Andrew Edmund Miller

If you made any changes in Pure these will be visible here soon.

Research Output

2020

The Ekiden Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts

Zhang, F., He, W., Cheng, R., Kos, J., Hynes, N., johnson, N., Juels, A., Miller, A. & Song, D., Jan 1 2020, (Accepted/In press) In : IEEE Security and Privacy.

Research output: Contribution to journalArticle

You Sank My Battleship! A Case Study to Evaluate State Channels as a Scaling Solution for Cryptocurrencies

McCorry, P., Buckland, C., Bakshi, S., Wüst, K. & Miller, A., Jan 1 2020, Financial Cryptography and Data Security - FC 2019 International Workshops, VOTING and WTSC, Revised Selected Papers. Bracciali, A., Clark, J., Pintore, F., Rønne, P. B. & Sala, M. (eds.). Springer, p. 35-49 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11599 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2019

Ekiden: A platform for confidentiality-preserving, trustworthy, and performant smart contracts

Cheng, R., Zhang, F., Kos, J., He, W., Hynes, N., Johnson, N., Juels, A., Miller, A. & Song, D., Jun 2019, Proceedings - 4th IEEE European Symposium on Security and Privacy, EURO S and P 2019. Institute of Electrical and Electronics Engineers Inc., p. 185-200 16 p. 8806762. (Proceedings - 4th IEEE European Symposium on Security and Privacy, EURO S and P 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

HoneyBadgerMPC and AsynchroMix: Practical asynchronous MPC and its application to anonymous communication

Lu, D., Govind, R., Yurek, T., Kate, A., Kulshreshtha, S. & Miller, A., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 887-903 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access

ILC: A calculus for composable, computational cryptography

Liao, K., Hammer, M. A. & Miller, A., Jun 8 2019, PLDI 2019 - Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation. McKinley, K. S. & Fisher, K. (eds.). Association for Computing Machinery, p. 640-654 15 p. (Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI)).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access

Outguard: Detecting in-browser covert cryptocurrency mining in the wild

Kharraz, A., Lever, C., Borisov, N., Ma, Z., Mason, J., Antonakakis, M., Murley, P., Miller, A. & Bailey, M., May 13 2019, The Web Conference 2019 - Proceedings of the World Wide Web Conference, WWW 2019. Association for Computing Machinery, Inc, p. 840-852 13 p. (The Web Conference 2019 - Proceedings of the World Wide Web Conference, WWW 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Pisa: Arbitration outsourcing for state channels

McCorry, P., Bakshi, S., Bentov, I., Meiklejohn, S. & Miller, A., Oct 21 2019, AFT 2019 - Proceedings of the 1st ACM Conference on Advances in Financial Technologies. Association for Computing Machinery, Inc, p. 16-30 15 p. (AFT 2019 - Proceedings of the 1st ACM Conference on Advances in Financial Technologies).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Secure Brokered Delegation Through DelegaTEE

Schneider, M., Matetic, S., Juels, A., Miller, A. & Capkun, S., Jul 1 2019, In : IEEE Security and Privacy. 17, 4, p. 43-52 10 p., 8706929.

Research output: Contribution to journalArticle

Short Paper: I Can’t Believe It’s Not Stake! Resource Exhaustion Attacks on PoS

Kanjalkar, S., Kuo, J., Li, Y. & Miller, A., Jan 1 2019, Financial Cryptography and Data Security - 23rd International Conference, FC 2019, Revised Selected Papers. Goldberg, I. & Moore, T. (eds.). Springer, p. 62-69 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11598 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sprites and State Channels: Payment Networks that Go Faster Than Lightning

Miller, A., Bentov, I., Bakshi, S., Kumaresan, R. & McCorry, P., Jan 1 2019, Financial Cryptography and Data Security - 23rd International Conference, FC 2019, Revised Selected Papers. Goldberg, I. & Moore, T. (eds.). Springer, p. 508-526 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11598 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TxProbe: Discovering Bitcoin’s Network Topology Using Orphan Transactions

Delgado-Segura, S., Bakshi, S., Pérez-Solà, C., Litton, J., Pachulski, A., Miller, A. & Bhattacharjee, B., Jan 1 2019, Financial Cryptography and Data Security - 23rd International Conference, FC 2019, Revised Selected Papers. Goldberg, I. & Moore, T. (eds.). Springer, p. 550-566 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11598 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2018

