Papers (123)

#Title
Citations
1.Majority is not enough: Bitcoin mining is vulnerable Eyal, Ittay and Gün Sirer, Emin. 2014  
1562
2.A fistful of bitcoins: characterizing payments among men with no names Meiklejohn, Sarah and Pomarole, Marjori and Jordan, Grant and Levchenko, Kirill and McCoy, Damon and Voelker, Geoffrey M and Savage, Stefan. 2013  
969
3.Bitter to better - How to make bitcoin a better currency Barber, Simon and Boyen, Xavier and Shi, Elaine and Uzun, Ersin. 2012
669
4.A survey of attacks on ethereum smart contracts (sok) Atzei, Nicola and Bartoletti, Massimo and Cimoli, Tiziana. 2017  
656
5.A survey on the security of blockchain systems Li, Xiaoqi and Jiang, Peng and Chen, Ting and Luo, Xiapu and Wen, Qiaoyan. 2017
527
6.The economics of Bitcoin mining, or Bitcoin in the presence of adversaries Kroll, Joshua A and Davey, Ian C and Felten, Edward W. 2013
508
7.Eclipse Attacks on Bitcoin's Peer-to-Peer Network Heilman, Ethan and Kendler, Alison and Zohar, Aviv and Goldberg, Sharon. 2015  
468
8.A survey on security and privacy issues of bitcoin Conti, Mauro and Kumar, E Sandeep and Lal, Chhagan and Ruj, Sushmita. 2018
408
9.Deanonymisation of clients in Bitcoin P2P network Biryukov, Alex and Khovratovich, Dmitry and Pustogarov, Ivan. 2014
356
10.Analysis of Hashrate-Based Double Spending Rosenfeld, Meni. 2014
319
11.An empirical analysis of smart contracts: platforms, applications, and design patterns Bartoletti, Massimo and Pompianu, Livio. 2017
284
12.Is bitcoin a decentralized currency? Gervais, Arthur and Karame, Ghassan O and Capkun, Vedran and Capkun, Srdjan. 2014
273
13.Hijacking bitcoin: Routing attacks on cryptocurrencies Apostolaki, Maria and Zohar, Aviv and Vanbever, Laurent. 2017
247
14.Securify: Practical security analysis of smart contracts Tsankov, Petar and Dan, Andrei and Drachsler-Cohen, Dana and Gervais, Arthur and Buenzli, Florian and Vechev, Martin. 2018  
233
15.Zeus: Analyzing safety of smart contracts Kalra, Sukrit and Goel, Seep and Dhawan, Mohan and Sharma, Subodh. 2018   
217
16.On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency Courtois, Nicolas T and Bahack, Lear. 2013
184
17.Game-theoretic analysis of DDoS attacks against Bitcoin mining pools Johnson, Benjamin and Laszka, Aron and Grossklags, Jens and Vasek, Marie and Moore, Tyler. 2014
161
18.Empirical analysis of denial-of-service attacks in the Bitcoin ecosystem Vasek, Marie and Thornton, Micah and Moore, Tyler. 2014
161
19.On power splitting games in distributed computation: The case of bitcoin pooled mining Luu, Loi and Saha, Ratul and Parameshwaran, Inian and Saxena, Prateek and Hobor, Aquinas. 2015
115
20.Madmax: Surviving out-of-gas conditions in ethereum smart contracts Grech, Neville and Kong, Michael and Jurisevic, Anton and Brent, Lexi and Scholz, Bernhard and Smaragdakis, Yannis. 2018
110
21.A traceability analysis of monero’s blockchain Kumar, Amrit and Fischer, Cl\'ement and Tople, Shruti and Saxena, Prateek. 2017
105
22.Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft) Lear Bahack. 2013
101
23.teether: Gnawing at ethereum to automatically exploit smart contracts Krupp, Johannes and Rossow, Christian. 2018  
91
24.Vandal: A scalable security analysis framework for smart contracts Brent, Lexi and Jurisevic, Anton and Kong, Michael and Liu, Eric and Gauthier, Francois and Gramoli, Vincent and Holz, Ralph and Scholz, Bernhard. 2018
80
