Academic Blockchain Papers
A List of Academic Blockchain Papers
Top 4 Conferences: S&P, CCS, USENIX, NDSS
Other Conferences: PETS, EuroS&P, ICSE, WWW
Specific Conferences: DLT, FC, ICBC, AFT
Included Journals: TDSC, TIFS
π : Interest Level
β : Read with Note
2024
π₯ 73 Papers Accepted by Top 4 Conferences (S&P, CCS, USENIX, NDSS) π₯
35 Papers (till Issue 5) Accepted by TDSC + 27 Papers (till Volume 19) Accepted by TIFS
[Interoperability]
πππ SoK: Security and Privacy of Blockchain Interoperability - S&P
πππ Sweep-UC: Swapping Coins Privately - S&P
Atomic and Fair Data Exchange via Blockchain - CCS
πππ zkCross: A Novel Architecture for Cross-Chain Privacy-Preserving Auditing - USENIX
ππ Sidechains With Optimally Succinct Proof - TDSC
IvyRedaction: Enabling Atomic, Consistent and Accountable Cross-Chain Rewriting - TDSC
Reinventing Multi-User Authentication Security From Cross-Chain Perspective - TIFS
[Privacy]
Stealing Trust: Unraveling Blind Message Attacks in Web3 Authentication - CCS
Complete Knowledge: Preventing Encumbrance of Cryptographic Secrets - CCS
Blind Multi-Signatures for Anonymous Tokens with Decentralized Issuance and Public Verifiability - CCS
ππ Mempool Privacy via Batched Threshold Encryption: Attacks and Defenses - USENIX
πππ GuideEnricher: Protecting the Anonymity of Ethereum Mixing Service Users with Deep Reinforcement Learning - USENIX
π Pisces: Private and Compliable Cryptocurrency Exchange - NDSS
π Content Censorship in the InterPlanetary File System - NDSS
πππ Unlinkable Policy-Compliant Signatures for Compliant and Decentralized Anonymous Payments - PETS
πππ Blockchain Censorship - WWW
πππ DenseFlow: Spotting Cryptocurrency Money Laundering in Ethereum Transaction Graphs - WWW
Monero With Multi-Grained Redaction - TDSC
PrivData Network: A Privacy-Preserving On-Chain Data Factory and Trading Market - TDSC
SPCEX: Secure and Privacy-Preserving Cryptocurrency Exchange - TDSC
πππ Reducing Privacy of CoinJoin Transactions: Quantitative Bitcoin Network Analysis - TDSC
Solution Probing Attack Against Coin Mixing Based Privacy-Preserving Crowdsourcing Platforms - TDSC
PRBFPT: A Practical Redactable Blockchain Framework With a Public Trapdoor - TIFS
Exploring Unobservable Blockchain-Based Covert Channel for Censorship-Resistant Systems - TIFS
ππ BaseSAP: Modular Stealth Address Protocol for Programmable Blockchains - TIFS
πππ Privacy-Preserving Cryptocurrency With Threshold Authentication and Regulation - TIFS
Redactable Blockchain Based on Decentralized Trapdoor Verifiable Delay Functions - TIFS
Controlled Redactable Blockchain Based on T-Times Chameleon Hash and Signature - TIFS
[Scalability]
Specular: Towards Secure, Trust-minimized Optimistic Blockchain Execution - S&P
π Sui Lutris: A Blockchain Combining Broadcast and Consensus - CCS
High-Throughput Three-Party DPFs with Applications to ORAM and Digital Currencies - CCS
ππ Reckle Trees: Updatable Merkle Batch Proofs with Applications - CCS
Front-running Attack in Sharded Blockchains and Fair Cross-shard Consensus - NDSS
A Two-Layer Blockchain Sharding Protocol Leveraging Safety and Liveness for Enhanced Performance - NDSS
Advancing Web 3.0: Making Smart Contracts Smarter on Blockchain - WWW
ππ Anonymous Multi-Hop Payment for Payment Channel Networks - TDSC
monoCash: A Channel-Free Payment Network via Trusted Monotonic Counters - TDSC
Secret Multiple Leaders & Committee Election With Application to Sharding Blockchain - TIFS
A Secure and Efficient Blockchain Sharding Scheme via Hybrid Consensus and Dynamic Management - TIFS
SAMCU: Secure and Anonymous Multi-Channel Updates in Payment Channel Networks - TIFS
Accountable Secret Committee Election and Anonymous Sharding Blockchain Consensus - TIFS