Authenticated Data Structures for Privacy-Preserving Monero Light Clients

Lee, K. & Miller, A., Jul 6 2018, Proceedings - 3rd IEEE European Symposium on Security and Privacy Workshops, EURO S and PW 2018. Institute of Electrical and Electronics Engineers Inc., p. 20-28 9 p. (Proceedings - 3rd IEEE European Symposium on Security and Privacy Workshops, EURO S and PW 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Dandelion++: Lightweight cryptocurrency networking with formal anonymity guarantees

Fanti, G., Denby, B., Venkatakrishnan, S. B., Bhargava, S., Viswanath, P., Bakshi, S. & Miller, A., Jun 12 2018, SIGMETRICS 2018 - Abstracts of the 2018 ACM International Conference on Measurement and Modeling of Computer Systems. Association for Computing Machinery, Inc, p. 5-7 3 p. (SIGMETRICS 2018 - Abstracts of the 2018 ACM International Conference on Measurement and Modeling of Computer Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Dandelion++: Lightweight Cryptocurrency Networking with Formal Anonymity Guarantees

Fanti, G., Venkatakrishnan, S. B., Bakshi, S., Denby, B., Bhargava, S., Miller, A. & Viswanath, P., Jun 12 2018, In : Performance Evaluation Review. 46, 1, p. 5-7 3 p.

Research output: Contribution to journalArticle

DELEGATEE: Brokered delegation using trusted execution environments

Matetic, S., Schneider, M., Miller, A., Juels, A. & Capkun, S., Jan 1 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 1387-1403 17 p. (Proceedings of the 27th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Erays: Reverse engineering Ethereum's opaque smart contracts

Zhou, Y., Kumar, D., Bakshi, S., Mason, J., Miller, A. & Bailey, M., Jan 1 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 1371-1385 15 p. (Proceedings of the 27th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Measuring ethereum network peers

Kim, S. K., Mason, J., Ma, Z., Miller, A., Murali, S. & Bailey, M., Oct 31 2018, IMC 2018 - Proceedings of the Internet Measurement Conference. Association for Computing Machinery, p. 91-104 14 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Smart contracts and opportunities for formal methods

Miller, A., Cai, Z. & Jha, S., Jan 1 2018, Leveraging Applications of Formal Methods, Verification and Validation. Industrial Practice - 8th International Symposium, ISoLA 2018, Proceedings. Margaria, T. & Steffen, B. (eds.). Springer-Verlag, p. 280-299 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11247 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2017

Atomically trading with roger: Gambling on the success of a hardfork

McCorry, P., Heilman, E. & Miller, A., Jan 1 2017, Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Proceedings. Garcia-Alfaro, J., Herrera-Joancomarti, J., Navarro-Arribas, G. & Hartenstein, H. (eds.). Springer-Verlag Berlin Heidelberg, p. 334-353 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10436 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Instantaneous decentralized poker

Bentov, I., Kumaresan, R. & Miller, A., Jan 1 2017, Advances in Cryptology – ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Proceedings. Takagi, T. & Peyrin, T. (eds.). Springer-Verlag, p. 410-440 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10625 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

SmartCast: An incentive compatible consensus protocol using smart contracts

Kothapalli, A., Miller, A. & Borisov, N., Jan 1 2017, Financial Cryptography and Data Security - FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Revised Selected Papers. Miller, A., Brenner, M., Rohloff, K., Bonneau, J., Teague, V., Bracciali, A., Sala, M., Pintore, F., Jakobsson, M. & Ryan, P. Y. A. (eds.). Springer-Verlag Berlin Heidelberg, p. 536-552 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10323 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Towards an accountable software-defined networking architecture

Ujcich, B. E., Miller, A., Bates, A. & Sanders, W. H., Aug 7 2017, 2017 IEEE Conference on Network Softwarization: Softwarization Sustaining a Hyper-Connected World: en Route to 5G, NetSoft 2017. Institute of Electrical and Electronics Engineers Inc., p. 1-5 5 p. (2017 IEEE Conference on Network Softwarization: Softwarization Sustaining a Hyper-Connected World: en Route to 5G, NetSoft 2017; vol. 2017-August).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Zero-collateral lotteries in Bitcoin and Ethereum

Miller, A. & Bentov, I., Jun 30 2017, Proceedings - 2nd IEEE European Symposium on Security and Privacy Workshops, EuroS and PW 2017. Institute of Electrical and Electronics Engineers Inc., p. 4-13 10 p. 7966964. (Proceedings - 2nd IEEE European Symposium on Security and Privacy Workshops, EuroS and PW 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2016

Cryptocurrencies, blockchains, and smart contracts; Hardware for deep learning

Bailis, P., Narayanan, A., Miller, A. E. & Han, S., Nov 1 2016, In : Queue. 14, 6

Research output: Contribution to journalArticle

Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts

Kosba, A., Miller, A., Shi, E., Wen, Z. & Papamanthou, C., May 2016, p. 839-858.

