Search results

  • 2024

    Formalizing Soundness Proofs of Linear PCP SNARKs

    Bailey, B. & Miller, A., 2024, Proceedings of the 33rd USENIX Security Symposium. USENIX Association, p. 1489-1506 18 p. (Proceedings of the 33rd USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Ratel: MPC-extensions for Smart Contracts

    Li, Y., Soska, K., Huang, Z., Bellemare, S., Quintyne-Collins, M., Wang, L., Liu, X., Song, D. & Miller, A., Jul 1 2024, ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, p. 336-352 17 p. (ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • SoK: SGX.Fail: How Stuff Gets eXposed

    Van Schaik, S., Seto, A., Yurek, T., Batori, A., Albassam, B., Genkin, D., Miller, A., Ronen, E., Yarom, Y. & Garman, C., 2024, Proceedings - 45th IEEE Symposium on Security and Privacy, SP 2024. Institute of Electrical and Electronics Engineers Inc., p. 4143-4162 20 p. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Unpacking How Decentralized Autonomous Organizations (DAOs) Work in Practice

    Sharma, T., Potter, Y., Pongmala, K., Wang, H., Miller, A., Song, D. & Wang, Y., 2024, 2024 IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2024. Institute of Electrical and Electronics Engineers Inc., p. 416-424 9 p. (2024 IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2024).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • 2023

    A Mixed-Methods Study of Security Practices of Smart Contract Developers

    Sharma, T., Zhou, Z., Miller, A. & Wang, Y., 2023, 32nd USENIX Security Symposium, USENIX Security 2023. USENIX Association, p. 2545-2562 18 p. (32nd USENIX Security Symposium, USENIX Security 2023; vol. 4).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Long Live The Honey Badger: Robust Asynchronous DPSS and its Applications

    Yurek, T., Xiang, Z., Xia, Y. & Miller, A., 2023, 32nd USENIX Security Symposium, USENIX Security 2023. USENIX Association, p. 5413-5430 18 p. (32nd USENIX Security Symposium, USENIX Security 2023; vol. 8).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Short Paper: Privacy Preserving Decentralized Netting

    Agarwal, A., De Caro, A. & Miller, A., 2023, Financial Cryptography and Data Security. FC 2022 International Workshops - CoDecFin, DeFi, Voting, WTSC, Revised Selected Papers. Matsuo, S., Gudgeon, L., Perez Hernandez, D., Werner, S., Klages-Mundt, A., Haines, T., Essex, A., Bracciali, A. & Sala, M. (eds.). Springer, p. 280-298 19 p. (Lecture Notes in Computer Science; vol. 13412 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • SoK: Data Sovereignty

    Ernstberger, J., Lauinger, J., Elsheimy, F., Zhou, L., Steinhorst, S., Canetti, R., Miller, A., Gervais, A. & Song, D., 2023, Proceedings - 8th IEEE European Symposium on Security and Privacy, Euro S and P 2023. Institute of Electrical and Electronics Engineers Inc., p. 122-143 22 p. (Proceedings - 8th IEEE European Symposium on Security and Privacy, Euro S and P 2023).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2022

    hbACSS: How to Robustly Share Many Secrets

    Yurek, T., Luo, L., Fairoze, J., Kate, A. & Miller, A., 2022, 29th Annual Network and Distributed System Security Symposium, NDSS 2022. The Internet Society, (29th Annual Network and Distributed System Security Symposium, NDSS 2022).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Mitigation of SARS-CoV-2 transmission at a large public university

