1. Erays: Reverse Engineering Ethereum's Opaque Smart Contracts

    Authors: Yi Zhou, Deepak Kumar, Surya Bakshi, Joshua Mason, Andrew K. Miller, M. Bailey

    Security and Measurement Smart Contracts 2018 Usenix Security

  2. Egalitarian Society or Benevolent Dictatorship: The State of Cryptocurrency Governance

    Authors: Sarah Azouvi, M. Maller, S. Meiklejohn

    Security and Measurement Legal, Public Policy and Governance 2018 Bitcoin

  3. Digging into Browser-based Crypto Mining

    Authors: J Ruth, T Zimmermann, K Wolsing

    Security and Measurement Crimes 2018 IMC

  4. Determining an Optimal Threshold on the Online Reserves of a Bitcoin Exchange

    Authors: Samvit Jain, E. Felten, Steven Goldfeder

    Security and Measurement Exchanges 2018 WEIS

  5. Detecting Token Systems on Ethereum

    Authors: Michael Frowis, A. Fuchs, Rainer Bohme

    Security and Measurement Decentralized Systems 2018 FC

  6. Decentralization in Bitcoin and Ethereum Networks

    Authors: Adem Efe Gencer, S. Basu, Ittay Eyal, R. V. Renesse, E. Sirer

    Security and Measurement Decentralized Systems 2018 FC

  7. COINHOARDER: Tracking a Ukrainian Bitcoin Phishing Ring DNS Style

    Authors: Artsiom Holub, Jeremiah O’Connor

    Security and Measurement Crimes 2018 eCrime

  8. Analyzing the Bitcoin Ponzi Scheme Ecosystem

    Authors: Marie Vasek, T. Moore

    Security and Measurement Crimes 2018 Bitcoin

  9. Analyzing Ethereum's Contract Topology

    Authors: Lucianna Kiffer, Dave Levin, A. Mislove

    Security and Measurement Decentralized Systems 2018 IMC

  10. Analysis of the Bitcoin UTXO set

    Authors: S. Delgado-Segura, C. Perez-Sola, G. Navarro-Arribas, J. Herrera-Joancomarti

    Security and Measurement Decentralized Systems 2018 Bitcoin