Research output: Contribution to conferencePaper

On scaling decentralized blockchains (A position paper)

Croman, K., Decker, C., Eyal, I., Gencer, A. E., Juels, A., Kosba, A., Miller, A., Saxena, P., Shi, E., Sirer, E. G., Song, D. & Wattenhofer, R., Jan 1 2016, Financial Cryptography and Data Security - International Workshops, FC 2016, BITCOIN, VOTING, and WAHC, Revised Selected Papers. Rohloff, K., Clark, J., Meiklejohn, S., Wallach, D., Brenner, M. & Ryan, P. Y. A. (eds.). Springer-Verlag, p. 106-125 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9604 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Step by step towards creating a safe smart contract: Lessons and insights from a cryptocurrency lab

Delmolino, K., Arnett, M., Kosba, A., Miller, A. & Shi, E., 2016, Financial Cryptography and Data Security - International Workshops, FC 2016, BITCOIN, VOTING, and WAHC, Revised Selected Papers. Rohloff, K., Clark, J., Meiklejohn, S., Wallach, D., Brenner, M. & Ryan, P. Y. A. (eds.). Springer-Verlag Berlin Heidelberg, p. 79-94 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9604 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Stubborn mining: Generalizing selfish mining and combining with an eclipse attack

Nayak, K., Kumar, S., Miller, A. & Shi, E., May 9 2016, Proceedings - 2016 IEEE European Symposium on Security and Privacy, EURO S and P 2016. Institute of Electrical and Electronics Engineers Inc., p. 305-320 16 p. 7467362. (Proceedings - 2016 IEEE European Symposium on Security and Privacy, EURO S and P 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack

Nayak, K., Kumar, S., Miller, A. E. & Shi, E., Mar 2016, p. 305-320.

Research output: Contribution to conferencePaper

The Honey Badger of BFT Protocols

Miller, A., Xia, Y., Croman, K., Shi, E. & Song, D., 2016, CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, p. 31-42

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2015

Nonoutsourceable scratch-off puzzles to discourage bitcoin mining coalitions

Miller, A., Kosba, A., Katz, J. & Shi, E., Oct 12 2015, CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 680-691 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2015-October).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Shadow-bitcoin: scalable simulation via direct execution of multi-threaded applications

Miller, A. & Jansen, R., Jan 1 2015.

Research output: Contribution to conferencePaper

SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies

Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J. A. & Felten, E. W., May 2015, p. 104-121.

Research output: Contribution to conferencePaper

2014

Authenticated data structures, generically

Miller, A., Hicks, M., Katz, J. & Shi, E., Jan 13 2014, In : ACM SIGPLAN Notices. 49, 1, p. 411-423 13 p.

Research output: Contribution to journalArticle

Authenticated data structures, generically

Miller, A., Hicks, M., Katz, J. & Shi, E., Feb 11 2014, POPL 2014 - Proceedings of the 41st Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. p. 411-423 13 p. (Conference Record of the Annual ACM Symposium on Principles of Programming Languages).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fawkescoin a cryptocurrency without public-key cryptography

Bonneau, J. & Miller, A., Jan 1 2014, Security Protocols XXII - 22nd International Workshop, Revised Selected Papers. Stajano, F., Matyáš, V., Švenda, P., Anderson, J., Christianson, B. & Malcolm, J. (eds.). Springer-Verlag, p. 350-358 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8809).

Research output: Chapter in Book/Report/Conference proceedingChapter

Mixcoin: Anonymity for bitcoin with accountable mixes

Bonneau, J., Narayanan, A., Miller, A., Clark, J., Kroll, J. A. & Felten, E. W., Jan 1 2014, Financial Cryptography and Data Security - 18th International Conference, FC 2014, Revised Selected Papers. Safavi-Naini, R. & Christin, N. (eds.). Springer-Verlag Berlin Heidelberg, p. 486-504 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8437).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Permacoin: Repurposing Bitcoin Work for Data Preservation

Miller, A., Juels, A., Shi, E., Parno, B. & Katz, J., May 2014, p. 475-490.

