attacks
Papers (182)
# | Title | |
1. | Majority is not enough: Bitcoin mining is vulnerable Eyal, Ittay and Gün Sirer, Emin. 2014. | |
2. | A survey of attacks on ethereum smart contracts (sok) Atzei, Nicola and Bartoletti, Massimo and Cimoli, Tiziana. 2017. | |
3. | A survey on the security of blockchain systems Li, Xiaoqi and Jiang, Peng and Chen, Ting and Luo, Xiapu and Wen, Qiaoyan. 2017. | |
4. | A fistful of bitcoins: characterizing payments among men with no names Meiklejohn, Sarah and Pomarole, Marjori and Jordan, Grant and Levchenko, Kirill and McCoy, Damon and Voelker, Geoffrey M and Savage, Stefan. 2013. | |
5. | A survey on security and privacy issues of bitcoin Conti, Mauro and Kumar, E Sandeep and Lal, Chhagan and Ruj, Sushmita. 2018. | |
6. | Eclipse Attacks on Bitcoin's Peer-to-Peer Network Heilman, Ethan and Kendler, Alison and Zohar, Aviv and Goldberg, Sharon. 2015. | |
7. | Bitter to better - How to make bitcoin a better currency Barber, Simon and Boyen, Xavier and Shi, Elaine and Uzun, Ersin. 2012. | |
8. | Security and privacy on blockchain Zhang, Rui and Xue, Rui and Liu, Ling. 2019. | |
9. | Securify: Practical security analysis of smart contracts Tsankov, Petar and Dan, Andrei and Drachsler-Cohen, Dana and Gervais, Arthur and Buenzli, Florian and Vechev, Martin. 2018. | |
10. | The economics of Bitcoin mining, or Bitcoin in the presence of adversaries Kroll, Joshua A and Davey, Ian C and Felten, Edward W. 2013. | |
11. | Deanonymisation of clients in Bitcoin P2P network Biryukov, Alex and Khovratovich, Dmitry and Pustogarov, Ivan. 2014. | |
12. | Zeus: Analyzing safety of smart contracts Kalra, Sukrit and Goel, Seep and Dhawan, Mohan and Sharma, Subodh. 2018. | |
13. | An empirical analysis of smart contracts: platforms, applications, and design patterns Bartoletti, Massimo and Pompianu, Livio. 2017. | |
14. | Hijacking bitcoin: Routing attacks on cryptocurrencies Apostolaki, Maria and Zohar, Aviv and Vanbever, Laurent. 2017. | |
15. | Analysis of Hashrate-Based Double Spending Rosenfeld, Meni. 2014. | |
16. | Is bitcoin a decentralized currency? Gervais, Arthur and Karame, Ghassan O and Capkun, Vedran and Capkun, Srdjan. 2014. | |
17. | Madmax: Surviving out-of-gas conditions in ethereum smart contracts Grech, Neville and Kong, Michael and Jurisevic, Anton and Brent, Lexi and Scholz, Bernhard and Smaragdakis, Yannis. 2018. | |
18. | Bitcoin transaction malleability and MtGox Decker, Christian and Wattenhofer, Roger. 2014. | |
19. | teether: Gnawing at ethereum to automatically exploit smart contracts Krupp, Johannes and Rossow, Christian. 2018. | |
20. | Empirical analysis of denial-of-service attacks in the Bitcoin ecosystem Vasek, Marie and Thornton, Micah and Moore, Tyler. 2014. | |
21. | Vandal: A scalable security analysis framework for smart contracts Brent, Lexi and Jurisevic, Anton and Kong, Michael and Liu, Eric and Gauthier, Francois and Gramoli, Vincent and Holz, Ralph and Scholz, Bernhard. 2018. | |
22. | Osiris: Hunting for integer bugs in ethereum smart contracts Torres, Christof Ferreira and Sch\"utte, Julian and others. 2018. | |
23. | Extended Tower Number Field Sieve: A New Complexity for the Medium Prime Case Taechan Kim and Razvan Barbulescu. 2015. | |
24. | Game-theoretic analysis of DDoS attacks against Bitcoin mining pools Johnson, Benjamin and Laszka, Aron and Grossklags, Jens and Vasek, Marie and Moore, Tyler. 2014. | |
