Toward a participatory digital ethnography of blockchain governance
Blockchain governance occurs through a combination of social and technical activities,
involving smart contracts, deliberation within a group, and voting. These processes are …
involving smart contracts, deliberation within a group, and voting. These processes are …
Formal analysis of composable DeFi protocols
Decentralized finance (DeFi) has become one of the most successful applications of
blockchain and smart contracts. The DeFi ecosystem enables a wide range of crypto …
blockchain and smart contracts. The DeFi ecosystem enables a wide range of crypto …
Dilemmas in recovery-oriented practice to support people with co-occurring mental health and substance use disorders: a qualitative study of staff experiences in …
Background Recovery-oriented practice is recommended in services for people with co-
occurring mental health and substance use disorders. Understanding practitioners' …
occurring mental health and substance use disorders. Understanding practitioners' …
Your exploit is mine: instantly synthesizing counterattack smart contract
Smart contracts are susceptible to exploitation due to their unique nature. Despite efforts to
identify vulnerabilities using fuzzing, symbolic execution, formal verification, and manual …
identify vulnerabilities using fuzzing, symbolic execution, formal verification, and manual …
[HTML][HTML] Of degens and defrauders: Using open-source investigative tools to investigate decentralized finance frauds and money laundering
A Trozze, T Davies, B Kleinberg - Forensic Science International: Digital …, 2023 - Elsevier
Fraud across the decentralized finance (DeFi) ecosystem is growing, with victims losing
billions to DeFi scams every year. However, there is a disconnect between the reported …
billions to DeFi scams every year. However, there is a disconnect between the reported …
Offline scaling of IoT devices in IOTA blockchain
A Rawat, V Daza, M Signorini - Sensors, 2022 - mdpi.com
An increased pattern of hidden Internet of Things (IoT) devices has been observed. Due to
the increased number of security attacks, a large number of IoT devices are disappearing …
the increased number of security attacks, a large number of IoT devices are disappearing …
Balance: Dynamic adjustment of cryptocurrency deposits
Financial deposits are fundamental to the security of cryptoeconomic protocols as they serve
as insurance against potential misbehaviour of agents. However, protocol designers and …
as insurance against potential misbehaviour of agents. However, protocol designers and …
Estimating (miner) extractable value is hard, let's go shop**!
A Judmayer, N Stifter, P Schindler, E Weippl - International Conference on …, 2022 - Springer
The term miner extractable value (MEV) has been coined to describe the value which can be
extracted by a miner, eg, from manipulating the order of transactions within a given …
extracted by a miner, eg, from manipulating the order of transactions within a given …
Blockchain-based address alias system
In recent years, blockchains systems have seen massive adoption in retail and enterprise
environments. Cryptocurrencies become more widely adopted, and many online businesses …
environments. Cryptocurrencies become more widely adopted, and many online businesses …
Explainable AI via learning to optimize
Indecipherable black boxes are common in machine learning (ML), but applications
increasingly require explainable artificial intelligence (XAI). The core of XAI is to establish …
increasingly require explainable artificial intelligence (XAI). The core of XAI is to establish …