Papers By Venue

Venue: Bitcoin

  1. Smart Contracts for Bribing Miners
  2. Hostile Blockchain Takeovers
  3. Exploiting Transaction Accumulation and Double Spends for Topology Inference in Bitcoin
  4. Egalitarian Society or Benevolent Dictatorship: The State of Cryptocurrency Governance
  5. Analyzing the Bitcoin Ponzi Scheme Ecosystem
  6. Analysis of the Bitcoin UTXO set
  7. Smart Contracts Make Bitcoin Mining Pools Vulnerable
  8. Incentivizing Double-Spend Collusion in Bitcoin
  9. Exchange Pattern Mining in the Bitcoin Transaction Directed Hypergraph
  10. Could Network Information Facilitate Address Clustering in Bitcoin?
  11. An analysis of Bitcoin OP_RETURN metadata
  12. Why buy when you can rent? Bribery attacks on Bitcoin-style consensus
  13. Stressing Out: Bitcoin 'Stress Testing'
  14. Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab
  15. ZombieCoin: Powering Next-Generation Botnets with Bitcoin
  16. When Bitcoin Mining Pools Run Dry: A Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining Pools
  17. On the Malleability of Bitcoin Transactions
  18. Issues in Designing a Bitcoin-Like Community Currency
  19. Cryptographic Currencies from a Tech-Policy Perspective: Key Policy Issues and Technical Directions
  20. Trends, Tips, Tolls: A Longitudinal Study of Bitcoin Transaction Fees
  21. Towards Risk Scoring of Bitcoin Transactions
  22. The Bitcoin P2P network
  23. The Bitcoin Market Potential Index
  24. Rational Zero: Economic Security for Zerocoin with Everlasting Anonymity
  25. How Did Dread Pirate Roberts Acquire and Protect His Bitcoin Wealth?
  26. Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools
  27. Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem
  28. Challenges and Opportunities Associated with a Bitcoin-based Transaction Rating System
  29. Bitcoin: A First Legal Analysis - with Reference to German and American Law

Venue: CCS

  1. The Exact Security of BIP32 Wallets
  2. SyncAttack: Double-spending in Bitcoin Without Mining Power
  3. Securing Parallel-chain Protocols under Variable Mining Power
  4. Revisiting Nakamoto Consensus in Asynchronous Networks: A Comprehensive Analysis of Bitcoin Safety and Chain Quality
  5. How Does Blockchain Security Dictate Blockchain Implementation?
  6. DETER: Denial of Ethereum Txpool sERvices
  7. A Security Framework for Distributed Ledgers
  8. eThor: Practical and Provably Sound Static Analysis of Ethereum Smart Contracts
  9. Everything is a Race and Nakamoto Always Wins
  10. BFT Protocol Forensics
  11. TokenScope: Automatically Detecting Inconsistent Behaviors of Cryptocurrency Tokens in Ethereum
  12. Privacy Aspects and Subliminal Channels in Zcash
  13. Power Adjusting and Bribery Racing: Novel Mining Attacks in the Bitcoin System
  14. MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol
  15. HyperService: Interoperability and Programmability Across Heterogeneous Blockchains
  16. BDoS: Blockchain Denial-of-Service
  17. A Formal Treatment of Deterministic Wallets
  18. The Gap Game
  19. SECURIFY: Practical Security Analysis of Smart Contracts
  20. MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense
  21. A better method to analyze blockchain consistency
  22. Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services
  23. Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin
  24. The Ring of Gyges: Investigating the Future of Criminal Smart Contracts
  25. On the Security and Performance of Proof of Work Blockchains
  26. On the Instability of Bitcoin Without the Block Reward
  27. Making Smart Contracts Smarter

Venue: Defi

  1. The Case for Variable Fees in Constant Product Markets: An Agent Based Simulation
  2. An Empirical Study of Market Inefficiencies in Uniswap and SushiSwap
  3. A Short Survey on Business Models of Decentralized Finance
  4. Understand Volatility of Algorithmic Stablecoin: Modeling, Verification and Empirical Analysis
  5. SoK: Mitigation of Front-running in Decentralized Finance
  6. Measuring Asset Composability as a Proxy for Ecosystem Integration
  7. How to Exploit a DeFi Project
  8. Formal Analysis of Composable DeFi Protocols
  9. Disentangling Decentralized Finance (DeFi) Compositions
  10. Cyclic Arbitrage in Decentralized Exchange Markets
  11. Centralized Governance in Decentralized Finance

Venue: Economics

  1. A new wolf in town? Pump-and-dump manipulation in cryptocurrency markets

Venue: EuroS&P

  1. SoK: Cryptojacking Malware
  2. ConFuzzius: A Data Dependency-Aware Hybrid Fuzzer for Smart Contracts
  3. Replay Attacks and Defenses Against Cross-shard Consensus in Sharded Distributed Ledgers