25. | On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency Courtois, Nicolas T and Bahack, Lear. 2013. | |
26. | Flash Boys 2.0: Frontrunning, Transaction Reordering, and Consensus Instability in Decentralized Exchanges Daian, Philip and Goldfeder, Steven and Kell, Tyler and Li, Yunqi and Zhao, Xueyuan and Bentov, Iddo and Breidenbach, Lorenz and Juels, Ari. 2019. | |
27. | Why buy when you can rent? bribery attacks on bitcoin consensus Bonneau, Joseph and Felten, Edward W and Goldfeder, Steven and Kroll, Joshua A and Narayanan, Arvind. 2016. | |
28. | Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks Rodler, Michael and Li, Wenting and Karame, Ghassan O and Davi, Lucas. 2018. | |
29. | A traceability analysis of monero’s blockchain Kumar, Amrit and Fischer, Cl\'ement and Tople, Shruti and Saxena, Prateek. 2017. | |
30. | An Empirical Analysis of Anonymity in Zcash Kappos, George and Yousaf, Haaroon and Maller, Mary and Meiklejohn, Sarah. 2018. | |
31. | On power splitting games in distributed computation: The case of bitcoin pooled mining Luu, Loi and Saha, Ratul and Parameshwaran, Inian and Saxena, Prateek and Hobor, Aquinas. 2015. | |
32. | Low-Resource Eclipse Attacks on Ethereum’s Peer-to-Peer Network Marcus, Yuval and Heilman, Ethan and Goldberg, Sharon. 2018. | |
33. | SoK: Transparent Dishonesty: front-running attacks on Blockchain Eskandari, Shayan and Moosavi, Seyedehmahsa and Clark, Jeremy. 2019. | |
34. | A survey of tools for analyzing ethereum smart contracts Di Angelo, Monika and Salzer, Gernot. 2019. | |
35. | Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit Qin, Kaihua and Zhou, Liyi and Livshits, Benjamin and Gervais, Arthur. 2020. | |
36. | Quantifying Blockchain Extractable Value: How dark is the forest? Kaihua Qin and Liyi Zhou and Arthur Gervais. 2021. | |
37. | Learning to Fuzz from Symbolic Execution with Application to Smart Contracts He, Jingxuan and Balunovi\'c, Mislav and Ambroladze, Nodar and Tsankov, Petar and Vechev, Martin. 2019. | |
38. | The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts Torres, Christof Ferreira and Steichen, Mathis. 2019. | |
39. | Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft) Lear Bahack. 2013. | |
40. | Empirical Vulnerability Analysis of Automated Smart Contracts Security Testing on Blockchains Parizi, Reza M and Dehghantanha, Ali and Choo, Kim-Kwang Raymond and Singh, Amritraj. 2018. | |
41. | High-Frequency Trading on Decentralized On-Chain Exchanges Zhou, Liyi and Qin, Kaihua and Torres, Christof Ferreira and Le, Duc V and Gervais, Arthur. 2020. | |
42. | Stake-Bleeding Attacks on Proof-of-Stake Blockchains Peter Gaži and Aggelos Kiayias and Alexander Russell. 2018. | |
43. | Harvey: A greybox fuzzer for smart contracts W\"ustholz, Valentin and Christakis, Maria. 2019. | |
44. | The Decentralized Financial Crisis Gudgeon, Lewis and Perez, Daniel and Harz, Dominik and Gervais, Arthur and Livshits, Benjamin. 2020. | |
45. | On the Malleability of Bitcoin Transactions Marcin Andrychowicz and Stefan Dziembowski and Daniel Malinowski and Lukasz Mazurek. 2015. | |
46. | Ethainter: A smart contract security analyzer for composite vulnerabilities Brent, Lexi and Grech, Neville and Lagouvardos, Sifis and Scholz, Bernhard and Smaragdakis, Yannis. 2020. | |
