Papers By Year

2013

  1. A Fistful of Bitcoins: Characterizing Payments Among Men with No Names

2014

  1. Trends, Tips, Tolls: A Longitudinal Study of Bitcoin Transaction Fees
  2. Towards Risk Scoring of Bitcoin Transactions
  3. The Bitcoin P2P network
  4. The Bitcoin Market Potential Index
  5. Rational Zero: Economic Security for Zerocoin with Everlasting Anonymity
  6. How Did Dread Pirate Roberts Acquire and Protect His Bitcoin Wealth?
  7. Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools
  8. Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem
  9. Challenges and Opportunities Associated with a Bitcoin-based Transaction Rating System
  10. Bitcoin: A First Legal Analysis - with Reference to German and American Law

2015

  1. ZombieCoin: Powering Next-Generation Botnets with Bitcoin
  2. When Bitcoin Mining Pools Run Dry: A Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining Pools
  3. On the Malleability of Bitcoin Transactions
  4. Issues in Designing a Bitcoin-Like Community Currency
  5. Cryptographic Currencies from a Tech-Policy Perspective: Key Policy Issues and Technical Directions

2016

  1. Why buy when you can rent? Bribery attacks on Bitcoin-style consensus
  2. The Ring of Gyges: Investigating the Future of Criminal Smart Contracts
  3. The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy
  4. The Bitcoin Brain Drain: A Short Paper on the Use and Abuse of Bitcoin Brain Wallets
  5. Stressing Out: Bitcoin 'Stress Testing'
  6. Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab
  7. Refund Attacks on Bitcoin's Payment Protocol
  8. On the Security and Performance of Proof of Work Blockchains
  9. On the Instability of Bitcoin Without the Block Reward
  10. Making Smart Contracts Smarter
  11. Join Me on a Market for Anonymity
  12. Hijacking Bitcoin: Routing Attacks on Cryptocurrencies
  13. Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin

2017

  1. Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services
  2. The Impact of DDoS and Other Security Shocks on Bitcoin Currency Exchanges: Evidence from Mt. Gox
  3. Smart Contracts Make Bitcoin Mining Pools Vulnerable
  4. Real Hidden Identity-Based Signatures
  5. Price Manipulation in the Bitcoin Ecosystem
  6. Incentivizing Double-Spend Collusion in Bitcoin
  7. Exchange Pattern Mining in the Bitcoin Transaction Directed Hypergraph
  8. Designing Secure Ethereum Smart Contracts: A Finite State Machine Based Approach
  9. Could Network Information Facilitate Address Clustering in Bitcoin?
  10. Blockchain explorer: An analytical process and investigation environment for bitcoin
  11. BlockSci: Design and applications of a blockchain analysis platform
  12. Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin
  13. An efficient self-blindable attribute-based credential scheme
  14. An analysis of Bitcoin OP_RETURN metadata

2018

  1. teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts
  2. ZEUS: Analyzing Safety of Smart Contracts
  3. TxProbe: Discovering Bitcoin's Network Topology Using Orphan Transactions
  4. Tracing Transactions Across Cryptocurrency Ledgers
  5. The rise and fall of cryptocurrencies
  6. The Gap Game
  7. The Economics of Cryptocurrency Pump and Dump Schemes
  8. Smart Contracts for Bribing Miners
  9. Sex, drugs, and bitcoin: How much illegal activity is financed through cryptocurrencies?
  10. Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks
  11. SECURIFY: Practical Security Analysis of Smart Contracts
  12. SABRE: Protecting Bitcoin against Routing Attacks
  13. Ransomware payments in the Bitcoin ecosystem
  14. MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense
  15. Measuring Ethereum Network Peers
  16. Hostile Blockchain Takeovers
  17. Exploiting Transaction Accumulation and Double Spends for Topology Inference in Bitcoin
  18. Erays: Reverse Engineering Ethereum's Opaque Smart Contracts
  19. Egalitarian Society or Benevolent Dictatorship: The State of Cryptocurrency Governance
  20. Digging into Browser-based Crypto Mining
  21. Determining an Optimal Threshold on the Online Reserves of a Bitcoin Exchange
  22. Detecting Token Systems on Ethereum
  23. Decentralization in Bitcoin and Ethereum Networks
  24. COINHOARDER: Tracking a Ukrainian Bitcoin Phishing Ring DNS Style
  25. Analyzing the Bitcoin Ponzi Scheme Ecosystem
  26. Analyzing Ethereum's Contract Topology
  27. Analysis of the Bitcoin UTXO set
  28. An Empirical Analysis of Monero Cross-Chain Traceability
  29. An Empirical Analysis of Anonymity in Zcash
  30. A better method to analyze blockchain consistency
  31. A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin
  32. Measuring Profitability of Alternative Crypto-currencies

