Skip to content

Latest commit

 

History

History
216 lines (135 loc) · 10.7 KB

README.md

File metadata and controls

216 lines (135 loc) · 10.7 KB

Top-Blockchain-paper: All 2018 papers.

S&P

  • OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding
    Eleftherios Kokoris-Kogias (EPFL), Philipp Jovanovic (EPFL), Linus Gasser (EPFL), Nicolas Gailly (EPFL), Ewa Syta (Trinity College), and Bryan Ford (EPFL)

  • Routing Around Congestion: Defeating DDoS Attacks and Adverse Network Conditions via Reactive BGP Routing
    Jared M Smith (University of Tennessee) and Max Schuchard (University of Tennessee)

CCS

  • CHECKMATE: Practical Security Analysis of Smart Contracts
    Petar Tsankov (ETH Zurich), Andrei Marian Dan (ETH Zurich), Dana Drachsler Cohen (ETH Zurich), Arthur Gervais (Imperial College London), Florian Buenzli (ETH Zurich), Martin Vechev (ETH Zurich)

  • BitML: a calculus for Bitcoin smart contracts Massimo
    Bartoletti (University of Cagliari), Roberto Zunino (University of Trento)

  • BEAT: Asynchronous BFT Made Practical
    Sisi Duan (University of Maryland, Baltimore County), Michael K. Reiter (University of North Carolina at Chapel Hill), Haibin Zhang (University of Maryland, Baltimore County)

  • A better method to analyze blockchain consistency
    Lucianna Kiffer(Northeastern University), Abhi Shelat (Northeastern University), Rajmohan Rajaraman (Northeastern University)

  • An End-to-End System for Large Scale P2P MPC-as-a-Service and Low-Bandwidth MPC for Weak Participants (MPC)
    Assi Barak (Bar-Ilan University), Martin Hirt (ETH Zurich), Lior Koskas (Bar-Ilan University), Yehuda Lindell (Bar-Ilan University)

  • Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability
    Christian Badertscher (ETH Zurich), Peter Gazi (IOHK), Aggelos Kiayias (University of Edinburgh and IOHK), Alexander Russell (University of Connecticut), Vassilis Zikas (University of Edinburgh and IOHK)

  • nanoPI: Extreme-Scale Actively-Secure Multi-Party Computation (MPC)
    Ruiyu Zhu (Indiana University), Darion Cassel (Carnegie Mellon University), Amr Sabry (Indiana University), Yan Huang (Indiana University)

  • Secure Computation with Differentially Private Access Patterns
    Sahar Mazloom (George Mason University), S. Dov Gordon (George Mason University)

  • RapidChain: Fast Blockchain Consensus via Full Sharding
    Mahdi Zamani (Visa Research), Mahnush Movahedi (Dfinity), Mariana Raykova (Yale University)

  • FairSwap: How to fairly exchange digital goods
    Stefan Dziembowski (University of Warsaw), Lisa Eckey (TU Darmstadt), Sebastian Faust (TU Darmstadt)

Usenix Security

  • An Empirical Analysis of Anonymity in Zcash
    George Kappos, Haaroon Yousaf, Mary Maller, and Sarah Meiklejohn, University College London

  • teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts
    Johannes Krupp and Christian Rossow, CISPA

  • Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts
    Lorenz Breindenbach, ETH Zurich; Phil Daian, Cornell Tech; Florian Tramer, Stanford University; Ari Juels, Cornell Tech Jacobs Institute

  • Arbitrum: Scalable smart contracts
    Harry Kalodner, Steven Goldfeder, Xiaoqi Chen, Matt Weinberg, and Edward Felten, Princeton University

  • Erays: Reverse Engineering Ethereum's Opaque Smart Contracts
    Yi Zhou, Deepak Kumar, Surya Bakshi, Joshua Mason, Andrew Miller, and Michael Bailey, University of Illinois, Urbana-Champaign

  • DelegaTEE: Brokered Delegation Using Trusted Execution Environments (SGX)
    Sinisa Matetic and Moritz Schneider, ETH Zurich; Andrew Miller, UIUC; Ari Juels, Cornell Tech; Srdjan Capkun, ETH Zurich