47. | A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network Tran, Muoi and Choi, Inho and Moon, Gi Jun and Vu, Anh V and Kang, Min Suk. 2020. | |
48. | Bitcoin's security model revisited Sompolinsky, Yonatan and Zohar, Aviv. 2016. | |
49. | Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies Breitner, Joachim and Heninger, Nadia. 2019. | |
50. | BDoS: Blockchain Denial of Service Michael Mirkin and Yan Ji and Jonathan Pang and Ariah Klages-Mundt and Ittay Eyal and Ari Jules. 2019. | |
51. | Hierarchical deterministic Bitcoin wallets that tolerate key leakage Gutoski, Gus and Stebila, Douglas. 2015. | |
52. | Everything is a Race and Nakamoto Always Wins Amir Dembo and Sreeram Kannan and Ertem Nusret Tas and David Tse and Pramod Viswanath and Xuechao Wang and Ofer Zeitouni. 2020. | |
53. | SquirRL: Automating Attack Discovery on Blockchain Incentive Mechanisms with Deep Reinforcement Learning Hou, Charlie and Zhou, Mingxun and Ji, Yan and Daian, Phil and Tramer, Florian and Fanti, Giulia and Juels, Ari. 2019. | |
54. | Smart contracts make bitcoin mining pools vulnerable Velner, Yaron and Teutsch, Jason and Luu, Loi. 2017. | |
55. | When cryptocurrencies mine their own business Teutsch, Jason and Jain, Sanjay and Saxena, Prateek. 2016. | |
56. | Hostile blockchain takeovers (short paper) Joseph Bonneau. 2018. | |
57. | SABRE: Protecting Bitcoin against Routing Attacks Apostolaki, Maria and Marti, Gian and M\"uller, Jan and Vanbever, Laurent. 2018. | |
58. | SmartBugs: A Framework to Analyze Solidity Smart Contracts Ferreira, Jo\~ao F and Cruz, Pedro and Durieux, Thomas and Abreu, Rui. 2020. | |
59. | EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts Rodler, Michael and Li, Wenting and Karame, Ghassan O and Davi, Lucas. 2020. | |
60. | Revisiting Difficulty Control for Blockchain Systems Meshkov, Dmitry and Chepurnoy, Alexander and Jansen, Marc. 2017. | |
61. | Anonymous alone? measuring Bitcoin’s second-generation anonymization techniques M\"oser, Malte and B\"ohme, Rainer. 2017. | |
62. | Ethereum smart contracts: Security vulnerabilities and security tools Dika, Ardit. 2017. | |
63. | Blockchain is Watching You: Profiling and Deanonymizing Ethereum Users B\'eres, Ferenc and Seres, Istv\'an Andr\'as and Bencz\'ur, Andr\'as A and Quintyne-Collins, Mikerah. 2020. | |
64. | An Empirical Study of DeFi Liquidations: Incentives, Risks, and Instabilities Qin, Kaihua and Zhou, Liyi and Gamito, Pablo and Jovanovic, Philipp and Gervais, Arthur. 2021. | |
65. | Broken Metre: Attacking Resource Metering in EVM Daniel Perez and Benjamin Livshits. 2019. | |
66. | Stablecoins 2.0: Economic Foundations and Risk-based Models Ariah Klages-Mundt and Dominik Harz and Lewis Gudgeon and Jun-You Liu and Andreea Minca. 2020. | |
67. | Committing to quantum resistance: A slow defence for Bitcoin against a fast quantum computing attack Stewart, Iain and Ilie, D and Zamyatin, Alexei and Werner, Sam and Torshizi, MF and Knottenbelt, William J. 2018. | |
68. | Power Adjusting and Bribery Racing: Novel Mining Attacks in the Bitcoin System Gao, Shang and Li, Zecheng and Peng, Zhe and Xiao, Bin. 2019. | |
69. | Partitioning Attacks on Bitcoin: Colliding Space, Time and Logic Saad, Muhammad and Cook, Victor and Nguyen, Lan and Thai, My T and Mohaisen, Aziz. 2019. | |