    Ranoa, D. R. E., Holland, R. L., Alnaji, F. G., Green, K. J., Wang, L., Fredrickson, R. L., Wang, T., Wong, G. N., Uelmen, J., Maslov, S., Weiner, Z. J., Tkachenko, A. V., Zhang, H., Liu, Z., Ibrahim, A., Patel, S. J., Paul, J. M., Vance, N. P., Gulick, J. G. & Satheesan, S. P. & 129 others, Galvan, I. J., Miller, A., Grohens, J., Nelson, T. J., Stevens, M. P., Hennessy, P. M., Parker, R. C., Santos, E., Brackett, C., Steinman, J. D., Fenner, M. R., Dohrer, K., DeLorenzo, M., Wilhelm-Barr, L., Brauer, B. R., Best-Popescu, C., Durack, G., Wetter, N., Kranz, D. M., Breitbarth, J., Simpson, C., Pryde, J. A., Kaler, R. N., Harris, C., Vance, A. C., Silotto, J. L., Johnson, M., Valera, E. A., Anton, P. K., Mwilambwe, L., Bryan, S. P., Stone, D. S., Young, D. B., Ward, W. E., Lantz, J., Vozenilek, J. A., Bashir, R., Moore, J. S., Garg, M., Cooper, J. C., Snyder, G., Lore, M. H., Yocum, D. L., Cohen, N. J., Novakofski, J. E., Loots, M. J., Ballard, R. L., Band, M., Banks, K. M., Barnes, J. D., Bentea, I., Black, J., Busch, J., Conte, A., Conte, M., Curry, M., Eardley, J., Edwards, A., Eggett, T., Fleurimont, J., Foster, D., Fouke, B. W., Gallagher, N., Gastala, N., Genung, S. A., Glueck, D., Gray, B., Greta, A., Healy, R. M., Hetrick, A., Holterman, A. A., Ismail, N., Jasenof, I., Kelly, P., Kielbasa, A., Kiesel, T., Kindle, L. M., Lipking, R. L., Manabe, Y. C., Mayes, J., McGuffin, R., McHenry, K. G., Mirza, A., Moseley, J., Mostafa, H. H., Mumford, M., Munoz, K., Murray, A. D., Nolan, M., Parikh, N. A., Pekosz, A., Pflugmacher, J., Phillips, J. M., Pitts, C., Potter, M. C., Quisenberry, J., Rear, J., Robinson, M. L., Rosillo, E., Rye, L. N., Sherwood, M. E., Simon, A., Singson, J. M., Skadden, C., Skelton, T. H., Smith, C., Stech, M., Thomas, R., Tomaszewski, M. A., Tyburski, E. A., Vanwingerden, S., Vlach, E., Watkins, R. S., Watson, K., White, K. C., Killeen, T. L., Jones, R. J., Cangellaris, A. C., Martinis, S. A., Vaid, A., Brooke, C. B., Walsh, J. T., Elbanna, A., Sullivan, W. C., Smith, R. L., Goldenfeld, N., Fan, T. M., Hergenrother, P. J. & Burke, M. D., Dec 2022, In: Nature communications. 13, 1, 3207.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • Practical Asynchronous Distributed Key Generation

    Das, S., Yurek, T., Xiang, Z., Miller, A., Kokoris-Kogias, L. & Ren, L., 2022, Proceedings - 43rd IEEE Symposium on Security and Privacy, SP 2022. Institute of Electrical and Electronics Engineers Inc., p. 2518-2534 17 p. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2022-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2021

    An Empirical Analysis of Privacy in the Lightning Network

    Kappos, G., Yousaf, H., Piotrowska, A., Kanjalkar, S., Delgado-Segura, S., Miller, A. & Meiklejohn, S., 2021, Financial Cryptography and Data Security - 25th International Conference, FC 2021, Revised Selected Papers. Borisov, N. & Diaz, C. (eds.). Springer, p. 167-186 20 p. (Lecture Notes in Computer Science; vol. 12674 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • CanDID: Can-do decentralized identity with legacy compatibility, sybil-resistance, and accountability

    Maram, D., Malvai, H., Zhang, F., Jean-Louis, N., Frolov, A., Kell, T., Lobban, T., Moy, C., Juels, A. & Miller, A., May 2021, Proceedings - 2021 IEEE Symposium on Security and Privacy, SP 2021. Institute of Electrical and Electronics Engineers Inc., p. 1348-1366 19 p. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2021-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Publicly Auditable MPC-As-A-Service with succinct verification and universal setup

    Kanjalkar, S., Zhang, Y., Gandlur, S. & Miller, A., Sep 2021, Proceedings - 2021 IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2021. Institute of Electrical and Electronics Engineers Inc., p. 386-411 26 p. (Proceedings - 2021 IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Safer Illinois and RokWall: Privacy Preserving University Health Apps for COVID-19

    Mailthody, V. S., Wei, J., Chen, N., Behnia, M., Yao, R., Wang, Q., Agrawal, V., He, C., Wang, L., Chen, L., Agarwal, A., Richter, E., Hwu, W.-M., Fletcher, C., Xiong, J., Miller, A. & Patel, S., Jan 19 2021, (In preparation) arXiv.