NDSS

  • OBLIVIATE: A Data Oblivious Filesystem for Intel SGX
    Adil Ahmad (Purdue University), Kyungtae Kim(Purdue University), Muhammad Ihsanulhaq Sarfaraz (Purdue University), and Byoungyoung Lee (Purdue University)

  • ZEUS: Analyzing Safety of Smart Contracts
    Sukrit Kalra (IBM Research), Seep Goel (IBM Research), Mohan Dhawan (IBM Research), and Subodh Sharma (IIT Delhi)

  • Chainspace: A Sharded Smart Contracts Platform
    Mustafa Al-Bassam (University College London), Alberto Sonnino (University College London), Shehar Bano (University College London), Dave Hrycyszyn(constructiveproof.com), and George Danezis (University College London)

  • Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions
    Stefanie Roos (University of Waterloo), Pedro Moreno-Sanchez (Purdue University), Aniket Kate (Purdue University), and Ian Goldberg (University of Waterloo)

  • TLS-N: Non-repudiation over TLS Enablign Ubiquitous Content Signing
    Hubert Ritzdorf (ETH Zurich), Karl Wust (ETH Zurich), Arthur Gervais (Imperial College London), Guillaume Felley (ETH Zurich), and Srdjan Capkun(ETH Zurich)

  • Consensual and Privacy-Preserving Sharing of Multi-Subject and Interdependent Data
    Alexandra-Mihaela Olteanu (EPFL and UNIL-HEC Lausanne), Kevin Huguenin (UNIL-HEC Lausanne), Italo Dacosta (EPFL), and Jean-Pierre Hubaux (EPFL)

ACSAC

  • Finding The Greedy, Prodigal, and Suicidal Contracts at Scale
    Ivica Nikolic, School of Computing, NUS; Aashish Kolluri, School of Computing, NUS; Ilya Sergey, University College London; Prateek Saxena, School of Computing, NUS; Aquinas Hobor, Yale-NUS College and School of Computing, NUS

  • Osiris: Hunting for Integer Bugs in Ethereum Smart Contracts
    Christof Ferreira Torres, SnT/University of Luxembourg; Julian Schütte, Fraunhofer AISEC; Radu State, SnT/University of Luxembourg

  • SmarTor: Smarter Tor with Smart Contracts
    Andre Greubel, University of Wuerzburg; Alexandra Dmitrienko, University of Wuerzburg; Samuel Kounev, University of Wuerzburg

  • Obscuro: A Bitcoin Mixer using Trusted Execution Environments
    Muoi Tran, National University of Singapore; Loi Luu, Kyber Network; Min Suk Kang, National University of Singapore; Iddo Bentov, Cornell University; Prateek Saxena, National University of Singapore

RAID

  • Identifying Key Leakage of Bitcoin Users
    Sichael Brengel, Christian Rossow (CISPA, Saarland University)

ASIACCS

  • On the Strategy and Behavior of Bitcoin Mining with N-attackers
    Hanqing Liu, Na Ruan, Rongtian Du, and Weijia Jia (Shanghai Jiao Tong University)

ICICS

  • uMine: a Blockchain based on Human Miners
    Henning Kopp, Frank Kargl, Christoph Bösch (Ulm University, Germany) and Andreas Peter (University of Twente, Netherlands)

  • lockchain-Based Secure Data Provenance for Cloud Storage
    Yuan Zhang (UESTC, China), Xiaodong Lin (University of Ontario Institute of Technology, Canada) and Chunxiang Xu (University of Science and Technology of China, China)

  • Micropaying to a Distributed Payee with Instant Confirmation (Short)
    Peifang Ni, Hongda Li and Dongxue Pan (IIE, CAS, China)

  • Application of public ledgers to revocation in distributed access control (Short)
    Thanh Bui and Tuomas Aura (Aalto University, Finland)

NSDI

  • zkLedger: Privacy-Preserving Auditing for Distributed Ledgers
    Neha Narula, Willy Vasquez, Madars Virza

OSDI

  • An Analysis of Network-Partitioning Failures in Cloud Systems
    Ahmed Alquraan, Hatem Takruri, Mohammed Alfatafta, Samer Al-Kiswany