70. | Out of Oddity -- New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems Tim Beyne and Anne Canteaut and Itai Dinur and Maria Eichlseder and Gregor Leander and Gaëtan Leurent and María Naya-Plasencia and Léo Perrin and Yu Sasaki and Yosuke Todo and Friedrich Wiemer. 2020. | |
71. | On the linkability of Zcash transactions Quesnelle, Jeffrey. 2017. | |
72. | Replay Attacks and Defenses against Cross-shard Consensus in Sharded Distributed Ledgers Sonnino, Alberto and Bano, Shehar and Al-Bassam, Mustafa and Danezis, George. 2019. | |
73. | Monitoring smart contracts: Contractlarva and open challenges beyond Azzopardi, Shaun and Ellul, Joshua and Pace, Gordon J. 2018. | |
74. | MAD-HTLC: Because HTLC is Crazy-Cheap to Attack Itay Tsabary and Matan Yechieli and Ittay Eyal. 2020. | |
75. | Refund attacks on Bitcoin’s payment protocol McCorry, Patrick and Shahandashti, Siamak F and Hao, Feng. 2016. | |
76. | Remote Side-Channel Attacks on Anonymous Transactions Florian Tramèr and Dan Boneh and Kenneth G. Paterson. 2020. | |
77. | BeatCoin: Leaking Private Keys from Air-Gapped Cryptocurrency Wallets Guri, Mordechai. 2018. | |
78. | Temporary censorship attacks in the presence of rational miners Winzer, Fredrik and Herd, Benjamin and Faust, Sebastian. 2019. | |
79. | Cascading Machine Learning to Attack Bitcoin Anonymity Zola, Francesco and Eguimendia, Maria and Bruse, Jan Lukas and Urrutia, Raul Orduna. 2019. | |
80. | A Quantitative Analysis of Security, Anonymity and Scalability for the Lightning Network Sergei Tikhomirov and Pedro Moreno-Sanchez and Matteo Maffei. 2020. | |
81. | Precise Attack Synthesis for Smart Contracts Feng, Yu and Torlak, Emina and Bodik, Rastislav. 2019. | |
82. | Flood \& Loot: A Systemic Attack On The Lightning Network Harris, Jona and Zohar, Aviv. 2020. | |
83. | Minerva: The curse of ECDSA nonces Jan Jancar and Vladimir Sedlacek and Petr Svenda and Marek Sys. 2020. | |
84. | Cryptanalysis of Curl-P and Other Attacks on the IOTA Cryptocurrency. Heilman, Ethan and Narula, Neha and Tanzer, Garrett and Lovejoy, James and Colavita, Michael and Virza, Madars and Dryja, Tadge. 2019. | |
85. | LockDown: Balance Availability Attack against Lightning Network Channels Cristina Pérez-Solà and Alejandro Ranchal-Pedrosa and Jordi Herrera-Joancomartí and Guillermo Navarro-Arribas and Joaquin Garcia-Alfaro. 2019. | |
86. | Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management, Wallet and Cold Storage Solutions in Presence of Poor RNG Events. Courtois, Nicolas T and Valsorda, Filippo and Emirdag, Pinar. 2014. | |
87. | Hijacking Routes in Payment Channel Networks: A Predictability Tradeoff Saar Tochner and Stefan Schmid and Aviv Zohar. 2019. | |
88. | SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds Bose, Priyanka and Das, Dipanjan and Chen, Yanju and Feng, Yu and Kruegel, Christopher and Vigna, Giovanni. 2021. | |
89. | Privacy Aspects and Subliminal Channels in Zcash Biryukov, Alex and Feher, Daniel and Vitto, Giuseppe. 2019. | |
90. | A2MM: Mitigating Frontrunning, Transaction Reordering and Consensus Instability in Decentralized Exchanges Zhou, Liyi and Qin, Kaihua and Gervais, Arthur. 2021. | |
91. | DeFiRanger: Detecting Price Manipulation Attacks on DeFi Applications Wu, Siwei and Wang, Dabao and He, Jianting and Zhou, Yajin and Wu, Lei and Yuan, Xingliang and He, Qinming and Ren, Kui. 2021. | |