Venue: FC

  1. An empirical study of two Bitcoin artifacts through deep learning
  2. Suborn Channels: Incentives Against Timelock Bribes
  3. Speculative Multipliers on DeFi: Quantifying On-Chain Leverage Risks
  4. India's 'Aadhaar' Biometric ID: Structure, Security, and Vulnerabilities
  5. Arbitrage attack: Miners of the world, unite!
  6. A Centrality Analysis of the Lightning Network
  7. What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network
  8. Under the Hood of the Ethereum Gossip Protocol
  9. Timelocked Bribing
  10. Three Attacks on Proof-of-Stake Ethereum
  11. The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts
  12. The Complex Shape of Anonymity in Cryptocurrencies: Case Studies from a Systematic Approach
  13. Selfish Mining Attacks Exacerbated by Elastic Hash Supply
  14. Resurrecting Address Clustering in Bitcoin
  15. PERIMETER: A network-layer attack on the anonymity of cryptocurrencies
  16. Maximizing Extractable Value from Automated Market Makers
  17. Kicking-the-Bucket: Fast Privacy-Preserving Trading Using Buckets
  18. Everything You Ever Wanted to Know About Bitcoin Mixers
  19. Differential Privacy in Constant Function Market Makers
  20. Cross-Layer Deanonymization Methods in the Lightning Protocol
  21. Be Aware of Your Leaders
  22. Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing
  23. Analysis and Probing of Parallel Channels in the Lightning Network
  24. Surviving the Cryptojungle: Perception and Management of Risk Among North American Cryptocurrency (Non)Users
  25. Stake Shift in Major Cryptocurrencies: An Empirical Study
  26. SoK: Layer-Two Blockchain Protocols
  27. Selfish Mining Re-Examined
  28. Security Analysis on dBFT protocol of NEO
  29. LockDown: Balance Availability Attack against Lightning Network Channels
  30. Leveraging Bitcoin Testnet for Bidirectional Botnet Command and Control Systems
  31. Exploring the Monero Peer-to-Peer Network
  32. Congestion Attacks in Payment Channel Networks
  33. Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit
  34. An Empirical Analysis of Privacy in the Lightning Network
  35. Address clustering heuristics for Ethereum
  36. What are the Actual Flaws in Important Smart Contracts (and How Can We Find Them)?
  37. New Empirical Traceability Analysis of CryptoNote-Style Blockchains
  38. Minimizing Trust in Hardware Wallets with Two Factor Signatures
  39. Measuring Ethereum-based ERC20 Token Networks
  40. I Can't Believe It's Not Stake! Resource Exhaustion Attacks on PoS
  41. How to profit from payments channels
  42. Echoes of the Past: Recovering Blockchain Metrics From Merged Mining
  43. Coded Merkle Tree: Solving Data Availability Attacks in Blockchains
  44. Characterizing Code Clones in the Ethereum Smart Contract Ecosystem
  45. Bitcoin Security under Temporary Dishonest Majority
  46. An Exploration of Code Diversity in the Cryptocurrency Landscape
  47. An Empirical Analysis of Blockchain Forks in Bitcoin
  48. A Formal Treatment of Hardware Wallets
  49. TxProbe: Discovering Bitcoin's Network Topology Using Orphan Transactions
  50. Detecting Token Systems on Ethereum
  51. Decentralization in Bitcoin and Ethereum Networks
  52. An Empirical Analysis of Monero Cross-Chain Traceability
  53. A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin
  54. Measuring Profitability of Alternative Crypto-currencies
  55. Real Hidden Identity-Based Signatures
  56. Designing Secure Ethereum Smart Contracts: A Finite State Machine Based Approach
  57. An efficient self-blindable attribute-based credential scheme
  58. The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy
  59. The Bitcoin Brain Drain: A Short Paper on the Use and Abuse of Bitcoin Brain Wallets
  60. Refund Attacks on Bitcoin's Payment Protocol

Venue: IEEE S&P

  1. ZeeStar: Private Smart Contracts by Homomorphic Encryption and Zero-knowledge Proofs
  2. Universal Atomic Swaps: Secure Exchange of Coins Across All Blockchains
  3. MatRiCT+: More Efficient Post-Quantum Private Blockchain Payments
  4. Foundations of Dynamic BFT
  5. COBRA: Dynamic Proactive Secret Sharing for Confidential BFT Services
  6. Using Throughput-Centric Byzantine Broadcast to Tolerate Malicious Majority in Blockchains
  7. SmartPulse: Automated Checking of Temporal Properties in Smart Contracts
  8. SGUARD: Towards Fixing Vulnerable Smart Contracts Automatically
  9. SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds
  10. Quantifying Blockchain Extractable Value: How dark is the forest?
  11. On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols
  12. MAD-HTLC: Because HTLC is Crazy-Cheap to Attack
  13. Compositional Security for Reentrant Applications
  14. VerX: Safety Verification of Smart Contracts
  15. Semantic Understanding of Smart Contracts: Executable Operational Semantics of Solidity
  16. Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability
  17. VeriSmart: A Highly Precise Safety Verifier for Ethereum Smart Contracts
  18. Lay Down the Common Metrics: Evaluating Proof-of-Work Consensus Protocols' Security
  19. Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash?
  20. A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network
  21. Hijacking Bitcoin: Routing Attacks on Cryptocurrencies

