Blockchain Censorship
暂无分享,去创建一个
Arthur Gervais | Liyi Zhou | D. Svetinovic | Nicolas Christin | Kaihua Qin | S. Steinhorst | Aviv Yaish | Jens Ernstberger | Mikołaj Barczentewicz | Taro Tsuchiya | Anton Wahrstatter
[1] Sri Aravinda Krishnan Thyagarajan,et al. Foundations of Coin Mixing Services , 2022, IACR Cryptol. ePrint Arch..
[2] Kshitij Kulkarni,et al. Improving Proof of Stake Economic Security via MEV Redistribution , 2022, DeFi@CCS.
[3] A. Kiayias,et al. SoK: A Stratified Approach to Blockchain Decentralization , 2022, ArXiv.
[4] Yotam gafni,et al. Greedy Transaction Fee Mechanisms for (Non-)myopic Miners , 2022, ArXiv.
[5] Qiang Tang,et al. Dumbo-NG: Fast Asynchronous BFT Consensus with Throughput-Oblivious Latency , 2022, CCS.
[6] Arthur Gervais,et al. SoK: Decentralized Finance (DeFi) Attacks , 2022, 2023 IEEE Symposium on Security and Privacy (SP).
[7] Ertem Nusret Tas,et al. Bitcoin-Enhanced Proof-of-Stake Security: Possibilities and Impossibilities , 2022, 2023 IEEE Symposium on Security and Privacy (SP).
[8] Aviv Zohar,et al. Blockchain Stretching & Squeezing: Manipulating Time for Your Best Interest , 2022, EC.
[9] Mike Just,et al. The Unique Dressing of Transactions: Wasabi CoinJoin Transaction Detection , 2022, EICC.
[10] Ye Wang,et al. Impact and User Perception of Sandwich Attacks in the DeFi Ecosystem , 2022, CHI.
[11] Roger Wattenhofer,et al. SoK: Preventing Transaction Reordering Manipulations in Decentralized Finance , 2022, AFT.
[12] B. Livshits,et al. On How Zero-Knowledge Proof Blockchain Mixers Improve, and Worsen User Privacy , 2022, IACR Cryptol. ePrint Arch..
[13] Aviv Zohar,et al. Sliding Window Challenge Process for Congestion Detection , 2022, Financial Cryptography.
[14] Kartik Nayak,et al. Empirical Analysis of EIP-1559: Transaction Fees, Waiting Times, and Consensus Security , 2022, CCS.
[15] Malaw Ndiaye,et al. Cryptocurrency Crime: Behaviors of Malicious Smart Contracts in Blockchain , 2021, 2021 International Symposium on Networks, Computers and Communications (ISNCC).
[16] Arthur Gervais,et al. A2MM: Mitigating Frontrunning, Transaction Reordering and Consensus Instability in Decentralized Exchanges , 2021, ArXiv.
[17] Philipp Jovanovic,et al. An empirical study of DeFi liquidations: incentives, risks, and instabilities , 2021, Internet Measurement Conference.
[18] Joachim Neu,et al. The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets , 2021, IACR Cryptol. ePrint Arch..
[19] Vincent Gramoli,et al. Red Belly: A Secure, Fair and Scalable Open Blockchain , 2021, 2021 IEEE Symposium on Security and Privacy (SP).
[20] Benjamin Livshits,et al. On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols , 2021, 2021 IEEE Symposium on Security and Privacy (SP).
[21] Daniel J. Moroz,et al. Low-cost attacks on Ethereum 2.0 by sub-1/3 stakeholders , 2021, ArXiv.
[22] Arthur Gervais,et al. Quantifying Blockchain Extractable Value: How dark is the forest? , 2021, 2022 IEEE Symposium on Security and Privacy (SP).
[23] Zhi Wang,et al. Towards Understanding and Demystifying Bitcoin Mixing Services , 2020, WWW.
[24] Kartik Nayak,et al. BFT Protocol Forensics , 2020, CCS.
[25] Arthur Gervais,et al. AMR: autonomous coin mixer with privacy preserving reward distribution , 2020, AFT.
[26] Arthur Gervais,et al. High-Frequency Trading on Decentralized On-Chain Exchanges , 2020, 2021 IEEE Symposium on Security and Privacy (SP).
[27] M. Matos,et al. Impact of Geo-Distribution and Mining Pools on Blockchains: A Study of Ethereum , 2020, 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[28] Ari Juels,et al. Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability , 2020, 2020 IEEE Symposium on Security and Privacy (SP).
[29] Yong Guan,et al. Knowing your Bitcoin Customer: Money Laundering in the Bitcoin Economy , 2020, 2020 13th International Conference on Systematic Approaches to Digital Forensic Engineering (SADFE).