92. | GossipSub: Attack-Resilient Message Propagation in the Filecoin and ETH2.0 Networks Dimitris Vyzovitis and Yusef Napora and Dirk McCormick and David Dias and Yiannis Psaras. 2020. | |
93. | CONFUZZIUS: A Data Dependency-Aware Hybrid Fuzzer for Smart Contracts Ferreira Torres, Christof and Iannillo, Antonio Ken and Gervais, Arthur and others. 2021. | |
94. | Vyper: A Security Comparison with Solidity Based on Common Vulnerabilities Kaleem, Mudabbir and Laszka, Aron. 2020. | |
95. | SoK: Oracles from the Ground Truth to Market Manipulation Eskandari, Shayan and Salehi, Mehdi and Gu, Wanyun Catherine and Clark, Jeremy. 2021. | |
96. | SoK: Preventing Transaction Reordering Manipulations in Decentralized Finance Heimbach, Lioba and Wattenhofer, Roger. 2022. | |
97. | Toward Active and Passive Confidentiality Attacks On Cryptocurrency Off-Chain Networks Nisslmueller, Utz and Foerster, Klaus-Tycho and Schmid, Stefan and Decker, Christian. 2020. | |
98. | What are the Actual Flaws in Important Smart Contracts (and How Can We Find Them)? Groce, Alex and Feist, Josselin and Grieco, Gustavo and Colburn, Michael. 2019. | |
99. | On the Profitability of Selfish Mining Against Multiple Difficulty Adjustment Algorithms Michael Davidson and Tyler Diamond. 2020. | |
100. | SoK: Decentralized Finance (DeFi) Attacks Liyi Zhou and Xihan Xiong and Jens Ernstberger and Stefanos Chaliasos and Zhipeng Wang and Ye Wang and Kaihua Qin and Roger Wattenhofer and Dawn Song and Arthur Gervais. 2022. | |
101. | On the security of the BCTV Pinocchio zk-SNARK variant Gabizon, Ariel. 2019. | |
102. | Flashot: A Snapshot of Flash Loan Attack on DeFi Ecosystem Cao, Yixin and Zou, Chuanwei and Cheng, Xianfeng. 2021. | |
103. | The Bitcoin brain drain: a short paper on the use and abuse of bitcoin brain wallets Vasek, Marie and Bonneau, Joseph and Castellucci, Ryan and Keith, Cameron and Moore, Tyler. 2016. | |
104. | Why Do Smart Contracts Self-Destruct? Investigating the Selfdestruct Function on Ethereum Chen, Jiachi and Xia, Xin and Lo, David and Grundy, John. 2020. | |
105. | Privacy and linkability of mining in zcash Biryukov, Alex and Feher, Daniel. 2019. | |
106. | Burning Zerocoins for Fun and for Profit: A Cryptographic Denial-of-Spending Attack on the Zerocoin Protocol Tim Ruffing and Sri Aravinda Thyagarajan and Viktoria Ronge and Dominique Schröder. 2018. | |
107. | Selfish Behavior in the Tezos Proof-of-Stake Protocol Neuder, Michael and Moroz, Daniel J and Rao, Rithvik and Parkes, David C. 2019. | |
108. | Who Spent My EOS? On the (In) Security of Resource Management of EOS. IO Lee, Sangsup and Kim, Daejun and Kim, Dongkwan and Son, Sooel and Kim, Yongdae. 2019. | |
109. | Effective Cryptocurrency Regulation Through Blacklisting M\"oser, Malte and Narayanan, Arvind. 2019. | |
110. | Winkle: Foiling Long-Range Attacks in Proof-of-Stake Systems Sarah Azouvi and George Danezis and Valeria Nikolaenko. 2019. | |
111. | Mind the Middle Layer: The HADES Design Strategy Revisited Nathan Keller and Asaf Rosemarin. 2020. | |
112. | Why Preventing a Cryptocurrency Exchange Heist Isn't Good Enough Patrick McCorry and Malte M\"oser and Syed Taha Ali. 2018. | |
113. | Cross-Layer Deanonymization Methods in the Lightning Protocol Romiti, Matteo and Victor, Friedhelm and Moreno-Sanchez, Pedro and Haslhofer, Bernhard and Maffei, Matteo. 2020. | |