25.An Empirical Analysis of Anonymity in Zcash Kappos, George and Yousaf, Haaroon and Maller, Mary and Meiklejohn, Sarah. 2018  
67
26.Empirical Vulnerability Analysis of Automated Smart Contracts Security Testing on Blockchains Parizi, Reza M and Dehghantanha, Ali and Choo, Kim-Kwang Raymond and Singh, Amritraj. 2018
64
27.On the Malleability of Bitcoin Transactions Marcin Andrychowicz and Stefan Dziembowski and Daniel Malinowski and Lukasz Mazurek. 2015
63
28.Bitcoin's security model revisited Sompolinsky, Yonatan and Zohar, Aviv. 2016
62
29.Low-Resource Eclipse Attacks on Ethereum’s Peer-to-Peer Network Marcus, Yuval and Heilman, Ethan and Goldberg, Sharon. 2018
57
30.Stake-Bleeding Attacks on Proof-of-Stake Blockchains Peter Gaži and Aggelos Kiayias and Alexander Russell. 2018
56
31.Osiris: Hunting for integer bugs in ethereum smart contracts Torres, Christof Ferreira and Sch\"utte, Julian and others. 2018
48
32.Smashing ethereum smart contracts for fun and real profit Mueller, Bernhard. 2018  
41
33.When cryptocurrencies mine their own business Teutsch, Jason and Jain, Sanjay and Saxena, Prateek. 2016
40
34.Smart contracts make bitcoin mining pools vulnerable Velner, Yaron and Teutsch, Jason and Luu, Loi. 2017
36
35.Hostile blockchain takeovers (short paper) Joseph Bonneau. 2018
35
36.Revisiting Difficulty Control for Blockchain Systems Meshkov, Dmitry and Chepurnoy, Alexander and Jansen, Marc. 2017
34
37.Hierarchical deterministic Bitcoin wallets that tolerate key leakage Gutoski, Gus and Stebila, Douglas. 2015
34
38.Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks Rodler, Michael and Li, Wenting and Karame, Ghassan O and Davi, Lucas. 2018  
34
39.Ethereum smart contracts: Security vulnerabilities and security tools Dika, Ardit. 2017
32
40.Flash Boys 2.0: Frontrunning, Transaction Reordering, and Consensus Instability in Decentralized Exchanges Daian, Philip and Goldfeder, Steven and Kell, Tyler and Li, Yunqi and Zhao, Xueyuan and Bentov, Iddo and Breidenbach, Lorenz and Juels, Ari. 2019  
30
41.Anonymous alone? measuring Bitcoin’s second-generation anonymization techniques M\"oser, Malte and B\"ohme, Rainer. 2017
29
42.Refund attacks on Bitcoin’s payment protocol McCorry, Patrick and Shahandashti, Siamak F and Hao, Feng. 2016
28
43.On the linkability of Zcash transactions Quesnelle, Jeffrey. 2017
28
44.Why buy when you can rent? bribery attacks on bitcoin consensus Bonneau, Joseph and Felten, Edward W and Goldfeder, Steven and Kroll, Joshua A and Narayanan, Arvind. 2016
26
45.A survey of tools for analyzing ethereum smart contracts Di Angelo, Monika and Salzer, Gernot. 2019
26
46.The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts Torres, Christof Ferreira and Steichen, Mathis. 2019   
21
47.Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies Aljosha Judmayer and Nicholas Stifter and Alexei Zamyatin and Itay Tsabary and Ittay Eyal and Peter Gazi and Sarah Meiklejohn and Edgar Weippl. 2019
19
48.Committing to quantum resistance: A slow defence for Bitcoin against a fast quantum computing attack Stewart, Iain and Ilie, D and Zamyatin, Alexei and Werner, Sam and Torshizi, MF and Knottenbelt, William J. 2018
19
49.Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management, Wallet and Cold Storage Solutions in Presence of Poor RNG Events. Courtois, Nicolas T and Valsorda, Filippo and Emirdag, Pinar. 2014
19
50.Learning to Fuzz from Symbolic Execution with Application to Smart Contracts He, Jingxuan and Balunovi\'c, Mislav and Ambroladze, Nodar and Tsankov, Petar and Vechev, Martin. 2019