    Research output: Working paper

  • 2020

    CUSTOS: Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution

    Paccagnella, R., Datta, P., Ul Hassan, W., Bates, A., Fletcher, C. W., Miller, A. & Tian, D., 2020, 27th Annual Network and Distributed System Security Symposium, NDSS 2020. The Internet Society, (27th Annual Network and Distributed System Security Symposium, NDSS 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Non-interactive Proofs of Proof-of-Work

    Kiayias, A., Miller, A. & Zindros, D., 2020, Financial Cryptography and Data Security - 24th International Conference, FC 2020, Revised Selected Papers. Bonneau, J. & Heninger, N. (eds.). Springer, p. 505-522 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12059 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • The Ekiden Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts

    Zhang, F., He, W., Cheng, R., Kos, J., Hynes, N., Johnson, N., Juels, A., Miller, A. & Song, D., May 1 2020, In: IEEE Security and Privacy. 18, 3, p. 17-27 11 p., 9044356.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • You Sank My Battleship! A Case Study to Evaluate State Channels as a Scaling Solution for Cryptocurrencies

    McCorry, P., Buckland, C., Bakshi, S., Wüst, K. & Miller, A., 2020, Financial Cryptography and Data Security - FC 2019 International Workshops, VOTING and WTSC, Revised Selected Papers. Bracciali, A., Clark, J., Pintore, F., Rønne, P. B. & Sala, M. (eds.). Springer, p. 35-49 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11599 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2019

    Ekiden: A platform for confidentiality-preserving, trustworthy, and performant smart contracts

    Cheng, R., Zhang, F., Kos, J., He, W., Hynes, N., Johnson, N., Juels, A., Miller, A. & Song, D., Jun 2019, Proceedings - 4th IEEE European Symposium on Security and Privacy, EURO S and P 2019. Institute of Electrical and Electronics Engineers Inc., p. 185-200 16 p. 8806762. (Proceedings - 4th IEEE European Symposium on Security and Privacy, EURO S and P 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • HoneyBadgerMPC and AsynchroMix: Practical asynchronous MPC and its application to anonymous communication

    Lu, D., Govind, R., Yurek, T., Kate, A., Kulshreshtha, S. & Miller, A., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 887-903 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • ILC: A calculus for composable, computational cryptography

    Liao, K., Hammer, M. A. & Miller, A., Jun 8 2019, PLDI 2019 - Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation. McKinley, K. S. & Fisher, K. (eds.). Association for Computing Machinery, p. 640-654 15 p. (Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Outguard: Detecting in-browser covert cryptocurrency mining in the wild

    Kharraz, A., Lever, C., Borisov, N., Ma, Z., Mason, J., Antonakakis, M., Murley, P., Miller, A. & Bailey, M., May 13 2019, The Web Conference 2019 - Proceedings of the World Wide Web Conference, WWW 2019. Association for Computing Machinery, p. 840-852 13 p. (The Web Conference 2019 - Proceedings of the World Wide Web Conference, WWW 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Permissioned and permissionless blockchains

    Miller, A., Mar 15 2019, Blockchain for Distributed Systems Security. Wiley, p. 193-203 11 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Pisa: Arbitration outsourcing for state channels

    McCorry, P., Bakshi, S., Bentov, I., Meiklejohn, S. & Miller, A., Oct 21 2019, AFT 2019 - Proceedings of the 1st ACM Conference on Advances in Financial Technologies. Association for Computing Machinery, p. 16-30 15 p. (AFT 2019 - Proceedings of the 1st ACM Conference on Advances in Financial Technologies).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Secure Brokered Delegation Through DelegaTEE

    Schneider, M., Matetic, S., Juels, A., Miller, A. & Capkun, S., Jul 1 2019, In: IEEE Security and Privacy. 17, 4, p. 43-52 10 p., 8706929.