114. | Finding Consensus Bugs in Ethereum via Multi-transaction Differential Fuzzing Yang, Youngseok and Kim, Taesoo and Chun, Byung-Gon. 2021. | |
115. | An empirical analysis of monero cross-chain traceability Hinteregger, Abraham and Haslhofer, Bernhard. 2018. | |
116. | SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies Aljosha Judmayer and Nicholas Stifter and Alexei Zamyatin and Itay Tsabary and Ittay Eyal and Peter Gaži and Sarah Meiklejohn and Edgar Weippl. 2020. | |
117. | Pitchforks in Cryptocurrencies: Enforcing Rule Changes Through Offensive Weippl, Edgar. 2018. | |
118. | On the (In)security of Kilian-Based SNARGs James Bartusek and Liron Bronfman and Justin Holmgren and Fermi Ma and Ron Rothblum. 2019. | |
119. | Short Selling Attack: A Self-Destructive But Profitable 51% Attack On PoS Blockchains Suhyeon Lee and Seungjoo Kim. 2020. | |
120. | The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts Christof Ferreira Torres and Antonio Ken Iannillo and Arthur Gervais and Radu State. 2021. | |
121. | On How Zero-Knowledge Proof Blockchain Mixers Improve, and Worsen User Privacy Wang, Zhipeng and Chaliasos, Stefanos and Qin, Kaihua and Zhou, Liyi and Gao, Lifeng and Berrang, Pascal and Livshits, Ben and Gervais, Arthur. 2022. | |
122. | Smartanvil: Open-source tool suite for smart contract analysis Ducasse, St\'ephane and Rocha, Henrique and Bragagnolo, Santiago and Denker, Marcus and Francomme, Cl\'ement. 2019. | |
123. | EthScope: A Transaction-centric Security Analytics Framework to Detect Malicious Smart Contracts on Ethereum Wu, Lei and Wu, Siwei and Zhou, Yajin and Li, Runhuai and Wang, Zhi and Luo, Xiapu and Wang, Cong and Ren, Kui. 2020. | |
124. | A Tale of Three Signatures: practical attack of ECDSA with wNAF Gabrielle De Micheli and Rémi Piau and Cécile Pierrot. 2019. | |
125. | How perfect offline wallets can still leak bitcoin private keys Verb\"ucheln, Stephan. 2015. | |
126. | On the Routing-Aware Peering against Network-Eclipse Attacks in Bitcoin Tran, Muoi and Shenoi, Akshaye and Kang, Min Suk. 2021. | |
127. | Flash Crash for Cash: Cyber Threats in Decentralized Finance Oosthoek, Kris. 2021. | |
128. | Uncle Maker: (Time)Stamping Out The Competition in Ethereum Aviv Yaish and Gilad Stern and Aviv Zohar. 2022. | |
129. | SoK: Not Quite Water Under the Bridge: Review of Cross-Chain Bridge Hacks Sung-Shine Lee and Alexandr Murashkin and Martin Derka and Jan Gorzny. 2022. | |
130. | Analysis and Probing of Parallel Channels in the Lightning Network Alex Biryukov and Gleb Naumenko and Sergei Tikhomirov. 2021. | |
131. | Low-cost attacks on Ethereum 2.0 by sub-1/3 stakeholders Neuder, Michael and Moroz, Daniel J and Rao, Rithvik and Parkes, David C. 2021. | |
132. | Assessing Smart Contracts Security Technical Debts Ahmadjee, Sabreen and Mera-G\'omez, Carlos and Bahsoon, Rami. 2021. | |
133. | EtherClue: Digital investigation of attacks on Ethereum smart contracts Aquilina, Simon Joseph and Casino, Fran and Vella, Mark and Ellul, Joshua and Patsakis, Constantinos. 2021. | |
134. | Why Stake When You Can Borrow? Tarun Chitra and Alex Evans. 2020. | |
135. | WIP: Finding Bugs Automatically in Smart Contracts with Parameterized Invariants Bernardi, Thomas and Dor, Nurit and Fedotov, Anastasia and Grossman, Shelly and Immerman, Neil and Jackson, Daniel and Nutz, Alex and Oppenheim, Lior and Pistiner, Or and Rinetzky, Noam and others. 2020. | |
