Paper Recommendation
I am interested in data analysis on the Blockchain. Here list some related papers I recommend.
Data mining and Analysis
- Chen W, Wu J, Zheng Z, et al. Market manipulation of bitcoin: evidence from mining the Mt. Gox transaction network, IEEE INFOCOM 2019-IEEE Conference on Computer Communications(INFOCOM). IEEE, 2019: 964-972. (paper)
- Lee S, Yoon C, Kang H, et al. Cybercriminal minds: an investigative study of cryptocurrency abuses in the dark web, Network and Distributed System Security Symposium. Internet Society(NDSS), 2019: 1-15. (paper)
- Yousaf H, Kappos G, Meiklejohn S. Tracing transactions across cryptocurrency ledgers, 28th USENIX Security Symposium (USENIX). 2019: 837-850. (paper)
- Wang S, Wang C, Hu Q. Corking by Forking: Vulnerability Analysis of Blockchain, IEEE INFOCOM 2019-IEEE Conference on Computer Communications(INFOCOM). IEEE, 2019: 829-837. (paper)
- Chen T, Zhu Y, Li Z, et al. Understanding ethereum via graph analysis[C]//IEEE INFOCOM 2018-IEEE conference on computer communications. IEEE, 2018: 1484-1492. (paper)
- Chen W, Zheng Z, Cui J, et al. Detecting ponzi schemes on ethereum: Towards healthier blockchain technology, Proceedings of the 2018 World Wide Web Conference(WWW). 2018: 1409-1418. (paper)
- Portnoff R S, Huang D Y, Doerfler P, et al. Backpage and bitcoin: Uncovering human traffickers, Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining(KDD). 2017: 1595-1604. (paper)
Attack
- Tran M, Choi I, Moon G J, et al. A stealthier partitioning attack against bitcoin peer-to-peer network[C]//IEEE Symposium on Security and Privacy (S&P). 2020. (paper)
- Apostolaki M, Zohar A, Vanbever L. Hijacking bitcoin: Routing attacks on cryptocurrencies, 2017 IEEE Symposium on Security and Privacy (SP). IEEE, 2017: 375-392. (paper)
- Heilman E, Kendler A, Zohar A, et al. Eclipse attacks on bitcoin’s peer-to-peer network, 24th USENIX Security Symposium (USENIX). 2015: 129-144. (paper)
Smart contract
- Krupp J, Rossow C. teether: Gnawing at ethereum to automatically exploit smart contracts, 27th USENIX Security Symposium (USENIX). 2018: 1317-1333. (paper)
- Tsankov P, Dan A, Drachsler-Cohen D, et al. Securify: Practical security analysis of smart contracts, Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security(CCS). 2018: 67-82. (paper)
Consensus mechanism
- Badertscher C, Gaži P, Kiayias A, et al. Ouroboros genesis: Composable proof-of-stake blockchains with dynamic availability, Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security(CCS). 2018: 913-930. (paper)
- Gervais A, Karame G O, Wüst K, et al. On the security and performance of proof of work blockchains, Proceedings of the 2016 ACM SIGSAC conference on computer and communications security(CCS). 2016: 3-16. (paper)