[30] Friedhelm Victor,et al. Address Clustering Heuristics for Ethereum , 2020, Financial Cryptography.
[31] Angelique Faye Loe,et al. You Shall Not Join: A Measurement Study of Cryptocurrency Peer-to-Peer Bootstrapping Techniques , 2019, CCS.
[32] George Danezis,et al. SoK: Consensus in the Age of Blockchains , 2017, AFT.
[33] Clifford De Raffaele,et al. Cybersecurity and the Blockchain: Preventing the Insertion of Child Pornography Images , 2019, 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC).
[34] Jie Chen,et al. Anti-Money Laundering in Bitcoin: Experimenting with Graph Convolutional Networks for Financial Forensics , 2019, ArXiv.
[35] Min Suk Kang,et al. A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network , 2019, 2020 IEEE Symposium on Security and Privacy (SP).
[36] Sebastian Faust,et al. Temporary Censorship Attacks in the Presence of Rational Miners , 2019, 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
[37] Yu Zhou,et al. Improved Consensus Mechanisms Against Censorship Attacks , 2019, 2019 IEEE International Conference on Industrial Cyber Physical Systems (ICPS).
[38] Bart Preneel,et al. Lay Down the Common Metrics: Evaluating Proof-of-Work Consensus Protocols' Security , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[39] Jeremy Clark,et al. SoK: Transparent Dishonesty: Front-Running Attacks on Blockchain , 2019, Financial Cryptography Workshops.
[40] Jin Song Dong,et al. Formal Analysis of a Proof-of-Stake Blockchain , 2018, 2018 23rd International Conference on Engineering of Complex Computer Systems (ICECCS).
[41] Sarah Meiklejohn,et al. Smart contracts for bribing miners , 2018, IACR Cryptol. ePrint Arch..
[42] Martin Florian,et al. Anonymous CoinJoin Transactions with Arbitrary Values , 2017, 2017 IEEE Trustcom/BigDataSE/ICESS.
[43] Elaine Shi,et al. The Honey Badger of BFT Protocols , 2016, CCS.
[44] Ian Goldberg,et al. SoK: Making Sense of Censorship Resistance Systems , 2016, Proc. Priv. Enhancing Technol..
[45] Laurent Vanbever,et al. Hijacking Bitcoin: Routing Attacks on Cryptocurrencies , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[46] Vern Paxson,et al. SoK: Towards Grounding Censorship Circumvention in Empiricism , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[47] Hubert Ritzdorf,et al. Tampering with the Delivery of Blocks and Transactions in Bitcoin , 2015, IACR Cryptol. ePrint Arch..
[48] Ethan Heilman,et al. Eclipse Attacks on Bitcoin's Peer-to-Peer Network , 2015, USENIX Security Symposium.
[49] Ghassan O. Karame,et al. Misbehavior in Bitcoin: A Study of Double-Spending and Accountability , 2015, TSEC.
[50] Aggelos Kiayias,et al. The Bitcoin Backbone Protocol: Analysis and Applications , 2015, EUROCRYPT.
[51] Alex Biryukov,et al. Bitcoin over Tor isn't a Good Idea , 2014, 2015 IEEE Symposium on Security and Privacy.
[52] Pedro Moreno-Sanchez,et al. CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin , 2014, ESORICS.
[53] Ghassan O. Karame,et al. Evaluating User Privacy in Bitcoin , 2013, Financial Cryptography.
[54] Nicolas Christin,et al. Traveling the silk road: a measurement analysis of a large anonymous online marketplace , 2012, WWW.
[55] Nir Bitansky,et al. From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again , 2012, ITCS '12.
[56] Michael K. Reiter,et al. Censorship Resistance Revisited , 2005, Information Hiding.
[57] Ghassan O. Karame,et al. Censorship-Resilient and Confidential Collateralized Second-Layer Payments , 2022, IACR Cryptol. ePrint Arch..
[58] Gilad Stern,et al. Uncle Maker: (Time)Stamping Out The Competition in Ethereum , 2023, IACR Cryptol. ePrint Arch..
[59] Raphael A. Auer,et al. Miners as intermediaries: extractable value and market manipulation in crypto and DeFi , 2022 .
[60] Pedro Moreno-Sanchez,et al. Pinpointing and Measuring Wasabi and Samourai CoinJoins in the Bitcoin Ecosystem , 2021, ArXiv.
[61] Daniel Davis Wood,et al. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .
[62] A. J. Angulo. By Executive Order , 2012 .
[63] S. Nakamoto,et al. Bitcoin: A Peer-to-Peer Electronic Cash System , 2008 .
[64] George Danezis,et al. The Economics of Censorship Resistance , 2004 .