[Security]
ππ Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based Technical Support Scams - S&P
Nurgle: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulation - S&P
Nyx: Detecting Exploitable Front-Running Vulnerabilities in Smart Contracts - S&P
SMARTINV: Multimodal Learning for Smart Contract Invariant Inference - S&P
POMABuster: Detecting Price Oracle Manipulation Attacks in Decentralized Finance - S&P
ππ Pulling Off The Mask: Forensic Analysis of the Deceptive Creator Wallets Behind Smart Contract Fraud - S&P
Towards Smart Contract Fuzzing on GPUs - S&P
Routing Attacks on Cryptocurrency Mining Pools - S&P
Larger-scale Nakamoto-style Blockchains Donβt Necessarily Offer Better Security - S&P
Large-Scale Study of Vulnerability Scanners for Ethereum Smart Contracts - S&P
Non-Atomic Arbitrage in Decentralized Finance - S&P
Formal Model-Driven Analysis of Resilience of GossipSub to Attacks from Misbehaving Peers - S&P
Payout Races and Congested Channels: A Formal Analysis of Security in the Lightning Network - CCS
Blockchain Bribing Attacks and the Efficacy of Counterincentives - CCS
Securing Lightning Channels against Rational Miners - CCS
ππ Characterizing Ethereum Address Poisoning Attack - CCS
Towards Automatic Discovery of Denial of Service Weaknesses in Blockchain Resource Models - CCS
ππ TokenScout: Early Detection of Ethereum Scam Tokens via Temporal Graph Learning - CCS
fAmulet: Finding Finalization Failure Bugs in Polygon zkRollup - CCS
DoubleUp Roll: Double-spending in Arbitrum by Rolling It Back - CCS
πππ Speculative Denial-of-Service Attacks In Ethereum - USENIX
π Understanding Ethereum Mempool Security under Asymmetric DoS by Symbolized Stateful Fuzzing - USENIX
Max Attestation Matters: Making Honest Parties Lose Their Incentives in Ethereum PoS - USENIX
Not your Type! Detecting Storage Collision Vulnerabilities in Ethereum Smart Contracts - NDSS
Abusing the Ethereum Smart Contract Verification Services for Fun and Profit - NDSS
ππ DRAINCLoG: Detecting Rogue Accounts with Illegally-obtained NFTs using Classifiers Learned on Graphs - NDSS
VETEOS: Statically Vetting EOSIO Contracts for the βGroundhog Dayβ Vulnerabilities - NDSS
DISC-NG: Robust Service Discovery in the Ethereum Global Network - EuroS&P
Secure compilation of rich smart contracts on poor UTXO blockchains - EuroS&P
Smart Contract and DeFi Security Tools: Do They Meet the Needs of Practitioners? - ICSE
ππ PonziGuard: Detecting Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph - ICSE
Revealing Hidden Threats: An Empirical Study of Library Misuse in Smart Contracts - ICSE
Are We There Yet? Unraveling the State-of-the-Art Smart Contract Fuzzers - ICSE
When Contracts Meets Crypto: Exploring Developersβ Struggles with Ethereum Cryptographic APIs - ICSE
Towards Finding Accounting Errors in Smart Contracts - ICSE
FlashSyn: Flash Loan Attack Synthesis via Counter Example Driven Approximation - ICSE
GPTScan: Detecting Logic Vulnerabilities in Smart Contracts by Combining GPT with Program Analysis - ICSE
PrettySmart: Detecting Permission Re-delegation Vulnerability for Token Behaviors in Smart Contracts - ICSE
SCVHunter: Smart Contract Vulnerability Detection Based on Heterogeneous Graph Attention Network - ICSE
Safeguarding DeFi Smart Contracts against Oracle Deviations - ICSE
Verifying Declarative Smart Contracts - ICSE
ππ Interface Illusions: Uncovering the Rise of Visual Scams in Cryptocurrency Wallets - WWW
ZipZap: Efficient Training of Language Models for Large-Scale Fraud Detection on Blockchain - WWW
Identifying Risky Vendors in Cryptocurrency P2P Marketplaces - WWW