2019

  1. Why Bitcoin will Fail to Scale?
  2. What are the Actual Flaws in Important Smart Contracts (and How Can We Find Them)?
  3. Virtual currencies and fundamental rights
  4. VeriSmart: A Highly Precise Safety Verifier for Ethereum Smart Contracts
  5. TokenScope: Automatically Detecting Inconsistent Behaviors of Cryptocurrency Tokens in Ethereum
  6. The Attack of the Clones Against Proof-of-Authority
  7. The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts
  8. The Anatomy of a Cryptocurrency Pump-and-Dump Scheme
  9. Replay Attacks and Defenses Against Cross-shard Consensus in Sharded Distributed Ledgers
  10. Privacy Aspects and Subliminal Channels in Zcash
  11. Power Adjusting and Bribery Racing: Novel Mining Attacks in the Bitcoin System
  12. New Empirical Traceability Analysis of CryptoNote-Style Blockchains
  13. Minimizing Trust in Hardware Wallets with Two Factor Signatures
  14. Measuring Ethereum-based ERC20 Token Networks
  15. MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol
  16. Lay Down the Common Metrics: Evaluating Proof-of-Work Consensus Protocols' Security
  17. Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale
  18. I Can't Believe It's Not Stake! Resource Exhaustion Attacks on PoS
  19. HyperService: Interoperability and Programmability Across Heterogeneous Blockchains
  20. How to profit from payments channels
  21. Echoes of the Past: Recovering Blockchain Metrics From Merged Mining
  22. Diversification Across Mining Pools: Optimal Mining Strategies under PoW
  23. Dine and Dash: Static, Dynamic, and Economic Analysis of In-Browser Cryptojacking
  24. Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web
  25. Coded Merkle Tree: Solving Data Availability Attacks in Blockchains
  26. Characterizing Code Clones in the Ethereum Smart Contract Ecosystem
  27. Broken Metre: Attacking Resource Metering in EVM
  28. Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash?
  29. Bitcoin redux
  30. Bitcoin Security under Temporary Dishonest Majority
  31. BDoS: Blockchain Denial-of-Service
  32. Assessing the Threat of Blockchain-based Botnets
  33. An Exploration of Code Diversity in the Cryptocurrency Landscape
  34. An Empirical Analysis of Blockchain Forks in Bitcoin
  35. A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network
  36. A Formal Treatment of Hardware Wallets
  37. A Formal Treatment of Deterministic Wallets
  38. A Deep Dive into Bitcoin Mining Pools An Empirical Analysis of Mining Shares
  39. Identifying the Arbitrageurs on Mt. Gox: First Insights from the Leaked Dataset

2020

  1. eThor: Practical and Provably Sound Static Analysis of Ethereum Smart Contracts
  2. VerX: Safety Verification of Smart Contracts
  3. TXSPECTOR: Uncovering Attacks in Ethereum from Transactions
  4. Surviving the Cryptojungle: Perception and Management of Risk Among North American Cryptocurrency (Non)Users
  5. Stake Shift in Major Cryptocurrencies: An Empirical Study
  6. SoK: Layer-Two Blockchain Protocols
  7. Semantic Understanding of Smart Contracts: Executable Operational Semantics of Solidity
  8. Selfish Mining Re-Examined
  9. Security Analysis on dBFT protocol of NEO
  10. Revisiting Transactional Statistics of High-scalability Blockchain
  11. Remote Side-Channel Attacks on Anonymous Transactions
  12. Pricing Security in Proof-of-Work Systems
  13. NC-Max: Breaking the Security-Performance Tradeoff in Nakamoto Consensus
  14. LockDown: Balance Availability Attack against Lightning Network Channels
  15. Leveraging Bitcoin Testnet for Bidirectional Botnet Command and Control Systems
  16. Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability
  17. Exploring the Monero Peer-to-Peer Network
  18. Everything is a Race and Nakamoto Always Wins
  19. EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts
  20. ETHBMC: A Bounded Model Checker for Smart Contracts
  21. Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams
  22. Congestion Attacks in Payment Channel Networks
  23. BFT Protocol Forensics
  24. Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit
  25. A new wolf in town? Pump-and-dump manipulation in cryptocurrency markets
  26. An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem
  27. An Empirical Analysis of Privacy in the Lightning Network
  28. Address clustering heuristics for Ethereum

