1. Stake Shift in Major Cryptocurrencies: An Empirical Study

    Authors: Rainer Stutz, Peter Gazi, Bernhard Haslhofer, Jacob Illum

    Security and Measurement Decentralized Systems 2020 FC

  2. SoK: Layer-Two Blockchain Protocols

    Authors: L. Gudgeon, Pedro A. Moreno-Sanchez, Stefanie Roos, Patrick McCorry, Arthur Gervais

    Security and Measurement Layer-Two Protocols 2020 FC

  3. Semantic Understanding of Smart Contracts: Executable Operational Semantics of Solidity

    Authors: Jiao Jiao, Shuanglong Kan, Shang-Wei Lin, D. Sanan, Yang Liu, Jun Sun

    Security and Measurement Smart Contracts 2020 IEEE S&P

  4. Selfish Mining Re-Examined

    Authors: Kevin Negy, P. Rizun, E. Sirer

    Security and Measurement Mining 2020 FC

  5. Security Analysis on dBFT protocol of NEO

    Authors: Qin Wang, Jiangshan Yu, Zhiniang Peng, Van Cuong Bui, Shiping Chen, Yong Ding, Yang Xiang

    Security and Measurement Decentralized Systems 2020 FC

  6. Revisiting Transactional Statistics of High-scalability Blockchain

    Authors: Daniel Perez, Jiahua Xu, B. Livshits

    Security and Measurement Decentralized Systems 2020 IMC

  7. Remote Side-Channel Attacks on Anonymous Transactions

    Authors: Florian Tramer, D. Boneh, K. Paterson

    Security and Measurement Decentralized Systems 2020 Usenix Security

  8. Pricing Security in Proof-of-Work Systems

    Authors: G Bissias, R Bohme, D Thibodeau

    Security and Measurement Protocols 2020 WEIS

  9. NC-Max: Breaking the Security-Performance Tradeoff in Nakamoto Consensus

    Authors: R Zhang, D Zhang, Q Wang, S Wu, J Xie

    Security and Measurement Protocols 2020 NDSS

  10. LockDown: Balance Availability Attack against Lightning Network Channels

    Authors: C. Perez-Sola, Alejandro Ranchal-Pedrosa, J. Herrera-Joancomarti, G. Navarro-Arribas, Joaquin Garcia

    Security and Measurement Layer-Two Protocols 2020 FC