Search Results

4.5 Million (Suspected) Fake Stars in GitHub: A Growing Spiral of Popularity Contests, Scams, and Malware

1 code implementation18 Dec 2024

GitHub, the de-facto platform for open-source software development, provides a set of social-media-like features to signal high-quality repositories.

Cryptography and Security Software Engineering

Evolution of Automated Weakness Detection in Ethereum Bytecode: a Comprehensive Study

2 code implementations18 Mar 2023

Our study is the first that is based on the entire body of deployed bytecode on Ethereum's main chain.

Cryptography and Security Software Engineering

SmartOTPs: An Air-Gapped 2-Factor Authentication for Smart-Contract Wallets (Extended Version)

2 code implementations10 Dec 2018

The proposed framework consists of four components (i. e., an authenticator, a client, a hardware wallet, and a smart contract), and it provides 2-factor authentication (2FA) performed in two stages of interaction with the blockchain.

Cryptography and Security

A Lyra2 FPGA Core for Lyra2REv2-Based Cryptocurrencies

1 code implementation16 Jul 2018

Lyra2REv2 is a hashing algorithm that consists of a chain of individual hashing algorithms and it is used as a proof-of-work function in several cryptocurrencies that aim to be ASIC-resistant.

Cryptography and Security Hardware Architecture Signal Processing

The Multibillion Dollar Software Supply Chain of Ethereum

2 code implementations14 Feb 2022

So-called Ethereum nodes operate the blockchain, relying on a vast supply chain of third-party software dependencies maintained by diverse organizations.

Software Engineering

Spams meet Cryptocurrencies: Sextortion in the Bitcoin Ecosystem

1 code implementation2 Aug 2019

We discover that one single entity is likely controlling the financial backbone of the majority of the sextortion campaigns and that the 11-month operation studied yielded a lower-bound revenue between \$1, 300, 620 and \$1, 352, 266.

Cryptography and Security

Sprites and State Channels: Payment Networks that Go Faster than Lightning

1 code implementation19 Feb 2017

Our construction is also modular, making use of a generic abstraction from folklore, called the "state channel," which we are the first to formalize.

Cryptography and Security

SoK: Yield Aggregators in DeFi

1 code implementation28 May 2021

Yield farming has been an immensely popular activity for cryptocurrency holders since the explosion of Decentralized Finance (DeFi) in the summer of 2020.

Utilizing Public Blockchains for the Sybil-Resistant Bootstrapping of Distributed Anonymity Services

1 code implementation14 Apr 2020

Distributed anonymity services, such as onion routing networks or cryptocurrency tumblers, promise privacy protection without trusted third parties.

Cryptography and Security Networking and Internet Architecture

An Empirical Study of Blockchain Repositories in GitHub

1 code implementation17 May 2022

In the open-source software (OSS) portal GitHub, we observe a growing adoption of Blockchain-based solutions.

Cryptography and Security Software Engineering