Följ
Philip Daian
Philip Daian
PhD Student, Cornell University
Verifierad e-postadress på cs.cornell.edu - Startsida
Titel
Citeras av
Citeras av
År
Kevm: A complete formal semantics of the ethereum virtual machine
E Hildenbrandt, M Saxena, N Rodrigues, X Zhu, P Daian, D Guth, ...
2018 IEEE 31st Computer Security Foundations Symposium (CSF), 204-217, 2018
3412018
Flash boys 2.0: Frontrunning in decentralized exchanges, miner extractable value, and consensus instability
P Daian, S Goldfeder, T Kell, Y Li, X Zhao, I Bentov, L Breidenbach, ...
2020 IEEE Symposium on Security and Privacy (SP), 910-927, 2020
2122020
Snow White: Robustly Reconfigurable Consensus and Applications to Provably Secure Proof of Stake
P Daian, R Pass, E Shi
Financial Cryptography and Data Security: 23rd International Conference, FC …, 2019
1982019
Flash boys 2.0: Frontrunning, transaction reordering, and consensus instability in decentralized exchanges
P Daian, S Goldfeder, T Kell, Y Li, X Zhao, I Bentov, L Breidenbach, ...
arXiv preprint arXiv:1904.05234, 2019
1792019
Tesseract: Real-time cryptocurrency exchange using trusted hardware
I Bentov, Y Ji, F Zhang, L Breidenbach, P Daian, A Juels
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
1322019
A formal verification tool for Ethereum VM bytecode
D Park, Y Zhang, M Saxena, P Daian, G Roşu
Proceedings of the 2018 26th ACM joint meeting on european software …, 2018
992018
Kevm: A complete semantics of the ethereum virtual machine
E Hildenbrandt, M Saxena, X Zhu, N Rodrigues, P Daian, D Guth, G Roşu
902017
Enter the hydra: Towards principled bug bounties and exploit-resistant smart contracts
L Breidenbach, P Daian, F Tramèr, A Juels
27th {USENIX} Security Symposium ({USENIX} Security 18), 1335-1352, 2018
882018
Snow white: Provably secure proofs of stake
P Daian, R Pass, E Shi
Cryptology ePrint Archive, Report 2016/919, 2016
682016
Analysis of the DAO exploit
P Daian
Hacking, Distributed 6, 2016
672016
Analysis of the DAO exploit
P Daian
Hacking, Distributed 6, 2016
672016
SquirRL: Automating attack analysis on blockchain incentive mechanisms with deep reinforcement learning
C Hou, M Zhou, Y Ji, P Daian, F Tramer, G Fanti, A Juels
arXiv preprint arXiv:1912.01798, 2019
652019
An in-depth look at the parity multisig bug
L Breidenbach, P Daian, A Juels, EG Sirer
Hacking, Distributed, July, 2017
322017
Real-time cryptocurrency exchange using trusted hardware
I Bentov, A Juels, F Zhang, P Daian, L Breidenbach
US Patent 11,244,309, 2022
312022
PieceWork: Generalized Outsourcing Control for Proofs of Work
P Daian, EG Sirer, I Eyal, A Juels
BITCOIN'17, 2017
24*2017
Rv-android: Efficient parametric android runtime verification, a brief tutorial
P Daian, Y Falcone, P Meredith, TF Şerbănuţă, S Shiriashi, A Iwai, ...
Runtime Verification: 6th International Conference, RV 2015, Vienna, Austria …, 2015
222015
On-chain vote buying and the rise of dark DAOs
P Daian, T Kell, I Miers, A Juels
Hacking, Distributed, 2018
162018
& Juels, A.(2019). Flash Boys 2.0: Frontrunning, Transaction Reordering, and Consensus Instability in Decentralized Exchanges
P Daian, S Goldfeder, T Kell, Y Li, X Zhao, I Bentov
arXiv preprint arXiv:1904.05234, 0
14
Clockwork finance: Automated analysis of economic security in smart contracts
K Babel, P Daian, M Kelkar, A Juels
arXiv preprint arXiv:2109.04347, 2021
132021
Analysis of the DAO exploit (2016)
P Daian
URL: http://hackingdistributed. com/2016/06/18/analysis-of-thedao-exploit …, 2021
122021
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20