Research output: Contribution to conferencePaper

The effectiveness of an AR-based context-aware assembly support system in object assembly

Khuong, B. M., Kiyokawa, K., Miller, A. E., La Viola, J. J., Mashita, T. & Takemura, H., Jan 1 2014, 2014 IEEE Virtual Reality, VR 2014 - Proceedings. IEEE Computer Society, p. 57-62 6 p. 6802051. (Proceedings - IEEE Virtual Reality).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2012

Interactive 3D model acquisition and tracking of building block structures

Miller, A., White, B., Charbonneau, E., Kanzler, Z. & Laviola, J. J., Mar 22 2012, In : IEEE Transactions on Visualization and Computer Graphics. 18, 4, p. 651-659 9 p., 6165147.

Research output: Contribution to journalArticle

2011

Real-time rendering and dynamic updating of 3-d volumetric data

Miller, A. E., Jain, V. & Mundy, J. L., Apr 27 2011, Proceedings of the 4th Workshop on General Purpose Processing on Graphics Processing Units, GPGPU-4. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Teach me to dance: Exploring player experience and performance in full body dance games

Charbonneau, E., Miller, A. & LaViola, J. J., Dec 1 2011, Proceedings of the 8th International Conference on Advances in Computer Entertainment Technology, ACE 2011. 43. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2010

The wiimote and beyond: Spatially convenient devices for 3D user interfaces

Wingrave, C. A., Williamson, B., Varcholik, P. D., Rose, J., Miller, A., Charbonneau, E., Bott, J. & Laviola, J. J., Mar 1 2010, In : IEEE Computer Graphics and Applications. 30, 2, p. 71-85 15 p., 5262926.

Research output: Contribution to journalArticle

Towards a handheld stereo projector system for viewing and interacting in virtual worlds

Miller, A. & LaViola, J. J., Jun 8 2010, 3DUI 2010 - IEEE Symposium on 3D User Interfaces 2010, Proceedings. p. 133-134 2 p. 5444701. (3DUI 2010 - IEEE Symposium on 3D User Interfaces 2010, Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

VizWiz: Nearly real-time answers to visual questions

Bigham, J. P., Jayant, C., Ji, H., Little, G., Miller, A., Miller, R. C., Tatarowicz, A., White, B., White, S. & Yeh, T., Jul 16 2010, W4A 2010 - International Cross Disciplinary Conference on Web Accessibility Raleigh 2010. 1806020. (W4A 2010 - International Cross Disciplinary Conference on Web Accessibility Raleigh 2010).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

VizWiz: Nearly real-time answers to visual questions

Bigham, J. P., Jayant, C., Ji, H., Little, G., Miller, A., Miller, R. C., Miller, R., Tatarowicz, A., White, B., White, S. & Yeh, T., Dec 6 2010, UIST 2010 - 23rd ACM Symposium on User Interface Software and Technology. p. 333-342 10 p. (UIST 2010 - 23rd ACM Symposium on User Interface Software and Technology).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

VizWiz::LocateIt - Enabling blind people to locate objects in their environment

Bigham, J. P., Jayant, C., Miller, A. E., White, B. & Yeh, T., Sep 17 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition - Workshops, CVPRW 2010. p. 65-72 8 p. 5543821. (2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition - Workshops, CVPRW 2010).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2009

Poster: RealDance: An exploration of 3d spatial interfaces for dancing games

Charbonneau, E., Miller, A. E., Wingrave, C. A. & LaViola, J. J., Sep 28 2009, 3DUI - IEEE Symposium on 3D User Interfaces 2009 - Proceedings. p. 141-142 2 p. 4811226. (3DUI - IEEE Symposium on 3D User Interfaces 2009 - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Understanding visual interfaces for the next generation of dance-based rhythm video games

Charbonneau, E., Miller, A., Wingrave, C. & LaViola, J. J., Jan 1 2009, Proceedings of the 2009 ACM SIGGRAPH Symposium on Video Games, Sandbox '09. Association for Computing Machinery, p. 119-126 8 p. (Proceedings of the 2009 ACM SIGGRAPH Symposium on Video Games, Sandbox '09).

Research output: Chapter in Book/Report/Conference proceedingConference contribution