Venue: Bitcoin
- Smart Contracts for Bribing Miners
- Hostile Blockchain Takeovers
- Exploiting Transaction Accumulation and Double Spends for Topology Inference in Bitcoin
- Egalitarian Society or Benevolent Dictatorship: The State of Cryptocurrency Governance
- Analyzing the Bitcoin Ponzi Scheme Ecosystem
- Analysis of the Bitcoin UTXO set
- Smart Contracts Make Bitcoin Mining Pools Vulnerable
- Incentivizing Double-Spend Collusion in Bitcoin
- Exchange Pattern Mining in the Bitcoin Transaction Directed Hypergraph
- Could Network Information Facilitate Address Clustering in Bitcoin?
- An analysis of Bitcoin OP_RETURN metadata
- Why buy when you can rent? Bribery attacks on Bitcoin-style consensus
- Stressing Out: Bitcoin 'Stress Testing'
- Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab
- ZombieCoin: Powering Next-Generation Botnets with Bitcoin
- When Bitcoin Mining Pools Run Dry: A Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining Pools
- On the Malleability of Bitcoin Transactions
- Issues in Designing a Bitcoin-Like Community Currency
- Cryptographic Currencies from a Tech-Policy Perspective: Key Policy Issues and Technical Directions
- Trends, Tips, Tolls: A Longitudinal Study of Bitcoin Transaction Fees
- Towards Risk Scoring of Bitcoin Transactions
- The Bitcoin P2P network
- The Bitcoin Market Potential Index
- Rational Zero: Economic Security for Zerocoin with Everlasting Anonymity
- How Did Dread Pirate Roberts Acquire and Protect His Bitcoin Wealth?
- Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools
- Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem
- Challenges and Opportunities Associated with a Bitcoin-based Transaction Rating System
- Bitcoin: A First Legal Analysis - with Reference to German and American Law
Venue: CCS
- The Exact Security of BIP32 Wallets
- SyncAttack: Double-spending in Bitcoin Without Mining Power
- Securing Parallel-chain Protocols under Variable Mining Power
- Revisiting Nakamoto Consensus in Asynchronous Networks: A Comprehensive Analysis of Bitcoin Safety and Chain Quality
- How Does Blockchain Security Dictate Blockchain Implementation?
- DETER: Denial of Ethereum Txpool sERvices
- A Security Framework for Distributed Ledgers
- eThor: Practical and Provably Sound Static Analysis of Ethereum Smart Contracts
- Everything is a Race and Nakamoto Always Wins
- BFT Protocol Forensics
- TokenScope: Automatically Detecting Inconsistent Behaviors of Cryptocurrency Tokens in Ethereum
- Privacy Aspects and Subliminal Channels in Zcash
- Power Adjusting and Bribery Racing: Novel Mining Attacks in the Bitcoin System
- MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol
- HyperService: Interoperability and Programmability Across Heterogeneous Blockchains
- BDoS: Blockchain Denial-of-Service
- A Formal Treatment of Deterministic Wallets
- The Gap Game
- SECURIFY: Practical Security Analysis of Smart Contracts
- MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense
- A better method to analyze blockchain consistency
- Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services
- Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin
- The Ring of Gyges: Investigating the Future of Criminal Smart Contracts
- On the Security and Performance of Proof of Work Blockchains
- On the Instability of Bitcoin Without the Block Reward
- Making Smart Contracts Smarter
Venue: Defi
- The Case for Variable Fees in Constant Product Markets: An Agent Based Simulation
- An Empirical Study of Market Inefficiencies in Uniswap and SushiSwap
- A Short Survey on Business Models of Decentralized Finance
- Understand Volatility of Algorithmic Stablecoin: Modeling, Verification and Empirical Analysis
- SoK: Mitigation of Front-running in Decentralized Finance
- Measuring Asset Composability as a Proxy for Ecosystem Integration
- How to Exploit a DeFi Project
- Formal Analysis of Composable DeFi Protocols
- Disentangling Decentralized Finance (DeFi) Compositions
- Cyclic Arbitrage in Decentralized Exchange Markets
- Centralized Governance in Decentralized Finance
Venue: Economics
- A new wolf in town? Pump-and-dump manipulation in cryptocurrency markets
Venue: EuroS&P
- SoK: Cryptojacking Malware
- ConFuzzius: A Data Dependency-Aware Hybrid Fuzzer for Smart Contracts
- Replay Attacks and Defenses Against Cross-shard Consensus in Sharded Distributed Ledgers
Venue: FC
- An empirical study of two Bitcoin artifacts through deep learning
- Suborn Channels: Incentives Against Timelock Bribes
- Speculative Multipliers on DeFi: Quantifying On-Chain Leverage Risks
- India's 'Aadhaar' Biometric ID: Structure, Security, and Vulnerabilities
- Arbitrage attack: Miners of the world, unite!
- A Centrality Analysis of the Lightning Network
- What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network
- Under the Hood of the Ethereum Gossip Protocol
- Timelocked Bribing
- Three Attacks on Proof-of-Stake Ethereum
- The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts
- The Complex Shape of Anonymity in Cryptocurrencies: Case Studies from a Systematic Approach
- Selfish Mining Attacks Exacerbated by Elastic Hash Supply
- Resurrecting Address Clustering in Bitcoin
- PERIMETER: A network-layer attack on the anonymity of cryptocurrencies
- Maximizing Extractable Value from Automated Market Makers
- Kicking-the-Bucket: Fast Privacy-Preserving Trading Using Buckets
- Everything You Ever Wanted to Know About Bitcoin Mixers
- Differential Privacy in Constant Function Market Makers
- Cross-Layer Deanonymization Methods in the Lightning Protocol
- Be Aware of Your Leaders
- Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing
- Analysis and Probing of Parallel Channels in the Lightning Network
- Surviving the Cryptojungle: Perception and Management of Risk Among North American Cryptocurrency (Non)Users
- Stake Shift in Major Cryptocurrencies: An Empirical Study
- SoK: Layer-Two Blockchain Protocols
- Selfish Mining Re-Examined
- Security Analysis on dBFT protocol of NEO
- LockDown: Balance Availability Attack against Lightning Network Channels
- Leveraging Bitcoin Testnet for Bidirectional Botnet Command and Control Systems
- Exploring the Monero Peer-to-Peer Network
- Congestion Attacks in Payment Channel Networks
- Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit
- An Empirical Analysis of Privacy in the Lightning Network
- Address clustering heuristics for Ethereum
- What are the Actual Flaws in Important Smart Contracts (and How Can We Find Them)?
- New Empirical Traceability Analysis of CryptoNote-Style Blockchains
- Minimizing Trust in Hardware Wallets with Two Factor Signatures
- Measuring Ethereum-based ERC20 Token Networks
- I Can't Believe It's Not Stake! Resource Exhaustion Attacks on PoS
- How to profit from payments channels
- Echoes of the Past: Recovering Blockchain Metrics From Merged Mining
- Coded Merkle Tree: Solving Data Availability Attacks in Blockchains
- Characterizing Code Clones in the Ethereum Smart Contract Ecosystem
- Bitcoin Security under Temporary Dishonest Majority
- An Exploration of Code Diversity in the Cryptocurrency Landscape
- An Empirical Analysis of Blockchain Forks in Bitcoin
- A Formal Treatment of Hardware Wallets
- TxProbe: Discovering Bitcoin's Network Topology Using Orphan Transactions
- Detecting Token Systems on Ethereum
- Decentralization in Bitcoin and Ethereum Networks
- An Empirical Analysis of Monero Cross-Chain Traceability
- A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin
- Measuring Profitability of Alternative Crypto-currencies
- Real Hidden Identity-Based Signatures
- Designing Secure Ethereum Smart Contracts: A Finite State Machine Based Approach
- An efficient self-blindable attribute-based credential scheme
- The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy
- The Bitcoin Brain Drain: A Short Paper on the Use and Abuse of Bitcoin Brain Wallets
- Refund Attacks on Bitcoin's Payment Protocol
Venue: IEEE S&P
- ZeeStar: Private Smart Contracts by Homomorphic Encryption and Zero-knowledge Proofs
- Universal Atomic Swaps: Secure Exchange of Coins Across All Blockchains
- MatRiCT+: More Efficient Post-Quantum Private Blockchain Payments
- Foundations of Dynamic BFT
- COBRA: Dynamic Proactive Secret Sharing for Confidential BFT Services
- Using Throughput-Centric Byzantine Broadcast to Tolerate Malicious Majority in Blockchains
- SmartPulse: Automated Checking of Temporal Properties in Smart Contracts
- SGUARD: Towards Fixing Vulnerable Smart Contracts Automatically
- SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds
- Quantifying Blockchain Extractable Value: How dark is the forest?
- On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols
- MAD-HTLC: Because HTLC is Crazy-Cheap to Attack
- Compositional Security for Reentrant Applications
- VerX: Safety Verification of Smart Contracts
- Semantic Understanding of Smart Contracts: Executable Operational Semantics of Solidity
- Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability
- VeriSmart: A Highly Precise Safety Verifier for Ethereum Smart Contracts
- Lay Down the Common Metrics: Evaluating Proof-of-Work Consensus Protocols' Security
- Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash?