EUROSYS

  • Hyperledger fabric: a distributed operating system for permissioned blockchains
    Elli Androulaki, Artem Barger, Vita Bortnikov, Christian Cachin, Konstantinos Christidis, Angelo De Caro, David Enyeart, Christopher Ferris, Gennady Laventman, Yacov Manevich, Srinivasan Muralidharan, Chet Murthy, Binh Nguyen, Manish Sethi, Gari Singh, Keith Smith, Alessandro Sorniotti, Chrysoula Stathakopoulou, Marko Vukolic, Sharon Weed Cocco, Jason Yellick

SOSP(2017)

  • Algorand: Scaling Byzantine Agreements for Cryptocurrencies
    Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, Nickolai Zeldovich

DSN

  • A Byzantine Fault-Tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform
    João Sousa, Alysson Bessani, Marko Vukolic

  • IBBE-SGX: Cryptographic Group Access Control Using Trusted Execution Environments
    Stefan Contiu, Rafael Pires, Sébastien Vaucher, Marcelo Pasin, Pascal Felber, Laurent Réveillère

DSN workshop

  • Protecting Early Stage Proof-of-Work Based Public Blockchain
    Lin Chen, Lei Xu, Zhimin Gao, Yang Lu, Weidong Shi

  • Challenges and Pitfalls of Partitioning Blockchains
    Enrique Fynn, Fernando Pedone

  • Random Mining Group Selection to Prevent 51% Attacks on Bitcoin (workshop)
    Jaewon Bae, Hyuk Lim

  • Latency-Aware Leader Selection for Geo-Replicated Byzantine Fault-Tolerant Systems
    Michael Eischer, Tobias Distler

  • Towards Model-Driven Engineering of Smart Contracts for Cyber-Physical Systems
    Peter Garamvolgyi, Imre Kocsis, Benjamin Gehl, Attila Klenik

  • Towards Low-Latency Byzantine Agreement Protocols Using RDMA
    Signe Rüsch, Ines Messadi, Rüdiger Kapitza

INFOCOM

  • Understanding Ethereum via Graph Analysis (Best paper)
    Ting Chen, Yuxiao Zhu, Zihao Li, Jiachi Chen, Xiaoqi Li, Xiapu Luo, Xiaodong Lin, Xiaosong Zhang

  • Searching an Encrypted Cloud Meets Blockchain: A Decentralized, Reliable and Fair Realization
    Shengshan Hu, Chengjun Cai, Qian Wang, Cong Wang, Xiangyang Luo, Kui Ren

  • CertChain: Public and Efficient Certificate Audit Based on Blockchain for TLS Connections
    Jing Chen, Shixiong Yao, Quan Yuan, Kun He, Shouling Ji, Ruiying Du

  • Stochastic Models and Wide-Area Network Measurements for Blockchain Design and Analysis
    Nikolaos Papadis, Sem C. Borst, Anwar Walid, Mohamed Grissa, Leandros Tassiulas

  • Randomized View Reconciliation in Permissionless Distributed Systems
    Ruomu Hou, Irvan Jahja, Loi Luu, Prateek Saxena, Haifeng Yu

  • Sybil-Proof Online Incentive Mechanisms for Crowdsensing
    Jian Lin, Ming Li, Dejun Yang, Guoliang Xue

SOCC

  • Untethered: Deployable Blockchains for IoT Environments
    Kolbeinn Karlsson, Danny Adams, Gloire Rubambiza, Zangyueyang Xian, Robbert van Renesse, Hakim Weatherspoon, Stephen B. Wicker

ESORICS

  • A Secure Auction for Blockchains
    Erik-Oliver Blass, Florian Kerschbaum:Strain

  • Channels: Horizontal Scaling and Confidentiality on Permissioned Blockchains
    Elli Androulaki, Christian Cachin, Angelo De Caro, Eleftherios Kokoris-Kogias

  • Dissemination of Authenticated Tree-Structured Data with Privacy Protection and Fine-Grained Control in Outsourced Databases
    Jianghua Liu, Jinhua Ma, Wanlei Zhou, Yang Xiang, Xinyi Huang

FC (C类)

License

CC0

This list is released into the public domain.