Speculative DoS Attacks in Ethereum
Ethereum nodes can be forced to waste computation on
speculatively executed transactions that ultimately revert.
[YQZG] USENIX Sec’24.
Ethereum nodes can be forced to waste computation on
speculatively executed transactions that ultimately revert.
[YQZG] USENIX Sec’24.
An attack exploiting Ethereum’s timestamp manipulation to
systematically orphan competitors’ blocks.
[YSZ] CCS’23.
A mechanism design approach to Bitcoin’s transaction fee
system, proposing alternatives to the first-price auction.
[LSZ] TEAC’22.
A DAG-based generalization of Nakamoto consensus that allows
high throughput without sacrificing security. Deployed in Kaspa.
[SWZ] AFT’21.
A systemic attack on the Lightning Network where an attacker
floods channels then loots them as timeouts expire.
[HZ] AFT’20.
How BGP routing attacks can partition Bitcoin’s network,
delay block propagation, and enable double spending.
[AZV] S&P’17.
Computing the optimal strategy for miners who deviate from
the Bitcoin protocol to increase their revenue.
[SSZ] FC’16.
A modification to Bitcoin’s longest-chain rule that accounts
for off-chain blocks, enabling faster and more secure
confirmation. Adopted by Ethereum.
[SZ] FC’15.
Showing how an attacker can monopolize a node’s connections
to isolate it from the network.
[HKZG] USENIX Sec’15.