Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Blockchain censorship
A Wahrstätter, J Ernstberger, A Yaish, L Zhou… - Proceedings of the …, 2024 - dl.acm.org
Permissionless blockchains promise resilience against censorship by a single entity. This
suggests that deterministic rules, not third-party actors, decide whether a transaction is …
suggests that deterministic rules, not third-party actors, decide whether a transaction is …
Nurgle: Exacerbating resource consumption in blockchain state storage via mpt manipulation
Blockchains, with intricate architectures, encompass various components, eg, consensus
network, smart contracts, decentralized applications, and auxiliary services. While offering …
network, smart contracts, decentralized applications, and auxiliary services. While offering …
Suboptimality in defi
The decentralized finance (DeFi) ecosystem has proven to be popular in facilitating financial
operations, such as token exchange and lending. The public availability of DeFi platforms' …
operations, such as token exchange and lending. The public availability of DeFi platforms' …
TierDrop: Harnessing Airdrop Farmers for User Growth
A Yaish, B Livshits - arxiv preprint arxiv:2407.01176, 2024 - arxiv.org
Blockchain platforms attempt to expand their user base by awarding tokens to users, a
practice known as issuing airdrops. Empirical data and related work implies that previous …
practice known as issuing airdrops. Empirical data and related work implies that previous …
BRC20 Pinning Attack
BRC20 tokens are a type of non-fungible asset on the Bitcoin network. They allow users to
embed customized content within Bitcoin satoshis. The related token frenzy has reached a …
embed customized content within Bitcoin satoshis. The related token frenzy has reached a …
How much should you pay for restaking security?
Restaking protocols have aggregated billions of dollars of security by utilizing token
incentives and payments. A natural question to ask is: How much security do restaked …
incentives and payments. A natural question to ask is: How much security do restaked …
Blockchain Amplification Attack
T Tsuchiya, L Zhou, K Qin, A Gervais… - arxiv preprint arxiv …, 2024 - arxiv.org
Strategies related to the blockchain concept of Extractable Value (MEV/BEV), such as
arbitrage, front-or backrunning create an economic incentive for network nodes to reduce …
arbitrage, front-or backrunning create an economic incentive for network nodes to reduce …
Understanding Ethereum Mempool Security under Asymmetric {DoS} by Symbolized Stateful Fuzzing
In blockchains, mempool controls transaction flow before consensus, denial of whose
service hurts the health and security of blockchain networks. This paper presents MPFUZZ …
service hurts the health and security of blockchain networks. This paper presents MPFUZZ …
Unmasking role-play attack strategies in exploiting decentralized finance (defi) systems
The rapid growth and adoption of decentralized finance (DeFi) systems have been
accompanied by various threats, notably those emerging from vulnerabilities in their intricate …
accompanied by various threats, notably those emerging from vulnerabilities in their intricate …
BRAIN: Blockchain-based Inference and Training Platform for Large-Scale Models
As artificial intelligence (AI) is innovating various industries, there are concerns about the
trust and transparency of AI-driven inference and training results. To tackle these issues …
trust and transparency of AI-driven inference and training results. To tackle these issues …