Blockchain censorship

A Wahrstätter, J Ernstberger, A Yaish, L Zhou… - Proceedings of the …, 2024‏ - dl.acm.org
Permissionless blockchains promise resilience against censorship by a single entity. This
suggests that deterministic rules, not third-party actors, decide whether a transaction is …

Nurgle: Exacerbating resource consumption in blockchain state storage via mpt manipulation

Z He, Z Li, A Qiao, X Luo, X Zhang… - … IEEE Symposium on …, 2024‏ - ieeexplore.ieee.org
Blockchains, with intricate architectures, encompass various components, eg, consensus
network, smart contracts, decentralized applications, and auxiliary services. While offering …

Suboptimality in defi

A Yaish, M Dotan, K Qin, A Zohar… - Cryptology ePrint …, 2023‏ - eprint.iacr.org
The decentralized finance (DeFi) ecosystem has proven to be popular in facilitating financial
operations, such as token exchange and lending. The public availability of DeFi platforms' …

TierDrop: Harnessing Airdrop Farmers for User Growth

A Yaish, B Livshits - arxiv preprint arxiv:2407.01176, 2024‏ - arxiv.org
Blockchain platforms attempt to expand their user base by awarding tokens to users, a
practice known as issuing airdrops. Empirical data and related work implies that previous …

BRC20 Pinning Attack

M Qi, Q Wang, Z Wang, L Zhong, T Zhu, S Chen… - arxiv preprint arxiv …, 2024‏ - arxiv.org
BRC20 tokens are a type of non-fungible asset on the Bitcoin network. They allow users to
embed customized content within Bitcoin satoshis. The related token frenzy has reached a …

How much should you pay for restaking security?

T Chitra, M Pai - arxiv preprint arxiv:2408.00928, 2024‏ - arxiv.org
Restaking protocols have aggregated billions of dollars of security by utilizing token
incentives and payments. A natural question to ask is: How much security do restaked …

Blockchain Amplification Attack

T Tsuchiya, L Zhou, K Qin, A Gervais… - arxiv preprint arxiv …, 2024‏ - arxiv.org
Strategies related to the blockchain concept of Extractable Value (MEV/BEV), such as
arbitrage, front-or backrunning create an economic incentive for network nodes to reduce …

Understanding Ethereum Mempool Security under Asymmetric {DoS} by Symbolized Stateful Fuzzing

Y Wang, Y Tang, K Li, W Ding, Z Yang - 33rd USENIX Security …, 2024‏ - usenix.org
In blockchains, mempool controls transaction flow before consensus, denial of whose
service hurts the health and security of blockchain networks. This paper presents MPFUZZ …

Unmasking role-play attack strategies in exploiting decentralized finance (defi) systems

W Li, Z Wang, C Li, H Chen, T Wong, P Sun… - Proceedings of the …, 2023‏ - dl.acm.org
The rapid growth and adoption of decentralized finance (DeFi) systems have been
accompanied by various threats, notably those emerging from vulnerabilities in their intricate …

BRAIN: Blockchain-based Inference and Training Platform for Large-Scale Models

S Park, J Lee, SM Moon - IEEE Access, 2024‏ - ieeexplore.ieee.org
As artificial intelligence (AI) is innovating various industries, there are concerns about the
trust and transparency of AI-driven inference and training results. To tackle these issues …