18
51.SABRE: Protecting Bitcoin against Routing Attacks Apostolaki, Maria and Marti, Gian and M\"uller, Jan and Vanbever, Laurent. 2018
17
52.Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies Breitner, Joachim and Heninger, Nadia. 2019  
17
53.The Bitcoin brain drain: a short paper on the use and abuse of bitcoin brain wallets Vasek, Marie and Bonneau, Joseph and Castellucci, Ryan and Keith, Cameron and Moore, Tyler. 2016
17
54.Precise Attack Synthesis for Smart Contracts Feng, Yu and Torlak, Emina and Bodik, Rastislav. 2019
15
55.Monitoring smart contracts: Contractlarva and open challenges beyond Azzopardi, Shaun and Ellul, Joshua and Pace, Gordon J. 2018
14
56.SoK: Transparent Dishonesty: front-running attacks on Blockchain Eskandari, Shayan and Moosavi, Seyedehmahsa and Clark, Jeremy. 2019
12
57.Harvey: A greybox fuzzer for smart contracts W\"ustholz, Valentin and Christakis, Maria. 2019
11
58.BeatCoin: Leaking Private Keys from Air-Gapped Cryptocurrency Wallets Guri, Mordechai. 2018
9
59.Partitioning Attacks on Bitcoin: Colliding Space, Time and Logic Saad, Muhammad and Cook, Victor and Nguyen, Lan and Thai, My T and Mohaisen, Aziz. 2019
9
60.Why Preventing a Cryptocurrency Exchange Heist Isn't Good Enough Patrick McCorry and Malte M\"oser and Syed Taha Ali. 2018
8
61.On the security of the BCTV Pinocchio zk-SNARK variant Gabizon, Ariel. 2019
8
62.How perfect offline wallets can still leak bitcoin private keys Verb\"ucheln, Stephan. 2015
8
63.Temporary censorship attacks in the presence of rational miners Winzer, Fredrik and Herd, Benjamin and Faust, Sebastian. 2019
8
64.Running on Fumes Albert, Elvira and Gordillo, Pablo and Rubio, Albert and Sergey, Ilya. 2019
8
65.Burning Zerocoins for Fun and for Profit: A Cryptographic Denial-of-Spending Attack on the Zerocoin Protocol Tim Ruffing and Sri Aravinda Thyagarajan and Viktoria Ronge and Dominique Schröder. 2018
7
66.Replay Attacks and Defenses against Cross-shard Consensus in Sharded Distributed Ledgers Sonnino, Alberto and Bano, Shehar and Al-Bassam, Mustafa and Danezis, George. 2019
7
67.Hijacking Routes in Payment Channel Networks: A Predictability Tradeoff Saar Tochner and Stefan Schmid and Aviv Zohar. 2019
7
68.Broken Metre: Attacking Resource Metering in EVM Daniel Perez and Benjamin Livshits. 2019
7
69.LockDown: Balance Availability Attack against Lightning Network Channels Cristina Pérez-Solà and Alejandro Ranchal-Pedrosa and Jordi Herrera-Joancomartí and Guillermo Navarro-Arribas and Joaquin Garcia-Alfaro. 2019
7
70.An empirical analysis of monero cross-chain traceability Hinteregger, Abraham and Haslhofer, Bernhard. 2018
7
71.Power Adjusting and Bribery Racing: Novel Mining Attacks in the Bitcoin System Gao, Shang and Li, Zecheng and Peng, Zhe and Xiao, Bin. 2019
7
72.A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network Tran, Muoi and Choi, Inho and Moon, Gi Jun and Vu, Anh V and Kang, Min Suk. 2020
6
73.Who Spent My EOS? On the (In) Security of Resource Management of EOS. IO Lee, Sangsup and Kim, Daejun and Kim, Dongkwan and Son, Sooel and Kim, Yongdae. 2019
6
74.Cryptanalysis of Curl-P and Other Attacks on the IOTA Cryptocurrency. Heilman, Ethan and Narula, Neha and Tanzer, Garrett and Lovejoy, James and Colavita, Michael and Virza, Madars and Dryja, Tadge. 2019
6
75.Smartanvil: Open-source tool suite for smart contract analysis Ducasse, St\'ephane and Rocha, Henrique and Bragagnolo, Santiago and Denker, Marcus and Francomme, Cl\'ement. 2019