    Research output: Contribution to journalArticlepeer-review

  • Short Paper: I Can’t Believe It’s Not Stake! Resource Exhaustion Attacks on PoS

    Kanjalkar, S., Kuo, J., Li, Y. & Miller, A., 2019, Financial Cryptography and Data Security - 23rd International Conference, FC 2019, Revised Selected Papers. Goldberg, I. & Moore, T. (eds.). Springer, p. 62-69 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11598 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Sprites and State Channels: Payment Networks that Go Faster Than Lightning

    Miller, A., Bentov, I., Bakshi, S., Kumaresan, R. & McCorry, P., 2019, Financial Cryptography and Data Security - 23rd International Conference, FC 2019, Revised Selected Papers. Goldberg, I. & Moore, T. (eds.). Springer, p. 508-526 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11598 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • TxProbe: Discovering Bitcoin’s Network Topology Using Orphan Transactions

    Delgado-Segura, S., Bakshi, S., Pérez-Solà, C., Litton, J., Pachulski, A., Miller, A. & Bhattacharjee, B., 2019, Financial Cryptography and Data Security - 23rd International Conference, FC 2019, Revised Selected Papers. Goldberg, I. & Moore, T. (eds.). Springer, p. 550-566 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11598 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2018

    Authenticated Data Structures for Privacy-Preserving Monero Light Clients

    Lee, K. & Miller, A., Jul 6 2018, Proceedings - 3rd IEEE European Symposium on Security and Privacy Workshops, EURO S and PW 2018. Institute of Electrical and Electronics Engineers Inc., p. 20-28 9 p. (Proceedings - 3rd IEEE European Symposium on Security and Privacy Workshops, EURO S and PW 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Dandelion++: Lightweight Cryptocurrency Networking with Formal Anonymity Guarantees

    Fanti, G., Venkatakrishnan, S. B., Bakshi, S., Denby, B., Bhargava, S., Miller, A. & Viswanath, P., Jun 12 2018, SIGMETRICS 2018 - Abstracts of the 2018 ACM International Conference on Measurement and Modeling of Computer Systems. Association for Computing Machinery, p. 5-7 3 p. (Performance Evaluation Review; vol. 46, no. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • DELEGATEE: Brokered delegation using trusted execution environments

    Matetic, S., Schneider, M., Miller, A., Juels, A. & Capkun, S., 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 1387-1403 17 p. (Proceedings of the 27th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Erays: Reverse engineering Ethereum's opaque smart contracts

    Zhou, Y., Kumar, D., Bakshi, S., Mason, J., Miller, A. & Bailey, M., 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 1371-1385 15 p. (Proceedings of the 27th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Measuring ethereum network peers

    Kim, S. K., Mason, J., Ma, Z., Miller, A., Murali, S. & Bailey, M., Oct 31 2018, IMC 2018 - Proceedings of the Internet Measurement Conference. Association for Computing Machinery, p. 91-104 14 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Smart contracts and opportunities for formal methods

    Miller, A., Cai, Z. & Jha, S., 2018, Leveraging Applications of Formal Methods, Verification and Validation. Industrial Practice - 8th International Symposium, ISoLA 2018, Proceedings. Margaria, T. & Steffen, B. (eds.). Springer, p. 280-299 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11247 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2017

    Atomically trading with roger: Gambling on the success of a hardfork

    McCorry, P., Heilman, E. & Miller, A., 2017, Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Proceedings. Garcia-Alfaro, J., Herrera-Joancomarti, J., Navarro-Arribas, G. & Hartenstein, H. (eds.). Springer, p. 334-353 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10436 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Instantaneous decentralized poker

    Bentov, I., Kumaresan, R. & Miller, A., 2017, Advances in Cryptology – ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Proceedings. Takagi, T. & Peyrin, T. (eds.). Springer, p. 410-440 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10625 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • SmartCast: An incentive compatible consensus protocol using smart contracts