2021

  1. What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network
  2. VerLoc: Verifiable Localization in Decentralized Systems
  3. Using Throughput-Centric Byzantine Broadcast to Tolerate Malicious Majority in Blockchains
  4. Under the Hood of the Ethereum Gossip Protocol
  5. Understand Volatility of Algorithmic Stablecoin: Modeling, Verification and Empirical Analysis
  6. Timelocked Bribing
  7. Three Attacks on Proof-of-Stake Ethereum
  8. The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts
  9. The Exact Security of BIP32 Wallets
  10. The Complex Shape of Anonymity in Cryptocurrencies: Case Studies from a Systematic Approach
  11. SyncAttack: Double-spending in Bitcoin Without Mining Power
  12. SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Reinforcement Learning
  13. SoK: Mitigation of Front-running in Decentralized Finance
  14. SoK: Cryptojacking Malware
  15. SmartPulse: Automated Checking of Temporal Properties in Smart Contracts
  16. Smart Contract Vulnerabilities: Vulnerable Does Not Imply Exploited
  17. SmarTest: Effectively Hunting Vulnerable Transaction Sequences in Smart Contracts through Language Model-Guided Symbolic Execution
  18. Selfish & opaque transaction ordering in the Bitcoin blockchain: the case for chain neutrality
  19. Selfish Mining Attacks Exacerbated by Elastic Hash Supply
  20. Securing Parallel-chain Protocols under Variable Mining Power
  21. SGUARD: Towards Fixing Vulnerable Smart Contracts Automatically
  22. SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds
  23. Revisiting Nakamoto Consensus in Asynchronous Networks: A Comprehensive Analysis of Bitcoin Safety and Chain Quality
  24. Resurrecting Address Clustering in Bitcoin
  25. Quantifying Blockchain Extractable Value: How dark is the forest?
  26. PERIMETER: A network-layer attack on the anonymity of cryptocurrencies
  27. Out of the Dark: The Effect of Law Enforcement Actions on Cryptocurrency Market Prices
  28. On the Routing-Aware Peering against Network-Eclipse Attacks in Bitcoin
  29. On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols
  30. Measuring Asset Composability as a Proxy for Ecosystem Integration
  31. Maximizing Extractable Value from Automated Market Makers
  32. MAD-HTLC: Because HTLC is Crazy-Cheap to Attack
  33. Kicking-the-Bucket: Fast Privacy-Preserving Trading Using Buckets
  34. How to Exploit a DeFi Project
  35. How Does Blockchain Security Dictate Blockchain Implementation?
  36. Frontrunner Jones and the Raiders of the Dark Forest: An Empirical Study of Frontrunning on the Ethereum Blockchain
  37. Formal Analysis of Composable DeFi Protocols
  38. Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications
  39. Everything You Ever Wanted to Know About Bitcoin Mixers
  40. EOSAFE: Security Analysis of EOSIO Smart Contracts
  41. Disentangling Decentralized Finance (DeFi) Compositions
  42. Differential Privacy in Constant Function Market Makers
  43. DETER: Denial of Ethereum Txpool sERvices
  44. Cyclic Arbitrage in Decentralized Exchange Markets
  45. Cross-Layer Deanonymization Methods in the Lightning Protocol
  46. ConFuzzius: A Data Dependency-Aware Hybrid Fuzzer for Smart Contracts
  47. Compositional Security for Reentrant Applications
  48. Centralized Governance in Decentralized Finance
  49. Be Aware of Your Leaders
  50. As Strong As Its Weakest Link: How to Break Blockchain DApps at RPC Service
  51. Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing
  52. An empirical study of DeFi liquidations: incentives, risks, and instabilities
  53. Analysis and Probing of Parallel Channels in the Lightning Network
  54. A Security Framework for Distributed Ledgers

2022

  1. Multi-Certificate Attacks against Proof-of-Elapsed-Time and Their Countermeasures
  2. An empirical study of two Bitcoin artifacts through deep learning
  3. ZeeStar: Private Smart Contracts by Homomorphic Encryption and Zero-knowledge Proofs
  4. Universal Atomic Swaps: Secure Exchange of Coins Across All Blockchains
  5. The Case for Variable Fees in Constant Product Markets: An Agent Based Simulation
  6. Suborn Channels: Incentives Against Timelock Bribes
  7. Speeding Dumbo: Pushing Asynchronous BFT Closer to Practice
  8. Speculative Multipliers on DeFi: Quantifying On-Chain Leverage Risks
  9. Shaduf: Non-Cycle Payment Channel Rebalancing
  10. Rust, but verify: The economics of scams in initial coin offerings
  11. MatRiCT+: More Efficient Post-Quantum Private Blockchain Payments
  12. India's 'Aadhaar' Biometric ID: Structure, Security, and Vulnerabilities
  13. How to Peel a Million: Validating and Expanding Bitcoin Clusters
  14. Foundations of Dynamic BFT
  15. Extracting Godl [sic] from the Salt Mines: Ethereum Miners Extracting Value
  16. COBRA: Dynamic Proactive Secret Sharing for Confidential BFT Services
  17. Arbitrage attack: Miners of the world, unite!
  18. An Empirical Study of Market Inefficiencies in Uniswap and SushiSwap
  19. A Short Survey on Business Models of Decentralized Finance
  20. A Lightweight IoT Cryptojacking Detection Mechanism in Heterogeneous Smart Home Networks
  21. A Centrality Analysis of the Lightning Network