Venue: IMC

  1. Selfish & opaque transaction ordering in the Bitcoin blockchain: the case for chain neutrality
  2. An empirical study of DeFi liquidations: incentives, risks, and instabilities
  3. Revisiting Transactional Statistics of High-scalability Blockchain
  4. Measuring Ethereum Network Peers
  5. Digging into Browser-based Crypto Mining
  6. Analyzing Ethereum's Contract Topology
  7. A Fistful of Bitcoins: Characterizing Payments Among Men with No Names

Venue: NDSS

  1. Multi-Certificate Attacks against Proof-of-Elapsed-Time and Their Countermeasures
  2. Speeding Dumbo: Pushing Asynchronous BFT Closer to Practice
  3. Shaduf: Non-Cycle Payment Channel Rebalancing
  4. A Lightweight IoT Cryptojacking Detection Mechanism in Heterogeneous Smart Home Networks
  5. SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Reinforcement Learning
  6. As Strong As Its Weakest Link: How to Break Blockchain DApps at RPC Service
  7. NC-Max: Breaking the Security-Performance Tradeoff in Nakamoto Consensus
  8. The Attack of the Clones Against Proof-of-Authority
  9. Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web
  10. Broken Metre: Attacking Resource Metering in EVM
  11. ZEUS: Analyzing Safety of Smart Contracts
  12. Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks
  13. SABRE: Protecting Bitcoin against Routing Attacks

Venue: SSRN Electronic Journal

  1. Rust, but verify: The economics of scams in initial coin offerings

Venue: The Review of Financial Studies

  1. Sex, drugs, and bitcoin: How much illegal activity is financed through cryptocurrencies?

Venue: Usenix Security

  1. How to Peel a Million: Validating and Expanding Bitcoin Clusters
  2. VerLoc: Verifiable Localization in Decentralized Systems
  3. Smart Contract Vulnerabilities: Vulnerable Does Not Imply Exploited
  4. SmarTest: Effectively Hunting Vulnerable Transaction Sequences in Smart Contracts through Language Model-Guided Symbolic Execution
  5. On the Routing-Aware Peering against Network-Eclipse Attacks in Bitcoin
  6. Frontrunner Jones and the Raiders of the Dark Forest: An Empirical Study of Frontrunning on the Ethereum Blockchain
  7. Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications
  8. EOSAFE: Security Analysis of EOSIO Smart Contracts
  9. TXSPECTOR: Uncovering Attacks in Ethereum from Transactions
  10. Remote Side-Channel Attacks on Anonymous Transactions
  11. EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts
  12. ETHBMC: A Bounded Model Checker for Smart Contracts
  13. An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem
  14. The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts
  15. The Anatomy of a Cryptocurrency Pump-and-Dump Scheme
  16. Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale
  17. teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts
  18. Tracing Transactions Across Cryptocurrency Ledgers
  19. Erays: Reverse Engineering Ethereum's Opaque Smart Contracts
  20. An Empirical Analysis of Anonymity in Zcash
  21. BlockSci: Design and applications of a blockchain analysis platform

Venue: WEIS

  1. Extracting Godl [sic] from the Salt Mines: Ethereum Miners Extracting Value
  2. Pricing Security in Proof-of-Work Systems
  3. Why Bitcoin will Fail to Scale?
  4. Virtual currencies and fundamental rights
  5. Diversification Across Mining Pools: Optimal Mining Strategies under PoW
  6. Bitcoin redux
  7. A Deep Dive into Bitcoin Mining Pools An Empirical Analysis of Mining Shares
  8. Identifying the Arbitrageurs on Mt. Gox: First Insights from the Leaked Dataset
  9. The rise and fall of cryptocurrencies
  10. The Economics of Cryptocurrency Pump and Dump Schemes
  11. Ransomware payments in the Bitcoin ecosystem
  12. Determining an Optimal Threshold on the Online Reserves of a Bitcoin Exchange
  13. The Impact of DDoS and Other Security Shocks on Bitcoin Currency Exchanges: Evidence from Mt. Gox
  14. Price Manipulation in the Bitcoin Ecosystem
  15. Join Me on a Market for Anonymity

Venue: eCrime

  1. Out of the Dark: The Effect of Law Enforcement Actions on Cryptocurrency Market Prices
  2. Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams
  3. Dine and Dash: Static, Dynamic, and Economic Analysis of In-Browser Cryptojacking
  4. Assessing the Threat of Blockchain-based Botnets
  5. COINHOARDER: Tracking a Ukrainian Bitcoin Phishing Ring DNS Style
  6. Blockchain explorer: An analytical process and investigation environment for bitcoin
  7. Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin