SoK: Decentralized Finance (DeFi) Attacks
暂无分享,去创建一个
Arthur Gervais | Ye Wang | Liyi Zhou | Roger Wattenhofer | Kaihua Qin | D. Song | Zhipeng Wang | Xihan Xiong | Jens Ernstberger | Stefanos Chaliasos | Zhipeng Wang
[1] Roger Wattenhofer,et al. Risks and Returns of Uniswap V3 Liquidity Providers , 2022, Conference on Advances in Financial Technologies.
[2] Roger Wattenhofer,et al. TWAP Oracle Attacks: Easier Done than Said? , 2022, 2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).
[3] Ye Wang,et al. Impact and User Perception of Sandwich Attacks in the DeFi Ecosystem , 2022, CHI.
[4] Roger Wattenhofer,et al. SoK: Preventing Transaction Reordering Manipulations in Decentralized Finance , 2022, AFT.
[5] Roger Wattenhofer,et al. An Empirical Study of Market Inefficiencies in Uniswap and SushiSwap , 2022, Financial Cryptography Workshops.
[6] F. Yue,et al. Bytecode Similarity Detection of Smart Contract across Optimization Options and Compiler Versions Based on Triplet Network , 2022, Electronics.
[7] Roger Wattenhofer,et al. Eliminating Sandwich Attacks with the Help of Game Theory , 2022, AsiaCCS.
[8] Arthur Gervais,et al. On How Zero-Knowledge Proof Blockchain Mixers Improve, and Worsen User Privacy , 2022 .
[9] Ye Wang,et al. Cyclic Arbitrage in Decentralized Exchanges , 2021, WWW.
[10] Giovanni Vigna,et al. SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds , 2021, 2022 IEEE Symposium on Security and Privacy (SP).
[11] Arthur Gervais,et al. Quantifying Blockchain Extractable Value: How dark is the forest? , 2021, 2022 IEEE Symposium on Security and Privacy (SP).
[12] Gilad Stern,et al. Uncle Maker: (Time)Stamping Out The Competition in Ethereum , 2023, IACR Cryptol. ePrint Arch..
[13] David Mohaisen,et al. Revisiting Nakamoto Consensus in Asynchronous Networks: A Comprehensive Analysis of Bitcoin Safety and ChainQuality , 2021, CCS.
[14] Kai Li,et al. DETER: Denial of Ethereum Txpool sERvices , 2021, CCS.
[15] David Mohaisen,et al. SyncAttack: Double-spending in Bitcoin Without Mining Power , 2021, CCS.
[16] Sebastian Faust,et al. The Exact Security of BIP32 Wallets , 2021, IACR Cryptol. ePrint Arch..
[17] Alex Groce,et al. SMARTIAN: Enhancing Smart Contract Fuzzing with Static and Dynamic Data-Flow Analyses , 2021, 2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE).
[18] Tim Roughgarden,et al. How Does Blockchain Security Dictate Blockchain Implementation? , 2021, CCS.
[19] D. Zhu,et al. Similarity Measure for Smart Contract Bytecode Based on CFG Feature Extraction , 2021, 2021 International Conference on Computer Information Science and Artificial Intelligence (CISAI).
[20] Yepang Liu,et al. Characterizing Transaction-Reverting Statements in Ethereum Smart Contracts , 2021, 2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE).
[21] Jeremy Clark,et al. TokenHook: Secure ERC-20 smart contract , 2021, ArXiv.
[22] Anna A. Igolkina,et al. semopy 2: A Structural Equation Modeling Package with Random Effects in Python , 2021, ArXiv.
[23] Arthur Gervais,et al. CeFi vs. DeFi - Comparing Centralized to Decentralized Finance , 2021, ArXiv.
[24] Ye Wang,et al. Behavior of Liquidity Providers in Decentralized Exchanges , 2021, 2105.13822.
[25] Isil Dillig,et al. SmartPulse: Automated Checking of Temporal Properties in Smart Contracts , 2021, 2021 IEEE Symposium on Security and Privacy (SP).
[26] Lei Wu,et al. DeFiRanger: Detecting Price Manipulation Attacks on DeFi Applications , 2021, ArXiv.
[27] Andrew C. Myers,et al. Compositional Security for Reentrant Applications , 2021, 2021 IEEE Symposium on Security and Privacy (SP).
[28] Benjamin Livshits,et al. On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols , 2021, 2021 IEEE Symposium on Security and Privacy (SP).
[29] Zibin Zheng,et al. Understanding Code Reuse in Smart Contracts , 2021, 2021 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER).
[30] Xiapu Luo,et al. Smart Contract Security: A Practitioners' Perspective , 2021, 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE).
[31] Radu State,et al. Frontrunner Jones and the Raiders of the Dark Forest: An Empirical Study of Frontrunning on the Ethereum Blockchain , 2021, USENIX Security Symposium.
[32] Sam M. Werner,et al. SoK: Decentralized Finance (DeFi) , 2021, AFT.
[33] Ghassan O. Karame,et al. EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts , 2020, USENIX Security Symposium.
[34] Arthur Gervais,et al. High-Frequency Trading on Decentralized On-Chain Exchanges , 2020, 2021 IEEE Symposium on Security and Privacy (SP).
[35] Fabian Schär. Decentralized Finance: On Blockchain- and Smart Contract-Based Financial Markets , 2020, Review.
[36] B. Livshits,et al. Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit , 2020, Financial Cryptography.
[37] Lingxiao Jiang,et al. Checking Smart Contracts With Structural Code Embedding , 2020, IEEE Transactions on Software Engineering.
[38] Pawel Szalachowski,et al. The Security Reference Architecture for Blockchains: Toward a Standardized Model for Studying Vulnerabilities, Threats, and Defenses , 2019, IEEE Communications Surveys & Tutorials.
[39] Irfan Ul Haq,et al. A Survey of Binary Code Similarity , 2019, ACM Comput. Surv..
[40] Hayden Adams,et al. Uniswap v3 Core , 2021 .
[41] Adam Doupé,et al. Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask) , 2021, Financial Cryptography.
[42] Baoxu Liu,et al. Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications , 2021, USENIX Security Symposium.
[43] Hakjoo Oh,et al. SmarTest: Effectively Hunting Vulnerable Transaction Sequences in Smart Contracts through Language Model-Guided Symbolic Execution , 2021, USENIX Security Symposium.
[44] A. Juels,et al. SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Reinforcement Learning , 2021, NDSS.
[45] Xiapu Luo,et al. As Strong As Its Weakest Link: How to Break Blockchain DApps at RPC Service , 2021, NDSS.
[46] Benjamin Livshits,et al. Smart Contract Vulnerabilities: Vulnerable Does Not Imply Exploited , 2021, USENIX Security Symposium.
[47] Manar H. Alalfi,et al. A Survey of Security Vulnerabilities in Ethereum Smart Contracts , 2021, CASCON.
[48] Shiping Chen,et al. SoK: Diving into DAG-based Blockchain Systems , 2020, ArXiv.
[49] Arthur Gervais,et al. AMR: autonomous coin mixer with privacy preserving reward distribution , 2020, AFT.
[50] Osamu Mizuno,et al. Code cloning in smart contracts: a case study on verified contracts from the Ethereum blockchain platform , 2020, Empirical Software Engineering.
[51] Yinxing Xue,et al. Cross-Contract Static Analysis for Detecting Practical Reentrancy Vulnerabilities in Smart Contracts , 2020, 2020 35th IEEE/ACM International Conference on Automated Software Engineering (ASE).
[52] A. Plastun,et al. Daily abnormal price changes and trading strategies in the FOREX , 2020 .
[53] Rastislav Bodik,et al. Summary-Based Symbolic Evaluation for Smart Contracts , 2020, 2020 35th IEEE/ACM International Conference on Automated Software Engineering (ASE).
[54] Savva Shanaev,et al. Efficient scholars: academic attention and the disappearance of anomalies , 2020 .
[55] Sungjae Hwang,et al. Gap between Theory and Practice: An Empirical Study of Security Patches in Solidity , 2020, 2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE).
[56] Constantin Enea,et al. Behavioral simulation for smart contracts , 2020, PLDI.
[57] Fan Long,et al. Securing smart contract with runtime validation , 2020, PLDI.
[58] Yannis Smaragdakis,et al. Ethainter: a smart contract security analyzer for composite vulnerabilities , 2020, PLDI.
[59] Clara Schneidewind,et al. eThor: Practical and Provably Sound Static Analysis of Ethereum Smart Contracts , 2020, CCS.
[60] Jun Sun,et al. Semantic Understanding of Smart Contracts: Executable Operational Semantics of Solidity , 2020, 2020 IEEE Symposium on Security and Privacy (SP).
[61] Ari Juels,et al. Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability , 2020, 2020 IEEE Symposium on Security and Privacy (SP).
[62] Dimitar Dimitrov,et al. VerX: Safety Verification of Smart Contracts , 2020, 2020 IEEE Symposium on Security and Privacy (SP).
[63] Jun Sun,et al. sFuzz: An Efficient Adaptive Fuzzer for Solidity Smart Contracts , 2020, 2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE).
[64] Benjamin Livshits,et al. The Decentralized Financial Crisis: Attacking DeFi , 2020, ArXiv.
[65] Pedro Moreno-Sanchez,et al. SoK: Layer-Two Blockchain Protocols , 2020, Financial Cryptography.
[66] Friedhelm Victor,et al. Address Clustering Heuristics for Ethereum , 2020, Financial Cryptography.
[67] Ari Juels,et al. BDoS: Blockchain Denial-of-Service , 2019, CCS.
[68] Rui Abreu,et al. Empirical Review of Automated Analysis Tools on 47,587 Ethereum Smart Contracts , 2019, 2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE).
[69] Daniel Perez,et al. Broken Metre: Attacking Resource Metering in EVM , 2019, NDSS.
[70] Heejo Lee,et al. VERISMART: A Highly Precise Safety Verifier for Ethereum Smart Contracts , 2019, 2020 IEEE Symposium on Security and Privacy (SP).
[71] Lei Wu,et al. Characterizing Code Clones in the Ethereum Smart Contract Ecosystem , 2019, Financial Cryptography.
[72] Daniel W. Woods. Systematization of Knowledge: Quantifying Cyber Risk , 2020 .
[73] Bitcoin Proof of Stake: A Peer-to-Peer Electronic Cash System , 2020 .
[74] Yinqian Zhang,et al. TXSPECTOR: Uncovering Attacks in Ethereum from Transactions , 2020, USENIX Security Symposium.
[75] Yinzhi Cao,et al. An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem , 2020, USENIX Security Symposium.
[76] Thorsten Holz,et al. ETHBMC: A Bounded Model Checker for Smart Contracts , 2020, USENIX Security Symposium.
[77] Yuxing Tang,et al. SODA: A Generic Online Detection Framework for Smart Contracts , 2020, NDSS.
[78] George Bissias,et al. Bobtail: Improved Blockchain Security with Low-Variance Mining , 2020, NDSS.
[79] Mislav Balunovic,et al. Learning to Fuzz from Symbolic Execution with Application to Smart Contracts , 2019, CCS.
[80] Xiapu Luo,et al. TokenScope: Automatically Detecting Inconsistent Behaviors of Cryptocurrency Tokens in Ethereum , 2019, CCS.
[81] Sebastian Faust,et al. A Formal Treatment of Deterministic Wallets , 2019, IACR Cryptol. ePrint Arch..
[82] Robin Doss,et al. Security Analysis Methods on Ethereum Smart Contract Vulnerabilities: A Survey , 2019, ArXiv.
[83] Shouhuai Xu,et al. A Survey on Ethereum Systems Security: Vulnerabilities, Attacks and Defenses , 2019 .
[84] Jia-Guang Sun,et al. Enabling Clone Detection For Ethereum Via Smart Contract Birthmarks , 2019, 2019 IEEE/ACM 27th International Conference on Program Comprehension (ICPC).
[85] Yannis Smaragdakis,et al. Gigahorse: Thorough, Declarative Decompilation of Smart Contracts , 2019, 2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE).
[86] Mike Joy,et al. Source-code Similarity Detection and Detection Tools Used in Academia , 2019, ACM Trans. Comput. Educ..
[87] Pawel Szalachowski,et al. StrongChain: Transparent and Collaborative Proof-of-Work Consensus , 2019, USENIX Security Symposium.
[88] Aziz Mohaisen,et al. Exploring the Attack Surface of Blockchain: A Systematic Overview , 2019, ArXiv.
[89] Bart Preneel,et al. Lay Down the Common Metrics: Evaluating Proof-of-Work Consensus Protocols' Security , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[90] Mathis Steichen,et al. The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts , 2019, USENIX Security Symposium.
[91] Zeinab Amin,et al. A practical road map for assessing cyber risk , 2019 .
[92] Bernhard Haslhofer,et al. An Empirical Analysis of Monero Cross-Chain Traceability , 2018, ArXiv.
[93] Ghassan O. Karame,et al. Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks , 2018, NDSS.
[94] Sarah Meiklejohn,et al. Tracing Transactions Across Cryptocurrency Ledgers , 2018, USENIX Security Symposium.
[95] Pawel Szalachowski,et al. PDFS: Practical Data Feed Service for Smart Contracts , 2018, ESORICS.
[96] Ee-Chien Chang,et al. Towards Scaling Blockchain Systems via Sharding , 2018, SIGMOD Conference.
[97] Arthur Gervais,et al. NOCUST – A Securely Scalable Commit-Chain , 2019 .
[98] Ethan Heilman,et al. Low-Resource Eclipse Attacks on Ethereum's Peer-to-Peer Network , 2020, IACR Cryptol. ePrint Arch..
[99] Alan Mislove,et al. Analyzing Ethereum's Contract Topology , 2018, Internet Measurement Conference.
[100] Andrew Miller,et al. Measuring Ethereum Network Peers , 2018, Internet Measurement Conference.
[101] Abhi Shelat,et al. A Better Method to Analyze Blockchain Consistency , 2018, CCS.
[102] Mariana Raykova,et al. RapidChain: Scaling Blockchain via Full Sharding , 2018, CCS.
[103] Vincent Gramoli,et al. Vandal: A Scalable Security Analysis Framework for Smart Contracts , 2018, ArXiv.
[104] Chao Liu,et al. S-gram: Towards Semantic-Aware Security Auditing for Ethereum Smart Contracts , 2018, 2018 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE).
[105] Christian Rossow,et al. teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts , 2018, USENIX Security Symposium.
[106] Ye Liu,et al. ContractFuzzer: Fuzzing Smart Contracts for Vulnerability Detection , 2018, 2018 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE).
[107] APPEARANCE AND DISAPPEARANCE OF ANOMALIES , 2018, Lecture Notes in Behavioral Finance.
[108] Petar Tsankov,et al. Securify: Practical Security Analysis of Smart Contracts , 2018, CCS.
[109] Philipp Jovanovic,et al. OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[110] Ittay Eyal,et al. The Gap Game , 2018, SYSTOR.
[111] Albert Rubio,et al. EthIR: A Framework for High-Level Analysis of Ethereum Bytecode , 2018, ATVA.
[112] Sarah Meiklejohn,et al. An Empirical Analysis of Anonymity in Zcash , 2018, USENIX Security Symposium.
[113] Prateek Saxena,et al. Finding The Greedy, Prodigal, and Suicidal Contracts at Scale , 2018, ACSAC.
[114] J. Cotter,et al. Are Equity Market Anomalies Disappearing? Evidence from the U.K. , 2018 .
[115] Ittai Abraham,et al. Online detection of effectively callback free objects with applications to smart contracts , 2017, Proc. ACM Program. Lang..
[116] S. Matthew Weinberg,et al. Arbitrum: Scalable, private smart contracts , 2018, USENIX Security Symposium.
[117] Yi Zhou,et al. Erays: Reverse Engineering Ethereum's Opaque Smart Contracts , 2018, USENIX Security Symposium.
[118] Sukrit Kalra,et al. ZEUS: Analyzing Safety of Smart Contracts , 2018, NDSS.
[119] Prateek Saxena,et al. Obscuro: A Bitcoin Mixer using Trusted Execution Environments , 2018, IACR Cryptol. ePrint Arch..
[120] Ari Juels,et al. Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts , 2018, IACR Cryptol. ePrint Arch..
[121] Jeffrey Quesnelle,et al. On the linkability of Zcash transactions , 2017, ArXiv.
[122] Tsz Hon Yuen,et al. RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero , 2017, ESORICS.
[123] Massimo Bartoletti,et al. A Survey of Attacks on Ethereum Smart Contracts (SoK) , 2017, POST.
[124] Xiapu Luo,et al. Under-optimized smart contracts devour your money , 2017, 2017 IEEE 24th International Conference on Software Analysis, Evolution and Reengineering (SANER).
[125] Prateek Saxena,et al. A Secure Sharding Protocol For Open Blockchains , 2016, CCS.
[126] Prateek Saxena,et al. Making Smart Contracts Smarter , 2016, IACR Cryptol. ePrint Arch..
[127] Hubert Ritzdorf,et al. On the Security and Performance of Proof of Work Blockchains , 2016, IACR Cryptol. ePrint Arch..
[128] Martin White,et al. Deep learning code fragments for code clone detection , 2016, 2016 31st IEEE/ACM International Conference on Automated Software Engineering (ASE).
[129] Arthur Gervais,et al. Ethereum Eclipse Attacks , 2016 .