136. | The security of Groups of Unknown Order based on Jacobians of Hyperelliptic Curves Jonathan Lee. 2020. | |
137. | FloodXMR: Low-cost transaction flooding attack with Monero's bulletproof protocol. Chervinski, Joao Ot\'avio Massari and Kreutz, Diego and Yu, Jiangshan. 2019. | |
138. | Bitcoin covenants unchained Bartoletti, Massimo and Lande, Stefano and Zunino, Roberto. 2020. | |
139. | Bitcoin Crypto–Bounties for Quantum Capable Adversaries Dragos Ioan Ilie and Kostis Karantias and William J. Knottenbelt. 2020. | |
140. | Attacking Threshold Wallets Jean-Philippe Aumasson and Omer Shlomovits. 2020. | |
141. | Tracking Mixed Bitcoins Tironsakkul, Tin and Maarek, Manuel and Eross, Andrea and Just, Mike. 2020. | |
142. | Longest Chain Consensus Under Bandwidth Constraint Neu, Joachim and Sridhar, Srivatsan and Yang, Lei and Tse, David and Alizadeh, Mohammad. 2021. | |
143. | Short Paper: Towards Characterizing Sybil Attacks in Cryptocurrency Mixers Mikerah Quintyne-Collins. 2019. | |
144. | BDoS: Blockchain Denial-of-Service Attacks Mirkin, Michael and Ji, Yan and Pang, Jonathan and Klages-Mundt, Ariah and Eyal, Ittay and Juels, Ari. 2020. | |
145. | Timelocked Bribing Nadahalli, Tejaswi and Khabbazian, Majid and Wattenhofer, Roger. 2021. | |
146. | FlashSyn: Flash Loan Attack Synthesis via Counter Example Driven Approximation Zhiyang Chen and Sidi Mohamed Beillahi and Fan Long. 2022. | |
147. | A New Look at the Refund Mechanism in the Bitcoin Payment Protocol Avizheh, Sepideh and Safavi-Naini, Reihaneh and Shahandashti, Siamak F. 2018. | |
148. | Committing to Quantum Resistance, Better: A Speed–and–Risk–Configurable Defence for Bitcoin against a Fast Quantum Computing Attack Dragos Ioan Ilie and William J. Knottenbelt and Iain Stewart. 2020. | |
149. | Alt-Coin Traceability Claire Ye and Chinedu Ojukwu and Anthony Hsu and Ruiqi Hu. 2020. | |
150. | Selfish Mining Attacks Exacerbated by Elastic Hash Supply Shibuya, Yoko and Yamamoto, Go and Kojima, Fuhito and Shi, Elaine and Matsuo, Shin’ichiro and Laszka, Aron. 2020. | |
151. | Analysis of CryptoNote Transaction Graphs using the Dulmage-Mendelsohn Decomposition Saravanan Vijayakumaran. 2021. | |
152. | Demystifying Exploitable Bugs in Smart Contracts Zhang, Zhuo and Zhang, Brian and Xu, Wen and Lin, Zhiqiang. 2023. | |
153. | Weak Fiat-Shamir Attacks on Modern Proof Systems Quang Dao and Jim Miller and Opal Wright and Paul Grubbs. 2023. | |
154. | Towards Smart Hybrid Fuzzing for Smart Contracts Torres, Christof Ferreira and Iannillo, Antonio Ken and Gervais, Arthur and State, Radu. 2020. | |
155. | Timelocked Bribes Majid Khabbazian and Tejaswi Nadahalli and Roger Wattenhofer. 2020. | |
156. | On the Confidentiality of Amounts in Grin Suyash Bagad and Saravanan Vijayakumaran. 2020. | |
157. | Time is Money: Strategic Timing Games in Proof-of-Stake Protocols Caspar Schwarz-Schilling and Fahad Saleh and Thomas Thiery and Jennifer Pan and Nihar Shah and Barnabé Monnot. 2023. | |
158. | PING and REJECT:The Impact of Side-Channels on Zcash Privacy Florian Tramèr and Dan Boneh and Kenneth G. Paterson. 2019. | |
159. | SoK: Cyber-Attack Taxonomy of Distributed Ledger- and Legacy Systems-based Financial Infrastructures Ralph Ankele and Kai Nahrgang and Branka Stojanovic and Atta Badii. 2020. | |
