Jinghui Liao

A computer security PhD student who prefers blockchain and 6am sunlight and misses his family.

Papers that I read

December 15, 2020

Paper/Document to Read>>

ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts - CCS’2020

Towards Cross-Blockchain Smart Contracts - zk Capital Issue #79

Garou: An Efficient and Secure Off-BlockchainMulti-Party Payment Hub - zk Capital Issue #79

BDoS: Blockchain Denial of Service - CCS 2020

eThor: Practical and Provably Sound Static Analysis of Ethereum Smart Contracts - CCS 2020

Dumbo: Faster Asynchronous BFT Protocols? - CCS 2020

Snappy: Fast On-chain Payments with Practical Collaterals - NDSS 2020

High Throughput Cryptocurrency Routing in Payment Channel Networks - NSDI 2020

Secure Balance Planning of Off-blockchain Payment Channel Networks - INFOCOM 2020

- NSDI 2020

Pixel: Multi-signatures for Consensus- CCS 2020

CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance,and Accountability- S&P 2021

Towards Designing A Secure Plausibly Deniable System for Mobile Devices against Multi-snapshot Adversaries — A Preliminary Design

MobiCeal: Towards Secure and Practical Plausibly Deniable Encryption on Mobile Devices

MobiHydra: Pragmatic and Multi-Level Plausibly Deniable Encryption Storage for Mobile Devices

Flood & Loot: A Systemic Attack On The Lightning Network

A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network S&P20

MicroCash: Practical Concurrent Processing of Micropayments

Fast and secure global payments with Stellar

2020 IEEE Symposium on Security and Privacy (SP)

KShot: Live Kernel Patching with SMM and SGX

Ethereum Smart Contract Security Best Practices

Double-Spend Counterattacks: Threat of Retaliation in Proof-of-Work Systems

Blockchain Technology Overview from National Institute of Standards and Technology Internal Report 8202

Universally Composable Security:A New Paradigm for Cryptographic Protocols 2020 Fab 11

HYPER-CUBE: High-Dimensional Hypervisor Fuzzing

Ekiden: A Platform for Confidentiality-Preserving,Trustworthy, and Performant Smart Contracts

ROTE: Rollback Protection for Trusted Execution

AMD64 Architecture Programmer’s Manual Volume 2: System Programming from AMD

Cosmos Whitepaper

Discharged Payment Channels: Quantifying the Lightning Network’s Resilience to Topology-Based Attacks from 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)

This Week in Blockchain Research Issue #47 from https://zkcapital.substack.com/

Proof of Necessary Work:Succinct State Verification with Fairness Guarantees

Intel SGX Explained

05/27/2020 <> FlyClient: Super-Light Clients for Cryptocurrencies

03/14/2020 <> HydRand: Efficient Continuous Distributed Randomness

03/12/2020 <> KeyStone

03/10/2020 <> Semantic Understanding of Smart Contracts: Executable Operational Semantics of Solidity

03/07/2020 <> 10 State Channel Projects Every Blockchain Developer Should Know About

03/07/2020 <> What Blockchains Could Mean for Government and Transportation Operations from U.S. DOT Volpe Center #MindMap#

03/06/2020 <> Exploiting Unprotected I/O Operations in AMD’s Secure Encrypted Virtualization #MindMap#

02/25/2020 <> HEB: Hybrid Expenditure Blockchain #MindMap#

02/24/2020 <> Ethna: Channel Network with Dynamic Internal Payment Splitting #MindMap#

02/23/2020 <> WebAssembly’s post-MVP future: A cartoon skill tree Artical by Lin Clark, Till Schneidereit, and Luke Wagner

02/23/2020 <> Secure Encrypted Virtualization API Version 0.22 from AMD SEV

02/22/2020 <> Congestion Attacks in Payment Channel Networks #MindMap#

02/21/2020 <> Using TrustZone on Armv8-M from ARM #MindMap#

02/20/2020 <> Broken Metre: Attacking Resource Metering in EVM from NDSS2020 #MindMap#

02/19/2020 <> SEV-ES Guest-Hypervisor Communication Block Standardization

02/18/2020 <> SEV-SNP-strengthening-vm-isolation-with-integrity-protection-and-more #Download# #MindMap#

02/17/2020 <> Canetti, Ran, et al. “Universally composable two-party and multi-party secure computation.” Proceedings of the thiry-fourth annual ACM symposium on Theory of computing. 2002. #MindMap#

02/16/2020 <> Gudgeon, L., Moreno-Sanchez, P., Roos, S., McCorry, P., & Gervais, A. (2019). SoK: Off The Chain Transactions. IACR Cryptology ePrint Archive, 2019, 360. #MindMap#

02/15/2020 <> Zhu, Liehuang, et al. “Research on the security of blockchain data: A survey.” arXiv preprint arXiv:1812.02009 (2018). #MindMap#

Share This Post