1. A Lightweight IoT Cryptojacking Detection Mechanism in Heterogeneous Smart Home Networks

    Authors: Ege Tekiner, Abbas Acar, Selcuk Uluagac

    Security and Measurement Crimes 2022 NDSS

  2. A Centrality Analysis of the Lightning Network

    Authors: Philipp Zabka, Klaus-Tycho Foerster, S. Schmid, Christian Decker

    Security and Measurement Layer-Two Protocols 2022 FC

  3. What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network

    Authors: Matthias Grundmann, Hedwig Amberg, Max Baumstark, Hannes, Hartenstein

    Security and Measurement Decentralized Systems 2021 FC

  4. VerLoc: Verifiable Localization in Decentralized Systems

    Authors: K. Kohls, Claudia Diaz

    New Systems and Protocols 2021 Usenix Security

  5. Using Throughput-Centric Byzantine Broadcast to Tolerate Malicious Majority in Blockchains

    Authors: Ruomu Hou, Hai-Bo Yu, Prateek Saxena

    New Systems and Protocols 2021 IEEE S&P

  6. Under the Hood of the Ethereum Gossip Protocol

    Authors: Lucianna Kiffer, Asad Salman, Dave Levin, A. Mislove, C. Nita-Rotaru

    Security and Measurement Protocols 2021 FC

  7. Understand Volatility of Algorithmic Stablecoin: Modeling, Verification and Empirical Analysis

    Authors: Wenqi Zhao, Hui Li, Yuming Yuan

    Security and Measurement Economics 2021 Defi

  8. Timelocked Bribing

    Authors: Timelocked Bribing, M. Khabbazian, Tejaswi Nadahalli, Roger Wattenhofer

    Security and Measurement Decentralized Systems 2021 FC

  9. Three Attacks on Proof-of-Stake Ethereum

    Authors: C Schwarz-Schilling, J Neu, B Monnot

    Security and Measurement Protocols 2021 FC

  10. The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts

    Authors: C. F. Torres, Antonio Ken Iannillo, Arthur Gervais, R. State

    Security and Measurement Smart Contracts 2021 FC