Characterizing Ethereum Upgradable Smart Contracts and Their Security Implications - WWW
xFuzz: Machine Learning Guided Cross-Contract Fuzzing - TDSC
Secure Redactable Blockchain With Dynamic Support - TDSC
Adaptive Double-Spending Attacks on PoW-Based Blockchains - TDSC
Highly Available Blockchain Nodes With N-Version Design - TDSC
DeFiRanger: Detecting DeFi Price Manipulation Attacks - TDSC
Privacy-Preserving Anomaly Detection of Encrypted Smart Contract for Blockchain-Based Data Trading - TDSC
EVM-Shield: In-Contract State Access Control for Fast Vulnerability Detection and Prevention - TIFS
Quantum-Safe Puncturable Signatures With Their Application in Blockchain - TIFS
ππ Fishing for Fraudsters: Uncovering Ethereum Phishing Gangs With Blockchain Data - TIFS
Unified Feature Engineering for Detection of Malicious Entities in Blockchain Networks - TIFS
Proof of Finalization: A Self-Fulfilling Function of Blockchain - TIFS
ππ Who Stole My NFT? Investigating Web3 NFT Phishing Scams on Ethereum - TIFS
[Zero-Knowledge Proof]
Efficient Zero-Knowledge Arguments For Paillier Cryptosystem - S&P
Scalable Verification of Zero-Knowledge Protocols - S&P
Pianist: Scalable zkRollups via Fully Distributed Zero-Knowledge Proofs - S&P
Certifying Zero-Knowledge Circuits with Refinement Types - S&P
Ligetron: Lightweight Scalable End-to-End Zero-Knowledge Proofs Post-Quantum ZK-SNARKs on a Browser - S&P
zkPi: Proving Lean Theorems in Zero-Knowledge - CCS
Multi-Verifier Zero-Knowledge Proofs for Any Constant Fraction of Corrupted Verifiers - CCS
zkLogin: Privacy-Preserving Blockchain Authentication with Existing Credentials - CCS
Practical Security Analysis of Zero-Knowledge Proof Circuits - USENIX
From Interaction to Independence: zkSNARKs for Transparent and Non-Interactive Remote Attestation - NDSS
Ligerolight: Optimized IOP-Based Zero-Knowledge Argument for Blockchain Scalability - TDSC
[Other]
Optimal Flexible Consensus and its Application to Ethereum - S&P
Nakamoto Consensus under Bounded Processing Capacity - CCS
Data Independent Order Policy Enforcement: Limitations and Solutions - CCS
Rolling in the Shadows: Analyzing the Extraction of MEV Across Layer-2 Rollups - CCS
Sprints: Intermittent Blockchain PoW Mining - USENIX
Security-Performance Tradeoff in DAG-based Proof-of-Work Blockchain Protocols - NDSS
Secure Multiparty Computation of Threshold Signatures Made More Efficient - NDSS
Separation is Good: A Faster Order-Fairness Byzantine Consensus - NDSS
chainBoost: A Secure Performance Booster for Blockchain-based Resource Markets - EuroS&P
BlockDFL: A Blockchain-based Fully Decentralized Peer-to-Peer Federated Learning Framework - WWW
Investigations of Top-Level Domain Name Collisions in Blockchain Naming Services - WWW
Unveiling the Paradox of NFT Prosperity - WWW
SodsBC: A Post-Quantum by Design Asynchronous Blockchain Framework - TDSC
DePTVM: Decentralized Pseudonym and Trust Value Management for Integrated Networks - TDSC
HCA: Hashchain-Based Consensus Acceleration Via Re-Voting - TDSC
Outsourced Privately Verifiable Proofs of Retrievability via Blockchain - TDSC
Dynamic Range Query Privacy-Preserving Scheme for Blockchain-Enhanced Smart Grid Based on Lattice - TDSC
Smart Contract Assisted Privacy-Preserving Data Aggregation and Management Scheme for Smart Grid - TDSC
D-LNBot: A Scalable, Cost-Free and Covert Hybrid Botnet on Bitcoinβs Lightning Network - TDSC
Fast-HotStuff: A Fast and Robust BFT Protocol for Blockchains - TDSC
Obfuscating Verifiable Random Functions for Proof-of-Stake Blockchains - TDSC
CrowdFAB: Intelligent Crowd-Forecasting Using Blockchains and its Use in Security - TDSC
NANO: Cryptographic Enforcement of Readability and Editability Governance in Blockchain Databases - TDSC
