A curated list of papers ordered by number of citations. Last updated 2019-11-11

#Title
Citations
1.Majority is not enough: Bitcoin mining is vulnerable Eyal, Ittay and Gün Sirer, Emin. 2014
1142
2.A fistful of bitcoins: characterizing payments among men with no names Meiklejohn, Sarah and Pomarole, Marjori and Jordan, Grant and Levchenko, Kirill and McCoy, Damon and Voelker, Geoffrey M and Savage, Stefan. 2013
732
3.Bitter to better - How to make bitcoin a better currency Barber, Simon and Boyen, Xavier and Shi, Elaine and Uzun, Ersin. 2012
543
4.A survey of attacks on ethereum smart contracts (sok) Atzei, Nicola and Bartoletti, Massimo and Cimoli, Tiziana. 2017
408
5.The economics of Bitcoin mining, or Bitcoin in the presence of adversaries Kroll, Joshua A and Davey, Ian C and Felten, Edward W. 2013
391
6.Eclipse Attacks on Bitcoin's Peer-to-Peer Network Heilman, Ethan and Kendler, Alison and Zohar, Aviv and Goldberg, Sharon. 2015
340
7.A survey on the security of blockchain systems Li, Xiaoqi and Jiang, Peng and Chen, Ting and Luo, Xiapu and Wen, Qiaoyan. 2017
258
8.Deanonymisation of clients in Bitcoin P2P network Biryukov, Alex and Khovratovich, Dmitry and Pustogarov, Ivan. 2014
256
9.Analysis of Hashrate-Based Double Spending Rosenfeld, Meni. 2014
219
10.A survey on security and privacy issues of bitcoin Conti, Mauro and Kumar, E Sandeep and Lal, Chhagan and Ruj, Sushmita. 2018
210
11.Is bitcoin a decentralized currency? Gervais, Arthur and Karame, Ghassan O and Capkun, Vedran and Capkun, Srdjan. 2014
194
12.An empirical analysis of smart contracts: platforms, applications, and design patterns Bartoletti, Massimo and Pompianu, Livio. 2017
184
13.Hijacking bitcoin: Routing attacks on cryptocurrencies Apostolaki, Maria and Zohar, Aviv and Vanbever, Laurent. 2017
155
14.On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency Courtois, Nicolas T and Bahack, Lear. 2013
150
15.Zeus: Analyzing safety of smart contracts Kalra, Sukrit and Goel, Seep and Dhawan, Mohan and Sharma, Subodh. 2018
118
16.Game-theoretic analysis of DDoS attacks against Bitcoin mining pools Johnson, Benjamin and Laszka, Aron and Grossklags, Jens and Vasek, Marie and Moore, Tyler. 2014
114
17.Empirical analysis of denial-of-service attacks in the Bitcoin ecosystem Vasek, Marie and Thornton, Micah and Moore, Tyler. 2014
112
18.Securify: Practical security analysis of smart contracts Tsankov, Petar and Dan, Andrei and Drachsler-Cohen, Dana and Gervais, Arthur and Buenzli, Florian and Vechev, Martin. 2018
105
19.On power splitting games in distributed computation: The case of bitcoin pooled mining Luu, Loi and Saha, Ratul and Parameshwaran, Inian and Saxena, Prateek and Hobor, Aquinas. 2015
89
20.Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft) Lear Bahack. 2013
79
21.A traceability analysis of monero’s blockchain Kumar, Amrit and Fischer, Cl\'ement and Tople, Shruti and Saxena, Prateek. 2017
74
22.teether: Gnawing at ethereum to automatically exploit smart contracts Krupp, Johannes and Rossow, Christian. 2018
46
23.Madmax: Surviving out-of-gas conditions in ethereum smart contracts Grech, Neville and Kong, Michael and Jurisevic, Anton and Brent, Lexi and Scholz, Bernhard and Smaragdakis, Yannis. 2018
46
24.On the Malleability of Bitcoin Transactions Marcin Andrychowicz and Stefan Dziembowski and Daniel Malinowski and Lukasz Mazurek. 2015
45
25.Bitcoin's security model revisited Sompolinsky, Yonatan and Zohar, Aviv. 2016
44
