A curated list of papers ordered by number of citations. Last updated 2019-08-20

#Title
Citations
1.Majority is not enough: Bitcoin mining is vulnerable Eyal, Ittay and Gün Sirer, Emin. 2014
1021
2.Bitter to better - How to make bitcoin a better currency Barber, Simon and Boyen, Xavier and Shi, Elaine and Uzun, Ersin. 2012
501
3.The economics of Bitcoin mining, or Bitcoin in the presence of adversaries Kroll, Joshua A and Davey, Ian C and Felten, Edward W. 2013
359
4.A Survey of Attacks on Ethereum Smart Contracts (SoK) Atzei, Nicola and Bartoletti, Massimo and Cimoli, Tiziana. 2016
333
5.Eclipse Attacks on Bitcoin's Peer-to-Peer Network Heilman, Ethan and Kendler, Alison and Zohar, Aviv and Goldberg, Sharon. 2015
296
6.Analysis of Hashrate-Based Double Spending Rosenfeld, Meni. 2014
204
7.An empirical analysis of smart contracts: platforms, applications, and design patterns Bartoletti, Massimo and Pompianu, Livio. 2017
155
8.On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency Courtois, Nicolas T and Bahack, Lear. 2013
136
9.Hijacking bitcoin: Routing attacks on cryptocurrencies Apostolaki, Maria and Zohar, Aviv and Vanbever, Laurent. 2017
128
10.Game-theoretic analysis of DDoS attacks against Bitcoin mining pools Johnson, Benjamin and Laszka, Aron and Grossklags, Jens and Vasek, Marie and Moore, Tyler. 2014
103
11.Empirical analysis of denial-of-service attacks in the Bitcoin ecosystem Vasek, Marie and Thornton, Micah and Moore, Tyler. 2014
102
12.On power splitting games in distributed computation: The case of bitcoin pooled mining Luu, Loi and Saha, Ratul and Parameshwaran, Inian and Saxena, Prateek and Hobor, Aquinas. 2015
81
13.On the Malleability of Bitcoin Transactions Marcin Andrychowicz and Stefan Dziembowski and Daniel Malinowski and Lukasz Mazurek. 2015
41
14.An Empirical Analysis of Anonymity in Zcash Kappos, George and Yousaf, Haaroon and Maller, Mary and Meiklejohn, Sarah. 2018
38
15.When cryptocurrencies mine their own business Teutsch, Jason and Jain, Sanjay and Saxena, Prateek. 2016
29
16.Low-Resource Eclipse Attacks on Ethereum’s Peer-to-Peer Network Marcus, Yuval and Heilman, Ethan and Goldberg, Sharon. 2018
24
17.Smart contracts make bitcoin mining pools vulnerable Velner, Yaron and Teutsch, Jason and Luu, Loi. 2017
23
18.Hierarchical deterministic Bitcoin wallets that tolerate key leakage Gutoski, Gus and Stebila, Douglas. 2015
21
19.Stake-Bleeding Attacks on Proof-of-Stake Blockchains Peter Gaži and Aggelos Kiayias and Alexander Russell. 2018
19
20.Hostile blockchain takeovers (short paper) Joseph Bonneau. 2018
18
21.Refund attacks on Bitcoin’s payment protocol McCorry, Patrick and Shahandashti, Siamak F and Hao, Feng. 2016
17
22.Empirical Vulnerability Analysis of Automated Smart Contracts Security Testing on Blockchains Parizi, Reza M and Dehghantanha, Ali and Choo, Kim-Kwang Raymond and Singh, Amritraj. 2018
13
23.The Bitcoin brain drain: a short paper on the use and abuse of bitcoin brain wallets Vasek, Marie and Bonneau, Joseph and Castellucci, Ryan and Keith, Cameron and Moore, Tyler. 2016
10
24.Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies Breitner, Joachim and Heninger, Nadia. 2019
5
25.SABRE: Protecting Bitcoin against Routing Attacks Apostolaki, Maria and Marti, Gian and M\"uller, Jan and Vanbever, Laurent. 2018
4
26.Flash Boys 2.0: Frontrunning, Transaction Reordering, and Consensus Instability in Decentralized Exchanges Daian, Philip and Goldfeder, Steven and Kell, Tyler and Li, Yunqi and Zhao, Xueyuan and Bentov, Iddo and Breidenbach, Lorenz and Juels, Ari. 2019
4
27.BeatCoin: Leaking Private Keys from Air-Gapped Cryptocurrency Wallets Guri, Mordechai. 2018
3
28.SoK: Transparent Dishonesty: front-running attacks on Blockchain Eskandari, Shayan and Moosavi, Seyedehmahsa and Clark, Jeremy. 2019
3
29.On the security of the BCTV Pinocchio zk-SNARK variant Gabizon, Ariel. 2019
3
30.SoK: Transparent Dishonesty: front-running attacks on Blockchain Shayan Eskandari and Seyedehmahsa Moosavi and Jeremy Clark. 2019
3
31.Burning Zerocoins for Fun and for Profit: A Cryptographic Denial-of-Spending Attack on the Zerocoin Protocol Tim Ruffing and Sri Aravinda Thyagarajan and Viktoria Ronge and Dominique Schröder. 2018
2
32.Why Preventing a Cryptocurrency Exchange Heist Isn't Good Enough Patrick McCorry and Malte M\"oser and Syed Taha Ali. 2018
1
33.The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts Torres, Christof Ferreira and Steichen, Mathis. 2019
1
34.Precise Attack Synthesis for Smart Contracts Feng, Yu and Torlak, Emina and Bodik, Rastislav. 2019
1
35.Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies Aljosha Judmayer and Nicholas Stifter and Alexei Zamyatin and Itay Tsabary and Ittay Eyal and Peter Gazi and Sarah Meiklejohn and Edgar Weippl. 2019
1
36.Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks Rodler, Michael and Li, Wenting and Karame, Ghassan O and Davi, Lucas. 2018
1
37.Pitchforks in Cryptocurrencies: Enforcing Rule Changes Through Offensive Weippl, Edgar. 2018
0
38.A New Look at the Refund Mechanism in the Bitcoin Payment Protocol Avizheh, Sepideh and Safavi-Naini, Reihaneh and Shahandashti, Siamak F. 2018
0
39.Replay Attacks and Defenses against Cross-shard Consensus in Sharded Distributed Ledgers Sonnino, Alberto and Bano, Shehar and Al-Bassam, Mustafa and Danezis, George. 2019
0
40.A Tale of Three Signatures: practical attack of ECDSA with wNAF Gabrielle De Micheli and Rémi Piau and Cécile Pierrot. 2019
0
41.A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network Tran, Muoi and Choi, Inho and Moon, Gi Jun and Vu, Anh V and Kang, Min Suk. 2020
0
42.Who Spent My EOS? On the (In) Security of Resource Management of EOS. IO Lee, Sangsup and Kim, Daejun and Kim, Dongkwan and Son, Sooel and Kim, Yongdae. 2019
0