[130] Hubert Ritzdorf,et al. Tampering with the Delivery of Blocks and Transactions in Bitcoin , 2015, IACR Cryptol. ePrint Arch..
[131] Emin Gün Sirer,et al. Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.
[132] Daniel Davis Wood,et al. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .
[133] S A R A H M E I K L E J O H N,et al. A Fistful of Bitcoins Characterizing Payments Among Men with No Names , 2013 .
[134] Ghassan O. Karame,et al. Evaluating User Privacy in Bitcoin , 2013, Financial Cryptography.
[135] Rick H. Hoyle,et al. Handbook of structural equation modeling , 2012 .
[136] C. Stein,et al. Structural equation modeling. , 2012, Methods in molecular biology.
[137] M. Asif Khan,et al. Cyber security quantification model , 2010, SIN.
[138] Chanchal Kumar Roy,et al. Comparison and evaluation of code clone detection techniques and tools: A qualitative approach , 2009, Sci. Comput. Program..
[139] Phil Wood. Confirmatory Factor Analysis for Applied Research , 2008 .
[140] S. Nakamoto,et al. Bitcoin: A Peer-to-Peer Electronic Cash System , 2008 .
[141] Sushil Jajodia,et al. Toward measuring network security using attack graphs , 2007, QoP '07.
[142] P. Barrett. Structural equation modelling : Adjudging model fit , 2007 .
[143] Chanchal K. Roy,et al. A Survey on Software Clone Detection Research , 2007 .
[144] Brady T. West,et al. Linear Mixed Models: A Practical Guide Using Statistical Software , 2006 .
[145] Dianne M. Finkelstein,et al. A Beginner's Guide to Structural Equation Modeling , 2005, Technometrics.
[146] Jun Sun,et al. Assessing Goodness of Fit in Confirmatory Factor Analysis , 2005 .
[147] Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[148] Susan Horwitz,et al. Using Slicing to Identify Duplication in Source Code , 2001, SAS.
[149] B. Byrne. Structural equation modeling with EQS : basic concepts, applications, and programming , 2000 .
[150] Rick H. Hoyle,et al. Confirmatory Factor Analysis , 1983 .
[151] Detmar W. Straub,et al. Structural Equation Modeling and Regression: Guidelines for Research Practice , 2000, Commun. Assoc. Inf. Syst..
[152] Stéphane Ducasse,et al. A language independent approach for detecting duplicated code , 1999, Proceedings IEEE International Conference on Software Maintenance - 1999 (ICSM'99). 'Software Maintenance for Business Change' (Cat. No.99CB36360).
[153] Rex B. Kline,et al. Principles and Practice of Structural Equation Modeling , 1998 .
[154] L. D. Moura,et al. Clone detection using abstract syntax trees , 1998, Proceedings. International Conference on Software Maintenance (Cat. No. 98CB36272).
[155] Murray D. Smith,et al. Structural Equation Modeling: Concepts, Issues, and Applications , 1996 .
[156] Brenda S. Baker,et al. On finding duplication and near-duplication in large software systems , 1995, Proceedings of 2nd Working Conference on Reverse Engineering.
[157] R. Hoyle. The structural equation modeling approach: Basic concepts and fundamental issues. , 1995 .
[158] A. Satorra,et al. Corrections to test statistics and standard errors in covariance structure analysis. , 1994 .
[159] Karl G. Jöreskog,et al. Lisrel 8: Structural Equation Modeling With the Simplis Command Language , 1993 .
[160] N. Strong,et al. MODELLING ABNORMAL RETURNS: A REVIEW ARTICLE , 1992 .
[161] P. Bentler,et al. Comparative fit indexes in structural models. , 1990, Psychological bulletin.
[162] Robert T. Braden,et al. Requirements for Internet Hosts - Communication Layers , 1989, RFC.
[163] Janet L. Yellen,et al. A Near-Rational Model of the Business Cycle , 1985 .
[164] Karl G. Jöreskog,et al. Recent Developments in Structural Equation Modeling , 1982 .
[165] C. Fornell,et al. Structural Equation Models with Unobservable Variables and Measurement Error: Algebra and Statistics , 1981 .
[166] M. Rubin,et al. Dynamics of dimensional reduction , 1980 .
[167] P. Bentler,et al. Significance Tests and Goodness of Fit in the Analysis of Covariance Structures , 1980 .
[168] B. Muthén,et al. Assessing Reliability and Stability in Panel Models , 1977 .
[169] K. Jöreskog. A General Method for Estimating a Linear Structural Equation System. , 1970 .