Published Mar 01, 2020
Conference
- USENIX Security(Usenix Security Symposium) <= 2020 Summer
- S&P(IEEE Security and Privacy) <= 2020
- CCS(ACM Conference on Computer and Communications Security) <= 2019
- NDSS(Network and Distributed System Security) <= 2019
- CRYPTO(International Cryptology Conference) <= 2019
- EUROCRYPT(European Cryptology Conference) <= 2019
- INFOCOM(IEEE International Conference on Computer Communications) <= 2019
- SOSP(ACM Symposium on Operating Systems Principles) <= 2019
- NSDI(USENIX Symposium on Networked Systems Design and Implementation) <= 2019
- VLDB(International Conference on Very Large Data Bases) <= 2019
- OSDI(USENIX Symposium on Operating Systems Design and Implementations) <= 2019 Journal
- TOCS(ACM Transactions on Computer Systems) <= 2019
- TOPLAS(ACM Transactions on Programming Languages & Systems) <= 2019
- JACM(Journal of the ACM) <= 2019
- Journal of Cryptology <= 2019
- TDSC(IEEE Transactions on Dependable and Secure Computing) <= 2019
Conference
- ASIACRYPT(International Conference on the Theory and Application of Cryptology and Information Security) <= 2019
- ESORICS(European Symposium on Research in Computer Security) <= 2019
- EuroSys(European Conference on Computer Systems) <= 2019
- ICDCS(IEEE International Conference on Distributed Computing Systems) <= 2019
- PODC(ACM Symposium on Principles of Distributed Computing) <= 2019
- CoNEXT(ACM Conference on Emerging Networking EXperiments and Technologies) <= 2019
Conference
- Article Types:
SoK
(Systematization of Knowledge),Survey
,Review
,Empirical Study
,Short Paper
,Workshop
🎓 FastKitten: Practical Smart Contracts on Bitcoin. Poulami Das, Lisa Eckey, Tommaso Frassetto, David Gens, Kristina Hostáková, Patrick Jauernig, Sebastian Faust, and Ahmad-Reza Sadeghi. USENIX Security’19.
🎓 teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts. Johannes K, Christian R. USENIX Security’18.
🎓 Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts. Lorenz B, Philip D, Florian T, Ari J. USENIX Security’18.
🎓 Arbitrum: Scalable, private smart contracts. Harry K, Steven G, Xiaoqi C, S. Matthew W, Edward W. F. USENIX Security’18.
🎓 Erays: Reverse Engineering Ethereum’s Opaque Smart Contracts. Yi Z, Deepak K, Surya B, Joshua M, Andrew M, Michael B. USENIX Security’18.
Formal Methods
Formal Methods
🎓 Learning to Fuzz from Symbolic Execution with Application to Smart Contracts. Jingxuan He, Mislav Balunovic, Nodar Ambroladze, Petar Tsankov, Martin Vechev. CCS’19.
🎓 Making Smart Contracts Smarter. Luu L, Chu DH, Olickel H, Saxena P, Hobor A. CCS’16.
🎓 Town crier: An authenticated data feed for smart contracts. Zhang F, Cecchetti E, Croman K, Juels A, Shi E. CCS’16.
🎓 The Ring of Gyges: Investigating the Future of Criminal Smart Contracts. Juels A, Kosba A, Shi E. CCS’16.
🎓 Seth: Protecting Existing Smart Contracts Against Re-Entrancy Attacks. Michael Rodler, Wenting Li and Ghassan Karame, Lucas Davi. NDSS’19.
🎓 YODA: Enabling computationally intensive contracts on blockchains with Byzantine and Selfish nodes. Sourav Das, Vinay Joseph Ribeiro, and Abhijeet Anand. NDSS’19.
🎓 “Zeus”: Analyzing Safety of Smart Contracts. Kalra S, Goel S, Dhawan M, Sharma S. NDSS’18.
Economic
,Application
,Privacy
, Smart Contract
Privacy
, Smart Contract
🎓 A Smart Contract for Boardroom Voting with Maximum Voter Privacy. McCorry P, Shahandashti SF, Hao F. FC’17.
🎓 Constant-deposit multiparty lotteries on Bitcoin. Bartoletti M, Zunino R. FC’17.
🎓 EthIKS: Using Ethereum to audit a CONIKS key transparency log. Bonneau J. FC’16.
🎓 Automated Verification of Electrum Wallet. Turuani M, Voegtlin T, Rusinowitch M. FC’16.
Thanks a lot to the awesome and comprehensive work done by PlyTool and decypto-org/blockchain. This page is a branch of the two projects but focus only on smart contracts. Hopefully, it will further benefit the researchers digging in the smart contract field.
This list is released into the public domain.