160. | HashSplit: Exploiting Bitcoin Asynchrony to Violate Common Prefix and Chain Quality Muhammad Saad and Afsah Anwar and Srivatsan Ravi and David Mohaisen. 2021. | |
161. | Attacking (EC)DSA With Partially Known Multiples of Nonces Marios Adamoudis and Konstantinos A. Draziotis and Dimitrios Poulakis. 2021. | |
162. | Analyzing the Blockchain Attack Surface: A Top-down Approach Saad, Muhammad. 2021. | |
163. | Speculative Denial-of-Service Attacks in Ethereum Aviv Yaish and Kaihua Qin and Liyi Zhou and Aviv Zohar and Arthur Gervais. 2023. | |
164. | Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies Aljosha Judmayer and Nicholas Stifter and Alexei Zamyatin and Itay Tsabary and Ittay Eyal and Peter Gazi and Sarah Meiklejohn and Edgar Weippl. 2019. | |
165. | Smashing ethereum smart contracts for fun and real profit Mueller, Bernhard. 2018. | |
166. | Running on Fumes Albert, Elvira and Gordillo, Pablo and Rubio, Albert and Sergey, Ilya. 2019. | |
167. | {\AE}GIS: Smart Shielding of Smart Contracts Ferreira Torres, Christof and Baden, Mathis and Norvill, Robert and Jonker, Hugo. 2019. | |
168. | Undercutting Bitcoin Is Not Profitable Tiantian Gong and Mohsen Minaei and Wenhai Sun and Aniket Kate. 2020. | |
169. | The Bitcoin Hunter: Detecting Bitcoin Traffic over Encrypted Channels Rezaei, Fatemeh and Naseri, Shahrzad and Eyal, Ittay and Houmansadr, Amir. 2020. | |
170. | Guessing Bits: Improved Lattice Attacks on (EC)DSA Chao Sun and Thomas Espitau and Mehdi Tibouchi and Masayuki Abe. 2021. | |
171. | Opportunistic Algorithmic Double-Spending: How I learned to stop worrying and hedge the Fork Nicholas Stifter and Aljosha Judmayer and Philipp Schindler and Edgar Weippl. 2021. | |
172. | How much is the fork? Fast Probability and Profitability Calculation during Temporary Forks Judmayer, Aljosha and Stifter, Nicholas and Schindler, Philipp and Weippel, Edgar. 2022. | |
173. | Two More Attacks on Proof-of-Stake GHOST/Ethereum Neu, Joachim and Tas, Ertem Nusret and Tse, David. 2022. | |
174. | Selfish mining in ethereum Grunspan, Cyril and P\'erez-Marco, Ricardo. 2020. | |
175. | Side Contract Commitment Attacks on Blockchains Landis, Daji and Schwartzbach, Nikolaj I.. 2023. | |
176. | CryptoVampire: Automated Reasoning for the Complete Symbolic Attacker Cryptographic Model Simon Jeanteur and Laura Kovács and Matteo Maffei and Michael Rawson. 2023. | |
177. | Front-running Attack in Distributed Sharded Ledgers and Fair Cross-shard Consensus Jianting Zhang and Wuhui Chen and Sifu Luo and Tiantian Gong and Zicong Hong and Aniket Kate. 2023. | |
178. | Formal Model-Driven Analysis of Resilience of GossipSub to Attacks from Misbehaving Peers Ankit Kumar and Max von Hippel and Pete Manolios and Cristina Nita-Rotaru. 2022. | |
179. | The curious case of the half-half Bitcoin ECDSA nonces Dylan Rowe and Joachim Breitner and Nadia Heninger. 2023. | |
180. | Practical Key-Extraction Attacks in Leading MPC Wallets Nikolaos Makriyannis and Oren Yomtov. 2023. | |
181. | DeFi Auditing: Mechanisms, Effectiveness, and User Perceptions Ding Feng and Rupert Hitsch and Kaihua Qin and Arthur Gervais and Roger Wattenhofer and Yaxing Yao and Ye Wang. 2023. | |
182. | Why Trick Me: The Honeypot Traps on Decentralized Exchanges Gan, Rundong and Wang, Le and Lin, Xiaodong. 2023. |
Videos
–
Links
–