26.An Empirical Analysis of Anonymity in Zcash Kappos, George and Yousaf, Haaroon and Maller, Mary and Meiklejohn, Sarah. 2018
42
27.Vandal: A scalable security analysis framework for smart contracts Brent, Lexi and Jurisevic, Anton and Kong, Michael and Liu, Eric and Gauthier, Francois and Gramoli, Vincent and Holz, Ralph and Scholz, Bernhard. 2018
35
28.Low-Resource Eclipse Attacks on Ethereum’s Peer-to-Peer Network Marcus, Yuval and Heilman, Ethan and Goldberg, Sharon. 2018
33
29.When cryptocurrencies mine their own business Teutsch, Jason and Jain, Sanjay and Saxena, Prateek. 2016
33
30.Stake-Bleeding Attacks on Proof-of-Stake Blockchains Peter Gaži and Aggelos Kiayias and Alexander Russell. 2018
29
31.Smart contracts make bitcoin mining pools vulnerable Velner, Yaron and Teutsch, Jason and Luu, Loi. 2017
27
32.Empirical Vulnerability Analysis of Automated Smart Contracts Security Testing on Blockchains Parizi, Reza M and Dehghantanha, Ali and Choo, Kim-Kwang Raymond and Singh, Amritraj. 2018
25
33.Hostile blockchain takeovers (short paper) Joseph Bonneau. 2018
25
34.Anonymous alone? measuring Bitcoin’s second-generation anonymization techniques M\"oser, Malte and B\"ohme, Rainer. 2017
24
35.Refund attacks on Bitcoin’s payment protocol McCorry, Patrick and Shahandashti, Siamak F and Hao, Feng. 2016
21
36.Hierarchical deterministic Bitcoin wallets that tolerate key leakage Gutoski, Gus and Stebila, Douglas. 2015
21
37.Smashing ethereum smart contracts for fun and real profit Mueller, Bernhard. 2018
21
38.Why buy when you can rent? bribery attacks on bitcoin consensus Bonneau, Joseph and Felten, Edward W and Goldfeder, Steven and Kroll, Joshua A and Narayanan, Arvind. 2016
18
39.Ethereum smart contracts: Security vulnerabilities and security tools Dika, Ardit. 2017
16
40.Revisiting Difficulty Control for Blockchain Systems Meshkov, Dmitry and Chepurnoy, Alexander and Jansen, Marc. 2017
14
41.Osiris: Hunting for integer bugs in ethereum smart contracts Torres, Christof Ferreira and Sch\"utte, Julian and others. 2018
13
42.Flash Boys 2.0: Frontrunning, Transaction Reordering, and Consensus Instability in Decentralized Exchanges Daian, Philip and Goldfeder, Steven and Kell, Tyler and Li, Yunqi and Zhao, Xueyuan and Bentov, Iddo and Breidenbach, Lorenz and Juels, Ari. 2019
12
43.The Bitcoin brain drain: a short paper on the use and abuse of bitcoin brain wallets Vasek, Marie and Bonneau, Joseph and Castellucci, Ryan and Keith, Cameron and Moore, Tyler. 2016
10
44.On the security of the BCTV Pinocchio zk-SNARK variant Gabizon, Ariel. 2019
7
45.Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks Rodler, Michael and Li, Wenting and Karame, Ghassan O and Davi, Lucas. 2018
7
46.A survey of tools for analyzing ethereum smart contracts Di Angelo, Monika and Salzer, Gernot. 2019
7
47.Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies Breitner, Joachim and Heninger, Nadia. 2019
6
48.Monitoring smart contracts: Contractlarva and open challenges beyond Azzopardi, Shaun and Ellul, Joshua and Pace, Gordon J. 2018
6
49.SABRE: Protecting Bitcoin against Routing Attacks Apostolaki, Maria and Marti, Gian and M\"uller, Jan and Vanbever, Laurent. 2018
5
50.How perfect offline wallets can still leak bitcoin private keys Verb\"ucheln, Stephan. 2015
5
51.BeatCoin: Leaking Private Keys from Air-Gapped Cryptocurrency Wallets Guri, Mordechai. 2018
4
52.Precise Attack Synthesis for Smart Contracts Feng, Yu and Torlak, Emina and Bodik, Rastislav. 2019
4