6
76.SquirRL: Automating Attack Discovery on Blockchain Incentive Mechanisms with Deep Reinforcement Learning Hou, Charlie and Zhou, Mingxun and Ji, Yan and Daian, Phil and Tramer, Florian and Fanti, Giulia and Juels, Ari. 2019
6
77.Cascading Machine Learning to Attack Bitcoin Anonymity Zola, Francesco and Eguimendia, Maria and Bruse, Jan Lukas and Urrutia, Raul Orduna. 2019
5
78.Toward Active and Passive Confidentiality Attacks On Cryptocurrency Off-Chain Networks Nisslmueller, Utz and Foerster, Klaus-Tycho and Schmid, Stefan and Decker, Christian. 2020
5
79.The Decentralized Financial Crisis: Attacking DeFi Gudgeon, Lewis and Perez, Daniel and Harz, Dominik and Gervais, Arthur and Livshits, Benjamin. 2020  
5
80.Everything is a Race and Nakamoto Always Wins Amir Dembo and Sreeram Kannan and Ertem Nusret Tas and David Tse and Pramod Viswanath and Xuechao Wang and Ofer Zeitouni. 2020
5
81.Privacy and linkability of mining in zcash Biryukov, Alex and Feher, Daniel. 2019
5
82.On the (In)security of Kilian-Based SNARGs James Bartusek and Liron Bronfman and Justin Holmgren and Fermi Ma and Ron Rothblum. 2019
4
83.What are the Actual Flaws in Important Smart Contracts (and How Can We Find Them)? Groce, Alex and Feist, Josselin and Grieco, Gustavo and Colburn, Michael. 2019
4
84.Out of Oddity -- New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems Tim Beyne and Anne Canteaut and Itai Dinur and Maria Eichlseder and Gregor Leander and Gaëtan Leurent and María Naya-Plasencia and Léo Perrin and Yu Sasaki and Yosuke Todo and Friedrich Wiemer. 2020
4
85.Mind the Middle Layer: The HADES Design Strategy Revisited Nathan Keller and Asaf Rosemarin. 2020
4
86.Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit Qin, Kaihua and Zhou, Liyi and Livshits, Benjamin and Gervais, Arthur. 2020  
4
87.Privacy Aspects and Subliminal Channels in Zcash Biryukov, Alex and Feher, Daniel and Vitto, Giuseppe. 2019
3
88.On the Profitability of Selfish Mining Against Multiple Difficulty Adjustment Algorithms Michael Davidson and Tyler Diamond. 2020
3
89.Effective Cryptocurrency Regulation Through Blacklisting M\"oser, Malte and Narayanan, Arvind. 2019
2
90.BDoS: Blockchain Denial of Service Michael Mirkin and Yan Ji and Jonathan Pang and Ariah Klages-Mundt and Ittay Eyal and Ari Jules. 2019
2
91.Short Selling Attack: A Self-Destructive But Profitable 51% Attack On PoS Blockchains Suhyeon Lee and Seungjoo Kim. 2020
2
92.Remote Side-Channel Attacks on Anonymous Transactions Florian Tramèr and Dan Boneh and Kenneth G. Paterson. 2020
2
93.The security of Groups of Unknown Order based on Jacobians of Hyperelliptic Curves Jonathan Lee. 2020
2
94.Vyper: A Security Comparison with Solidity Based on Common Vulnerabilities Kaleem, Mudabbir and Laszka, Aron. 2020
2
95.Why Do Smart Contracts Self-Destruct? Investigating the Selfdestruct Function on Ethereum Chen, Jiachi and Xia, Xin and Lo, David and Grundy, John. 2020
2
96.A New Look at the Refund Mechanism in the Bitcoin Payment Protocol Avizheh, Sepideh and Safavi-Naini, Reihaneh and Shahandashti, Siamak F. 2018
1
97.Selfish Behavior in the Tezos Proof-of-Stake Protocol Neuder, Michael and Moroz, Daniel J and Rao, Rithvik and Parkes, David C. 2019
1
98.WIP: Finding Bugs Automatically in Smart Contracts with Parameterized Invariants Bernardi, Thomas and Dor, Nurit and Fedotov, Anastasia and Grossman, Shelly and Immerman, Neil and Jackson, Daniel and Nutz, Alex and Oppenheim, Lior and Pistiner, Or and Rinetzky, Noam and others. 2020