- A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network
- Hijacking Bitcoin: Routing Attacks on Cryptocurrencies
Venue: IMC
- Selfish & opaque transaction ordering in the Bitcoin blockchain: the case for chain neutrality
- An empirical study of DeFi liquidations: incentives, risks, and instabilities
- Revisiting Transactional Statistics of High-scalability Blockchain
- Measuring Ethereum Network Peers
- Digging into Browser-based Crypto Mining
- Analyzing Ethereum's Contract Topology
- A Fistful of Bitcoins: Characterizing Payments Among Men with No Names
Venue: NDSS
- Multi-Certificate Attacks against Proof-of-Elapsed-Time and Their Countermeasures
- Speeding Dumbo: Pushing Asynchronous BFT Closer to Practice
- Shaduf: Non-Cycle Payment Channel Rebalancing
- A Lightweight IoT Cryptojacking Detection Mechanism in Heterogeneous Smart Home Networks
- SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Reinforcement Learning
- As Strong As Its Weakest Link: How to Break Blockchain DApps at RPC Service
- NC-Max: Breaking the Security-Performance Tradeoff in Nakamoto Consensus
- The Attack of the Clones Against Proof-of-Authority
- Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web
- Broken Metre: Attacking Resource Metering in EVM
- ZEUS: Analyzing Safety of Smart Contracts
- Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks
- SABRE: Protecting Bitcoin against Routing Attacks
Venue: SSRN Electronic Journal
- Rust, but verify: The economics of scams in initial coin offerings
Venue: The Review of Financial Studies
- Sex, drugs, and bitcoin: How much illegal activity is financed through cryptocurrencies?
Venue: Usenix Security
- How to Peel a Million: Validating and Expanding Bitcoin Clusters
- VerLoc: Verifiable Localization in Decentralized Systems
- Smart Contract Vulnerabilities: Vulnerable Does Not Imply Exploited
- SmarTest: Effectively Hunting Vulnerable Transaction Sequences in Smart Contracts through Language Model-Guided Symbolic Execution
- On the Routing-Aware Peering against Network-Eclipse Attacks in Bitcoin
- Frontrunner Jones and the Raiders of the Dark Forest: An Empirical Study of Frontrunning on the Ethereum Blockchain
- Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications
- EOSAFE: Security Analysis of EOSIO Smart Contracts
- TXSPECTOR: Uncovering Attacks in Ethereum from Transactions
- Remote Side-Channel Attacks on Anonymous Transactions
- EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts
- ETHBMC: A Bounded Model Checker for Smart Contracts
- An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem
- The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts
- The Anatomy of a Cryptocurrency Pump-and-Dump Scheme
- Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale
- teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts
- Tracing Transactions Across Cryptocurrency Ledgers
- Erays: Reverse Engineering Ethereum's Opaque Smart Contracts
- An Empirical Analysis of Anonymity in Zcash
- BlockSci: Design and applications of a blockchain analysis platform
Venue: WEIS
- Extracting Godl [sic] from the Salt Mines: Ethereum Miners Extracting Value
- Pricing Security in Proof-of-Work Systems
- Why Bitcoin will Fail to Scale?
- Virtual currencies and fundamental rights
- Diversification Across Mining Pools: Optimal Mining Strategies under PoW
- Bitcoin redux
- A Deep Dive into Bitcoin Mining Pools An Empirical Analysis of Mining Shares
- Identifying the Arbitrageurs on Mt. Gox: First Insights from the Leaked Dataset
- The rise and fall of cryptocurrencies
- The Economics of Cryptocurrency Pump and Dump Schemes
- Ransomware payments in the Bitcoin ecosystem
- Determining an Optimal Threshold on the Online Reserves of a Bitcoin Exchange
- The Impact of DDoS and Other Security Shocks on Bitcoin Currency Exchanges: Evidence from Mt. Gox
- Price Manipulation in the Bitcoin Ecosystem
- Join Me on a Market for Anonymity
Venue: eCrime
- Out of the Dark: The Effect of Law Enforcement Actions on Cryptocurrency Market Prices
- Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams
- Dine and Dash: Static, Dynamic, and Economic Analysis of In-Browser Cryptojacking
- Assessing the Threat of Blockchain-based Botnets
- COINHOARDER: Tracking a Ukrainian Bitcoin Phishing Ring DNS Style
- Blockchain explorer: An analytical process and investigation environment for bitcoin
- Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin