
- Smart Contract Vulnerabilities: Vulnerable Does Not Imply Exploited
- SmarTest: Effectively Hunting Vulnerable Transaction Sequences in Smart Contracts through Language Model-Guided Symbolic Execution
- Selfish & opaque transaction ordering in the Bitcoin blockchain: the case for chain neutrality
- Selfish Mining Attacks Exacerbated by Elastic Hash Supply
- Securing Parallel-chain Protocols under Variable Mining Power
- SGUARD: Towards Fixing Vulnerable Smart Contracts Automatically
- SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds
- Revisiting Nakamoto Consensus in Asynchronous Networks: A Comprehensive Analysis of Bitcoin Safety and Chain Quality
- Resurrecting Address Clustering in Bitcoin
- Quantifying Blockchain Extractable Value: How dark is the forest?
- PERIMETER: A network-layer attack on the anonymity of cryptocurrencies
- Out of the Dark: The Effect of Law Enforcement Actions on Cryptocurrency Market Prices
- On the Routing-Aware Peering against Network-Eclipse Attacks in Bitcoin
- On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols
- Measuring Asset Composability as a Proxy for Ecosystem Integration
- Maximizing Extractable Value from Automated Market Makers
- MAD-HTLC: Because HTLC is Crazy-Cheap to Attack
- How to Exploit a DeFi Project
- How Does Blockchain Security Dictate Blockchain Implementation?
- Frontrunner Jones and the Raiders of the Dark Forest: An Empirical Study of Frontrunning on the Ethereum Blockchain
- Formal Analysis of Composable DeFi Protocols
- Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications
- Everything You Ever Wanted to Know About Bitcoin Mixers
- EOSAFE: Security Analysis of EOSIO Smart Contracts
- Disentangling Decentralized Finance (DeFi) Compositions
- DETER: Denial of Ethereum Txpool sERvices
- Cyclic Arbitrage in Decentralized Exchange Markets
- Cross-Layer Deanonymization Methods in the Lightning Protocol
- ConFuzzius: A Data Dependency-Aware Hybrid Fuzzer for Smart Contracts
- Compositional Security for Reentrant Applications
- Centralized Governance in Decentralized Finance
- Be Aware of Your Leaders
- As Strong As Its Weakest Link: How to Break Blockchain DApps at RPC Service
- An empirical study of DeFi liquidations: incentives, risks, and instabilities
- Analysis and Probing of Parallel Channels in the Lightning Network
- A Security Framework for Distributed Ledgers
- eThor: Practical and Provably Sound Static Analysis of Ethereum Smart Contracts
- VerX: Safety Verification of Smart Contracts
- TXSPECTOR: Uncovering Attacks in Ethereum from Transactions
- Surviving the Cryptojungle: Perception and Management of Risk Among North American Cryptocurrency (Non)Users
- Stake Shift in Major Cryptocurrencies: An Empirical Study
- SoK: Layer-Two Blockchain Protocols
- Semantic Understanding of Smart Contracts: Executable Operational Semantics of Solidity
- Selfish Mining Re-Examined
- Security Analysis on dBFT protocol of NEO
- Revisiting Transactional Statistics of High-scalability Blockchain
- Remote Side-Channel Attacks on Anonymous Transactions
- Pricing Security in Proof-of-Work Systems
- NC-Max: Breaking the Security-Performance Tradeoff in Nakamoto Consensus
- LockDown: Balance Availability Attack against Lightning Network Channels
- Leveraging Bitcoin Testnet for Bidirectional Botnet Command and Control Systems
- Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability
- Exploring the Monero Peer-to-Peer Network
- Everything is a Race and Nakamoto Always Wins
- EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts
- ETHBMC: A Bounded Model Checker for Smart Contracts
- Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams
- Congestion Attacks in Payment Channel Networks
- BFT Protocol Forensics
- Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit
- A new wolf in town? Pump-and-dump manipulation in cryptocurrency markets
- An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem
- An Empirical Analysis of Privacy in the Lightning Network
- Address clustering heuristics for Ethereum
- Why Bitcoin will Fail to Scale?
- What are the Actual Flaws in Important Smart Contracts (and How Can We Find Them)?
- Virtual currencies and fundamental rights
- VeriSmart: A Highly Precise Safety Verifier for Ethereum Smart Contracts
- TokenScope: Automatically Detecting Inconsistent Behaviors of Cryptocurrency Tokens in Ethereum
- The Attack of the Clones Against Proof-of-Authority
- The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts
- The Anatomy of a Cryptocurrency Pump-and-Dump Scheme
- Replay Attacks and Defenses Against Cross-shard Consensus in Sharded Distributed Ledgers
- Privacy Aspects and Subliminal Channels in Zcash
- Power Adjusting and Bribery Racing: Novel Mining Attacks in the Bitcoin System
- New Empirical Traceability Analysis of CryptoNote-Style Blockchains
- Minimizing Trust in Hardware Wallets with Two Factor Signatures
- Measuring Ethereum-based ERC20 Token Networks
- MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol
- Lay Down the Common Metrics: Evaluating Proof-of-Work Consensus Protocols' Security
- Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale
- I Can't Believe It's Not Stake! Resource Exhaustion Attacks on PoS
- HyperService: Interoperability and Programmability Across Heterogeneous Blockchains
- How to profit from payments channels
- Echoes of the Past: Recovering Blockchain Metrics From Merged Mining
- Diversification Across Mining Pools: Optimal Mining Strategies under PoW
- Dine and Dash: Static, Dynamic, and Economic Analysis of In-Browser Cryptojacking
- Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web
- Coded Merkle Tree: Solving Data Availability Attacks in Blockchains
- Characterizing Code Clones in the Ethereum Smart Contract Ecosystem
- Broken Metre: Attacking Resource Metering in EVM
- Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash?
- Bitcoin redux
- Bitcoin Security under Temporary Dishonest Majority
- BDoS: Blockchain Denial-of-Service
- Assessing the Threat of Blockchain-based Botnets
- An Exploration of Code Diversity in the Cryptocurrency Landscape
- An Empirical Analysis of Blockchain Forks in Bitcoin
- A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network
- A Formal Treatment of Hardware Wallets
- A Formal Treatment of Deterministic Wallets
- A Deep Dive into Bitcoin Mining Pools An Empirical Analysis of Mining Shares
- Identifying the Arbitrageurs on Mt. Gox: First Insights from the Leaked Dataset
- teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts
- ZEUS: Analyzing Safety of Smart Contracts
- TxProbe: Discovering Bitcoin's Network Topology Using Orphan Transactions
- Tracing Transactions Across Cryptocurrency Ledgers
- The rise and fall of cryptocurrencies
- The Gap Game
- The Economics of Cryptocurrency Pump and Dump Schemes
- Smart Contracts for Bribing Miners
- Sex, drugs, and bitcoin: How much illegal activity is financed through cryptocurrencies?
- Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks
- SECURIFY: Practical Security Analysis of Smart Contracts
- SABRE: Protecting Bitcoin against Routing Attacks
- Ransomware payments in the Bitcoin ecosystem
- MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense
- Measuring Ethereum Network Peers
- Hostile Blockchain Takeovers
- Exploiting Transaction Accumulation and Double Spends for Topology Inference in Bitcoin
- Erays: Reverse Engineering Ethereum's Opaque Smart Contracts
- Egalitarian Society or Benevolent Dictatorship: The State of Cryptocurrency Governance
- Digging into Browser-based Crypto Mining
- Determining an Optimal Threshold on the Online Reserves of a Bitcoin Exchange
- Detecting Token Systems on Ethereum
- Decentralization in Bitcoin and Ethereum Networks
- COINHOARDER: Tracking a Ukrainian Bitcoin Phishing Ring DNS Style
- Analyzing the Bitcoin Ponzi Scheme Ecosystem
- Analyzing Ethereum's Contract Topology
- Analysis of the Bitcoin UTXO set
- An Empirical Analysis of Monero Cross-Chain Traceability
- An Empirical Analysis of Anonymity in Zcash
- A better method to analyze blockchain consistency
- A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin
- Measuring Profitability of Alternative Crypto-currencies
- Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services
- The Impact of DDoS and Other Security Shocks on Bitcoin Currency Exchanges: Evidence from Mt. Gox
- Smart Contracts Make Bitcoin Mining Pools Vulnerable
- Real Hidden Identity-Based Signatures
- Price Manipulation in the Bitcoin Ecosystem
- Incentivizing Double-Spend Collusion in Bitcoin
- Exchange Pattern Mining in the Bitcoin Transaction Directed Hypergraph
- Designing Secure Ethereum Smart Contracts: A Finite State Machine Based Approach
- Could Network Information Facilitate Address Clustering in Bitcoin?
- Blockchain explorer: An analytical process and investigation environment for bitcoin
- BlockSci: Design and applications of a blockchain analysis platform
- Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin
- An efficient self-blindable attribute-based credential scheme
- An analysis of Bitcoin OP_RETURN metadata
- Why buy when you can rent? Bribery attacks on Bitcoin-style consensus
- The Ring of Gyges: Investigating the Future of Criminal Smart Contracts
- The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy
- The Bitcoin Brain Drain: A Short Paper on the Use and Abuse of Bitcoin Brain Wallets
- Stressing Out: Bitcoin 'Stress Testing'
- Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab
- Refund Attacks on Bitcoin's Payment Protocol
- On the Security and Performance of Proof of Work Blockchains
- On the Instability of Bitcoin Without the Block Reward
- Making Smart Contracts Smarter
- Join Me on a Market for Anonymity
- Hijacking Bitcoin: Routing Attacks on Cryptocurrencies
- Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin
- ZombieCoin: Powering Next-Generation Botnets with Bitcoin
- When Bitcoin Mining Pools Run Dry: A Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining Pools
- On the Malleability of Bitcoin Transactions
- Issues in Designing a Bitcoin-Like Community Currency
- Cryptographic Currencies from a Tech-Policy Perspective: Key Policy Issues and Technical Directions
- Trends, Tips, Tolls: A Longitudinal Study of Bitcoin Transaction Fees
- Towards Risk Scoring of Bitcoin Transactions
- The Bitcoin P2P network
- The Bitcoin Market Potential Index
- Rational Zero: Economic Security for Zerocoin with Everlasting Anonymity
- How Did Dread Pirate Roberts Acquire and Protect His Bitcoin Wealth?
- Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools
- Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem
- Challenges and Opportunities Associated with a Bitcoin-based Transaction Rating System
- Bitcoin: A First Legal Analysis - with Reference to German and American Law
- A Fistful of Bitcoins: Characterizing Payments Among Men with No Names
Topic: Smart Contracts
- The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts
- SmartPulse: Automated Checking of Temporal Properties in Smart Contracts
- Smart Contract Vulnerabilities: Vulnerable Does Not Imply Exploited
- SmarTest: Effectively Hunting Vulnerable Transaction Sequences in Smart Contracts through Language Model-Guided Symbolic Execution
- SGUARD: Towards Fixing Vulnerable Smart Contracts Automatically
- SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds
- Quantifying Blockchain Extractable Value: How dark is the forest?
- MAD-HTLC: Because HTLC is Crazy-Cheap to Attack
- EOSAFE: Security Analysis of EOSIO Smart Contracts
- Compositional Security for Reentrant Applications
- eThor: Practical and Provably Sound Static Analysis of Ethereum Smart Contracts
- VerX: Safety Verification of Smart Contracts
- Semantic Understanding of Smart Contracts: Executable Operational Semantics of Solidity
- EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts
- ETHBMC: A Bounded Model Checker for Smart Contracts
- What are the Actual Flaws in Important Smart Contracts (and How Can We Find Them)?
- VeriSmart: A Highly Precise Safety Verifier for Ethereum Smart Contracts
- The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts
- MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol
- HyperService: Interoperability and Programmability Across Heterogeneous Blockchains
- Characterizing Code Clones in the Ethereum Smart Contract Ecosystem
- teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts
- ZEUS: Analyzing Safety of Smart Contracts
- Smart Contracts for Bribing Miners
- Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks
- SECURIFY: Practical Security Analysis of Smart Contracts
- Erays: Reverse Engineering Ethereum's Opaque Smart Contracts
- Smart Contracts Make Bitcoin Mining Pools Vulnerable
- Designing Secure Ethereum Smart Contracts: A Finite State Machine Based Approach
- The Ring of Gyges: Investigating the Future of Criminal Smart Contracts
- Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab
- Making Smart Contracts Smarter
Topic: Usable Security
- Surviving the Cryptojungle: Perception and Management of Risk Among North American Cryptocurrency (Non)Users
- The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy
Topic: Wallets
- The Exact Security of BIP32 Wallets
- Minimizing Trust in Hardware Wallets with Two Factor Signatures
- A Formal Treatment of Hardware Wallets
- A Formal Treatment of Deterministic Wallets
- The Bitcoin Brain Drain: A Short Paper on the Use and Abuse of Bitcoin Brain Wallets