1
99.A Quantitative Analysis of Security, Anonymity and Scalability for the Lightning Network Sergei Tikhomirov and Pedro Moreno-Sanchez and Matteo Maffei. 2020
1
100.FloodXMR: Low-cost transaction flooding attack with Monero's bulletproof protocol. Chervinski, Joao Ot\'avio Massari and Kreutz, Diego and Yu, Jiangshan. 2019
1
101.Flood \& Loot: A Systemic Attack On The Lightning Network Harris, Jona and Zohar, Aviv. 2020  
1
102.Pitchforks in Cryptocurrencies: Enforcing Rule Changes Through Offensive Weippl, Edgar. 2018
0
103.A Tale of Three Signatures: practical attack of ECDSA with wNAF Gabrielle De Micheli and Rémi Piau and Cécile Pierrot. 2019
0
104.Short Paper: Towards Characterizing Sybil Attacks in Cryptocurrency Mixers Mikerah Quintyne-Collins. 2019
0
105.PING and REJECT:The Impact of Side-Channels on Zcash Privacy Florian Tramèr and Dan Boneh and Kenneth G. Paterson. 2019
0
106.{\AE}GIS: Smart Shielding of Smart Contracts Ferreira Torres, Christof and Baden, Mathis and Norvill, Robert and Jonker, Hugo. 2019
0
107.Winkle: Foiling Long-Range Attacks in Proof-of-Stake Systems Sarah Azouvi and George Danezis and Valeria Nikolaenko. 2019
0
108.Bitcoin Crypto–Bounties for Quantum Capable Adversaries Dragos Ioan Ilie and Kostis Karantias and William J. Knottenbelt. 2020
0
109.Committing to Quantum Resistance, Better: A Speed–and–Risk–Configurable Defence for Bitcoin against a Fast Quantum Computing Attack Dragos Ioan Ilie and William J. Knottenbelt and Iain Stewart. 2020
0
110.EthScope: A Transaction-centric Security Analytics Framework to Detect Malicious Smart Contracts on Ethereum Wu, Lei and Wu, Siwei and Zhou, Yajin and Li, Runhuai and Wang, Zhi and Luo, Xiapu and Wang, Cong and Ren, Kui. 2020
0
111.Alt-Coin Traceability Claire Ye and Chinedu Ojukwu and Anthony Hsu and Ruiqi Hu. 2020
0
112.Blockchain is Watching You: Profiling and Deanonymizing Ethereum Users B\'eres, Ferenc and Seres, Istv\'an Andr\'as and Bencz\'ur, Andr\'as A and Quintyne-Collins, Mikerah. 2020
0
113.Towards Smart Hybrid Fuzzing for Smart Contracts Torres, Christof Ferreira and Iannillo, Antonio Ken and Gervais, Arthur and State, Radu. 2020
0
114.Bitcoin covenants unchained Bartoletti, Massimo and Lande, Stefano and Zunino, Roberto. 2020
0
115.On the Confidentiality of Amounts in Grin Suyash Bagad and Saravanan Vijayakumaran. 2020
0
116.Minerva: The curse of ECDSA nonces Jan Jancar and Vladimir Sedlacek and Petr Svenda and Marek Sys. 2020
0
117.MAD-HTLC: Because HTLC is Crazy-Cheap to Attack Itay Tsabary and Matan Yechieli and Ittay Eyal. 2020  
0
118.Stablecoins 2.0: Economic Foundations and Risk-based Models Ariah Klages-Mundt and Dominik Harz and Lewis Gudgeon and Jun-You Liu and Andreea Minca. 2020
0
119.Timelocked Bribes Majid Khabbazian and Tejaswi Nadahalli and Roger Wattenhofer. 2020
0
120.Cross-Layer Deanonymization Methods in the Lightning Protocol Romiti, Matteo and Victor, Friedhelm and Moreno-Sanchez, Pedro and Haslhofer, Bernhard and Maffei, Matteo. 2020
0
121.SmartBugs: A Framework to Analyze Solidity Smart Contracts Ferreira, Jo\~ao F and Cruz, Pedro and Durieux, Thomas and Abreu, Rui. 2020  
0
122.Undercutting Bitcoin Is Not Profitable Tiantian Gong and Mohsen Minaei and Wenhai Sun and Aniket Kate. 2020
0
123.Attacking Threshold Wallets Jean-Philippe Aumasson and Omer Shlomovits. 2020
0

Videos