    Kothapalli, A., Miller, A. & Borisov, N., 2017, Financial Cryptography and Data Security - FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Revised Selected Papers. Miller, A., Brenner, M., Rohloff, K., Bonneau, J., Teague, V., Bracciali, A., Sala, M., Pintore, F., Jakobsson, M. & Ryan, P. Y. A. (eds.). Springer, p. 536-552 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10323 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Towards an accountable software-defined networking architecture

    Ujcich, B. E., Miller, A., Bates, A. & Sanders, W. H., Aug 7 2017, 2017 IEEE Conference on Network Softwarization: Softwarization Sustaining a Hyper-Connected World: en Route to 5G, NetSoft 2017. Institute of Electrical and Electronics Engineers Inc., p. 1-5 5 p. (2017 IEEE Conference on Network Softwarization: Softwarization Sustaining a Hyper-Connected World: en Route to 5G, NetSoft 2017; vol. 2017-August).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Zero-collateral lotteries in Bitcoin and Ethereum

    Miller, A. & Bentov, I., Jun 30 2017, Proceedings - 2nd IEEE European Symposium on Security and Privacy Workshops, EuroS and PW 2017. Institute of Electrical and Electronics Engineers Inc., p. 4-13 10 p. 7966964. (Proceedings - 2nd IEEE European Symposium on Security and Privacy Workshops, EuroS and PW 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • 2016

    Cryptocurrencies, blockchains, and smart contracts; Hardware for deep learning

    Bailis, P., Narayanan, A., Miller, A. & Han, S., Nov 1 2016, In: Queue. 14, 6

    Research output: Contribution to journalArticlepeer-review

  • Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts

    Kosba, A., Miller, A., Shi, E., Wen, Z. & Papamanthou, C., Aug 16 2016, p. 839-858. 20 p.

    Research output: Contribution to conferencePaperpeer-review

  • On scaling decentralized blockchains (A position paper)

    Croman, K., Decker, C., Eyal, I., Gencer, A. E., Juels, A., Kosba, A., Miller, A., Saxena, P., Shi, E., Sirer, E. G., Song, D. & Wattenhofer, R., 2016, Financial Cryptography and Data Security - International Workshops, FC 2016, BITCOIN, VOTING, and WAHC, Revised Selected Papers. Rohloff, K., Clark, J., Meiklejohn, S., Wallach, D., Brenner, M. & Ryan, P. Y. A. (eds.). Springer, p. 106-125 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9604 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Step by step towards creating a safe smart contract: Lessons and insights from a cryptocurrency lab

    Delmolino, K., Arnett, M., Kosba, A., Miller, A. & Shi, E., 2016, Financial Cryptography and Data Security - International Workshops, FC 2016, BITCOIN, VOTING, and WAHC, Revised Selected Papers. Rohloff, K., Clark, J., Meiklejohn, S., Wallach, D., Brenner, M. & Ryan, P. Y. A. (eds.). Springer, p. 79-94 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9604 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Stubborn mining: Generalizing selfish mining and combining with an eclipse attack

    Nayak, K., Kumar, S., Miller, A. & Shi, E., May 9 2016, Proceedings - 2016 IEEE European Symposium on Security and Privacy, EURO S and P 2016. Institute of Electrical and Electronics Engineers Inc., p. 305-320 16 p. 7467362. (Proceedings - 2016 IEEE European Symposium on Security and Privacy, EURO S and P 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack

    Nayak, K., Kumar, S., Miller, A. E. & Shi, E., Mar 2016, p. 305-320.

    Research output: Contribution to conferencePaperpeer-review

  • The Honey Badger of BFT Protocols

    Miller, A., Xia, Y., Croman, K., Shi, E. & Song, D., Oct 24 2016, CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, p. 31-42 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2015

    Nonoutsourceable scratch-off puzzles to discourage bitcoin mining coalitions

    Miller, A., Kosba, A., Katz, J. & Shi, E., Oct 12 2015, CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 680-691 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2015-October).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Shadow-bitcoin: scalable simulation via direct execution of multi-threaded applications

    Miller, A. & Jansen, R., 2015.

    Research output: Contribution to conferencePaperpeer-review