Blockchain-Based Shared Data Integrity Auditing and Deduplication - TDSC
Blockchain-Based Compact Verifiable Data Streaming With Self-Auditing - TDSC
DSChain: A Blockchain System for Complete Lifecycle Security of Data in Internet of Things - TDSC
A Blockchain-Based Secure Covert Communication Method via Shamir Threshold and STC Mapping - TDSC
A Blockchain-Based Privacy-Preserving Scheme for Sealed-Bid Auction - TDSC
Blockchain Based Auditable Access Control for Business Processes With Event Driven Policies - TDSC
MC-DSC: A Dynamic Secure Resource Configuration Scheme Based on Medical Consortium Blockchain - TIFS
Blockchain-Based Secure Cross-Domain Data Sharing for Edge-Assisted Industrial Internet of Things - TIFS
Libras: A Fair, Secure, Verifiable, and Scalable Outsourcing Computation Scheme Based on Blockchain - TIFS
Fair and Privacy-Preserved Data Trading Protocol by Exploiting Blockchain - TIFS
Blockchain-Based Group Key Management Scheme for IoT With Anonymity of Group Members - TIFS
BASUV: A Blockchain-Enabled UAV Authentication Scheme for Internet of Vehicles - TIFS
2023
π₯ 46 Papers Accepted by Top 4 Conferences (S&P, CCS, USENIX, NDSS) π₯
34 Papers Accepted by TDSC + 22 Papers Accepted by TIPS
[Interoperability]
ππ LedgerLocks: A Security Framework for Blockchain Protocols Based on Adaptor Signatures - CCS
πππ TrustBoost: Boosting Trust among Interoperable Blockchains - CCS
πππ Interchain Timestamping for Mesh Security - CSS
πππ He-HTLC: Revisiting Incentives in HTLC - NDSS
ππ Cross-Chain Virtual Payment Channels - TIFS
[Privacy]
Cybercrime Bitcoin Revenue Estimations: Quantifying the Impact of Methodology and Coverage - CCS
Act Natural: Exchanging Private Messages on Public Blockchains - EuroS&P
Revelio: A Network-Level Privacy Attack in the Lightning Network - EuroS&P
ππ Know Your Transactions: Real-time and Generic Transaction Semantic Representation on Blockchain & Web3 Ecosystem - WWW
πππ On How Zero-Knowledge Proof Blockchain Mixers Improve, and Worsen User Privacy - WWW
πππ UCoin: An Efficient Privacy Preserving Scheme for Cryptocurrencies - TDSC
HyperMaze: Towards Privacy-Preserving and Scalable Permissioned Blockchain - TDSC
πππ Enabling Regulatory Compliance and Enforcement in Decentralized Anonymous Payment - TDSC
ππ SofitMix: A Secure Offchain-Supported Bitcoin-Compatible Mixing Protocol - TDSC
ACA: Anonymous, Confidential and Auditable Transaction Systems for Blockchain - TDSC
πππ Improving Cryptocurrency Crime Detection: CoinJoin Community Detection Approach - TDSC
Accountable and Fine-Grained Controllable Rewriting in Blockchains - TIFS
Wolverine: A Scalable and Transaction-Consistent Redactable Permissionless Blockchain - TIFS
πππ TRacer: Scalable Graph-Based Transaction Tracing for Account-Based Blockchain Trading Systems - TIFS
ππ MAGO: Maliciously Secure Subgraph Counting on Decentralized Social Graphs - TIFS
Verifiable and Redactable Blockchains With Fully Editing Operations - TIFS
ππ TRCT: A Traceable Anonymous Transaction Protocol for Blockchain - TIFS
πππ Breaking the Anonymity of Ethereum Mixing Services Using Graph Feature Learning - TIFS
πππ Toward Understanding Asset Flows in Crypto Money Laundering Through the Lenses of Ethereum Heists - TIFS
[Scalability]
BlindHub: Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts - S&P
π POSE: Practical Off-chain Smart Contract Execution - NDSS
Breaking and Fixing Virtual Channels: Domino Attack and Donner - NDSS
Boros: Secure and Efficient Off-Blockchain Transactions via Payment Channel Hub - TDSC
CryptoMaze: Privacy-Preserving Splitting of Off-Chain Payments - TDSC
A Flexible Sharding Blockchain Protocol Based on Cross-Shard Byzantine Fault Tolerance - TIFS