53.Replay Attacks and Defenses against Cross-shard Consensus in Sharded Distributed Ledgers Sonnino, Alberto and Bano, Shehar and Al-Bassam, Mustafa and Danezis, George. 2019
4
54.Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies Aljosha Judmayer and Nicholas Stifter and Alexei Zamyatin and Itay Tsabary and Ittay Eyal and Peter Gazi and Sarah Meiklejohn and Edgar Weippl. 2019
4
55.Cryptanalysis of Curl-P and Other Attacks on the IOTA Cryptocurrency. Heilman, Ethan and Narula, Neha and Tanzer, Garrett and Lovejoy, James and Colavita, Michael and Virza, Madars and Dryja, Tadge. 2019
4
56.An empirical analysis of monero cross-chain traceability Hinteregger, Abraham and Haslhofer, Bernhard. 2018
4
57.Burning Zerocoins for Fun and for Profit: A Cryptographic Denial-of-Spending Attack on the Zerocoin Protocol Tim Ruffing and Sri Aravinda Thyagarajan and Viktoria Ronge and Dominique Schröder. 2018
3
58.SoK: Transparent Dishonesty: front-running attacks on Blockchain Eskandari, Shayan and Moosavi, Seyedehmahsa and Clark, Jeremy. 2019
3
59.Why Preventing a Cryptocurrency Exchange Heist Isn't Good Enough Patrick McCorry and Malte M\"oser and Syed Taha Ali. 2018
2
60.The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts Torres, Christof Ferreira and Steichen, Mathis. 2019
2
61.Temporary censorship attacks in the presence of rational miners Winzer, Fredrik and Herd, Benjamin and Faust, Sebastian. 2019
2
62.Smartanvil: Open-source tool suite for smart contract analysis Ducasse, St\'ephane and Rocha, Henrique and Bragagnolo, Santiago and Denker, Marcus and Francomme, Cl\'ement. 2019
2
63.Broken Metre: Attacking Resource Metering in EVM Daniel Perez and Benjamin Livshits. 2019
1
64.Pitchforks in Cryptocurrencies: Enforcing Rule Changes Through Offensive Weippl, Edgar. 2018
0
65.A New Look at the Refund Mechanism in the Bitcoin Payment Protocol Avizheh, Sepideh and Safavi-Naini, Reihaneh and Shahandashti, Siamak F. 2018
0
66.A Tale of Three Signatures: practical attack of ECDSA with wNAF Gabrielle De Micheli and Rémi Piau and Cécile Pierrot. 2019
0
67.A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network Tran, Muoi and Choi, Inho and Moon, Gi Jun and Vu, Anh V and Kang, Min Suk. 2020
0
68.Who Spent My EOS? On the (In) Security of Resource Management of EOS. IO Lee, Sangsup and Kim, Daejun and Kim, Dongkwan and Son, Sooel and Kim, Yongdae. 2019
0
69.On the (In)security of Kilian-Based SNARGs James Bartusek and Liron Bronfman and Justin Holmgren and Fermi Ma and Ron Rothblum. 2019
0
70.Hijacking Routes in Payment Channel Networks: A Predictability Tradeoff Saar Tochner and Stefan Schmid and Aviv Zohar. 2019
0
71.Learning to Fuzz from Symbolic Execution with Application to Smart Contracts He, Jingxuan and Balunovi\'c, Mislav and Ambroladze, Nodar and Tsankov, Petar and Vechev, Martin. 2019
0
72.Short Paper: Towards Characterizing Sybil Attacks in Cryptocurrency Mixers Mikerah Quintyne-Collins. 2019
0
73.PING and REJECT:The Impact of Side-Channels on Zcash Privacy Florian Tramèr and Dan Boneh and Kenneth G. Paterson. 2019
0
74.LockDown: Balance Availability Attack against Lightning Network Channels Cristina Pérez-Solà and Alejandro Ranchal-Pedrosa and Jordi Herrera-Joancomartí and Guillermo Navarro-Arribas and Joaquin Garcia-Alfaro. 2019
0
75.Effective Cryptocurrency Regulation Through Blacklisting M\"oser, Malte and Narayanan, Arvind. 2019
0
76.Cascading Machine Learning to Attack Bitcoin Anonymity Zola, Francesco and Eguimendia, Maria and Bruse, Jan Lukas and Urrutia, Raul Orduna. 2019
0