[Security]
WeRLman: To Tackle Whale (Transactions), Go Deep (RL) - S&P
Three Birds with One Stone: Efficient Partitioning Attacks on Interdependent Cryptocurrency Networks - S&P
Bitcoin-Enhanced Proof-of-Stake Security: Possibilities and Impossibilities - S&P
πππ SoK: Decentralized Finance (DeFi) Attacks - S&P
Optimistic Fast Confirmation While Tolerating Malicious Majority in Blockchains - S&P
Clockwork Finance: Automated Analysis of Economic Security in Smart Contracts - S&P
Tyr: Finding Consensus Failure Bugs in Blockchain System with Behaviour Divergent Model - S&P
Leaking Arbitrarily Many Secrets: Any-out-of-Many Proofs and Applications to RingCT Protocols - S&P
Uncle Maker: (Time)Stamping Out The Competition in Ethereum - CCS
Fuzz on the Beach: Fuzzing Solana Smart Contracts - CCS
How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting Governance - CCS
FlexiRand: Output Private (Distributed) VRFs and Application to Blockchains - CCS
Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab)use in the Wild - CCS
ππ TxPhishScope: Towards Detecting and Understanding Transaction-based Phishing on Ethereum - CCS
Lanturn: Measuring Economic Security of Smart Contracts Through Adaptive Learning - CCS
Phoenix: Detect and Locate Resilience Issues in Blockchain via Context-Sensitive Chaos - CCS
Analyzing the Real-World Security of the Algorand Blockchain - CCS
Panda: Security Analysis of Algorand Smart Contracts - USENIX
ππ The Blockchain Imitation Game - USENIX
Smarter Contracts: Detecting Vulnerabilities in Smart Contracts with Deep Transfer Learning - NDSS
BlockScope: Detecting and Investigating Propagated Vulnerabilities in Forked Blockchain Projects - NDSS
LOKI: State-Aware Fuzzing Framework for the Implementation of Blockchain Consensus Protocols - NDSS
Double and Nothing: Understanding and Detecting Cryptocurrency Giveaway Scams - NDSS
Partitioning Ethereum without Eclipsing It - NDSS
EFβ―CF: High Performance Smart Contract Fuzzing for Exploit Generation - EuroS&P
Understanding the Security Risks of Decentralized Exchanges by Uncovering Unfair Trades in the Wild - EuroS&P
AChecker: Statically Detecting Smart Contract Access Control Vulnerabilities - ICSE
BSHUNTER: Detecting and Tracing Defects of Bitcoin Scripts - ICSE
Demystifying Exploitable Bugs in Smart Contracts - ICSE
Turn the Rudder: A Beacon of Reentrancy Detection for Smart Contracts on Ethereum - ICSE
Do NFTsβ Owners Really Possess their Assets? A First Look at the NFT-to-Asset Connection Fragility - WWW
ππ BERT4ETH: A Pre-trained Transformer for Ethereum Fraud Detection - WWW
Cross-Modality Mutual Learning for Enhancing Smart Contract Vulnerability Detection on Bytecode - WWW
Bad Apples: Understanding the Centralized Security Risks in Decentralized Ecosystems - WWW
ExGen: Cross-platform, Automated Exploit Generation for Smart Contract Vulnerabilities - TDSC
Lightweight and Identifier-Oblivious Engine for Cryptocurrency Networking Anomaly Detection - TDSC
Crystal: Enhancing Blockchain Mining Transparency With Quorum Certificate - TDSC
TxT: Real-Time Transaction Encapsulation for Ethereum Smart Contracts - TIFS
Rethinking Smart Contract Fuzzing: Fuzzing With Invocation Ordering and Important Branch Revisiting - TIFS
Blockchain Mining With Multiple Selfish Miners - TIFS
[Zero-Knowledge Proof]
zk-creds: Flexible Anonymous Credentials from zkSNARKs and Existing Identity Infrastructure - S&P
Ou: Automating the Parallelization of Zero-Knowledge Protocols - CCS
Recursion over Public-Coin Interactive Proof Systems; Faster Hash Verification - CCS
zk-AuthFeed: Protecting Data Feed to Smart Contracts With Authenticated Zero Knowledge Proof - TDSC
SymmeProof: Compact Zero-Knowledge Argument for Blockchain Confidential Transactions - TDSC
Circom: A Circuit Description Language for Building Zero-Knowledge Applications - TDSC
A New Zero Knowledge Argument for General Circuits and Its Application - TIFS
[Other]
Themis: Fast, Strong Order-Fairness in Byzantine Consensus - CCS
Fait Accompli Committee Selection: Improving the Size-Security Tradeoff of Stake-Based Committees - CCS
Abraxas: Throughput-Efficient Hybrid Asynchronous Consensus - CCS
ParBFT: Faster Asynchronous BFT Consensus with a Parallel Optimistic Path - CCS
Towards Practical Sleepy BFT - CCS
Demystifying DeFi MEV Activities in Flashbots Bundle - CCS
CryptoConcurrency: (Almost) Consensusless Asset Transfer with Shared Accounts - CCS
A Large Scale Study of the Ethereum Arbitrage Ecosystem - USENIX
ACon^2: Adaptive Conformal Consensus for Provable Blockchain Oracles - USENIX
Smartmark: Software Watermarking Scheme for Smart Contracts - ICSE
Is IPFS Ready for Decentralized Video Streaming? - WWW
PipeEdge: A Trusted Pipelining Collaborative Edge Training based on Blockchain - WWW
Eunomia: Anonymous and Secure Vehicular Digital Forensics Based on Blockchain - TDSC
Towards Practical Auditing of Dynamic Data in Decentralized Storage - TDSC
HIBEChain: A Hierarchical Identity-Based Blockchain System for Large-Scale IoT - TDSC
EBCPA: Efficient Blockchain-Based Conditional Privacy-Preserving Authentication for VANETs - TDSC
Towards Public Verifiable and Forward-Privacy Encrypted Search by Using Blockchain - TDSC
Blockchain-Based Transparency Framework for Privacy Preserving Third-Party Services - TDSC
Nereus: Anonymous and Secure Ride-Hailing Service Based on Private Smart Contracts - TDSC
Astraea: Anonymous and Secure Auditing Based on Private Smart Contracts for Donation Systems - TDSC
On Nxt Proof of Stake Algorithm: A Simulation Study - TDSC
Go-Sharing: A Blockchain-Based Privacy-Preserving Framework for Cross-Social Network Photo Sharing - TDSC
Fair Cloud Auditing Based on Blockchain for Resource-Constrained IoT Devices - TDSC
Black Swan in Blockchain: Micro Analysis of Natural Forking - TDSC
iQuery: A Trustworthy and Scalable Blockchain Analytics Platform - TDSC
Privacy-Preserving Decision-Making Over Blockchain - TDSC
Blockchain-Based Deduplication and Integrity Auditing Over Encrypted Cloud Storage - TDSC
Efficient Multi-Party EdDSA Signature With Identifiable Aborts and its Applications to Blockchain - TIFS
SINT: Toward a Blockchain-Based Secure In-Band Network Telemetry Architecture - TIFS
Distributed Detection Over Blockchain-Aided Internet of Things in the Presence of Attacks - TIFS
sChain: An Efficient and Secure Solution for Improving Blockchain Storage - TIFS
Height and Punishment: Toward Accountable IoT Blockchain With Network Sanitization - TIFS
DAON: A Decentralized Autonomous Oracle Network to Provide Secure Data for Smart Contracts - TIFS
2022
[Interoperability]
zkBridge: Trustless Cross-chain Bridges Made Practical - CCS
Universal Atomic Swaps: Secure Exchange of Coins Across All Blockchains - S&P
[Privacy]
How to Peel a Million: Validating and Expanding Bitcoin Clusters - USENIX
Twilight: A Differentially Private Payment Channel Network - USENIX
SoK: Privacy-Preserving Computing in the Blockchain Era - EuroS&P
Resurrecting Address Clustering in Bitcoin - FC
[Scalability]
Sleepy Channels: Bi-directional Payment Channels without Watchtowers - CCS
Thora: Atomic and Privacy-Preserving Multi-Channel Updates - CCS
BrokerChain: A Cross-Shard Blockchain Protocol for Account/Balance-based State Sharding - INFOCOM
S-Store:: A Scalable Data Store towards Permissioned Blockchain Sharding - INFOCOM
HIDE & SEEK: Privacy-Preserving Rebalancing on Payment Channel Networks - FC
[Security]
Empirical Analysis of EIP-1559: Transaction Fees, Waiting Times, and Consensus Security - CCS
Quantifying Blockchain Extractable Value: How Dark is the Forest? - S&P
An Empirical Study of Blockchain System Vulnerabilities: Modules, Types, and Patterns - ESEC/FSE
2021
[Interoperability]
MAD-HTLC: Because HTLC is Crazy-Cheap to Attack - S&P
Burn-to-Claim: An Asset Transfer Protocol for Blockchain Interoperability - CN
Hedging Against Sore Loser Attacks in Cross-Chain Transactions - PODC
Tracking Counterfeit Cryptocurrency End-to-End - SIGMETRICS
Vassago: Efficient and Authenticated Provenance Query on Multiple Blockchains - SRDC
SoK: Communication Across Distributed Ledgers - FC
Timelocked Bribing - FC
A Survey on Blockchain Interoperability: Past, Present, and Future Trends - CSUR
[Privacy]
DIV: Resolving the Dynamic Issues of Zero-knowledge Set Membership Proof in the Blockchain - SIGMOD
Analysis of Cryptocurrency Transactions from a Network Perspective: An Overview - JNCA
Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask) - FC
An Empirical Analysis of Privacy in the Lightning Network - FC
The Complex Shape of Anonymity in Cryptocurrencies: Case Studies from a Systematic Approach - FC
[Scalability]
A2L: Anonymous Atomic Locks for Scalability in Payment Channel Hubs - S&P
Practical Smart Contract Sharding with Ownership and Commutativity Analysis - PLDI
SharPer: Sharding Permissioned Blockchains Over Network Clusters - SIGMOD
Payment Trees: Low Collateral Payments for Payment Channel Networks - FC
[Security]
Why Do My Blockchain Transactions Fail?: A Study of Hyperledger Fabric - SIGMOD
Congestion Attacks in Payment Channel Networks - FC
2020
[Interoperability]
Privacy-Preserving Cross-Chain Atomic Swaps - FC
[Privacy]
Remote Side-Channel Attacks on Anonymous Transactions - USENIX
Address Clustering Heuristics for Ethereum - FC
[Scalability]
Snappy: Fast On-chain Payments with Practical Collaterals - NDSS
Online Payments by Merely Broadcasting Messages - DSN
SoK: Layer-Two Blockchain Protocols - FC
[Security]
Accountability in a Permissioned Blockchain: Formal Analysis of Hyperledger Fabric - EuroS&P
Replay Attacks and Defenses Against Cross-shard Consensus in Sharded Distributed Ledgers - EuroS&P
Characterizing Code Clones in the Ethereum Smart Contract Ecosystem - FC
LockDown: Balance Availability Attack against Lightning Network Channels - FC
2019
[Interoperability]
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains - CCS
Proof-of-Stake Sidechains - S&P
XCLAIM: Trustless, Interoperable, Cryptocurrency-Backed Assets - S&P
Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability - NDSS
Proof-of-Work Sidechains - FC Workshop
[Privacy]
Tracing Transactions Across Cryptocurrency Ledgers - USENIX
Deanonymization and Linkability of Cryptocurrency Transactions Based on Network Analysis - EuroS&P
New Empirical Traceability Analysis of CryptoNote-Style Blockchains - FC
[Scalability]
Atomic Multi-Channel Updates with Constant Collateral in Bitcoin-Compatible Payment-Channel Networks - CCS
Perun: Virtual Payment Hubs over Cryptocurrencies - S&P
Teechain: A Secure Payment Network with Asynchronous Blockchain Access - SOSP
Towards Scaling Blockchain Systems via Sharding - SIGMOD
Trusted Computing Meets Blockchain: Rollback Attacks and a Solution for Hyperledger Fabric - SRDS
OptChain: Optimal Transactions Placement for Scalable Blockchain Sharding - ICDCS
Sprites and State Channels: Payment Networks that Go Faster than Lightning - FC
[Security]
Temporary Censorship Attacks in the Presence of Rational Miners - EuroS&P Workshop