Flash boys 2.0: Frontrunning in decentralized exchanges, miner extractable value, and consensus instability P Daian, S Goldfeder, T Kell, Y Li, X Zhao, I Bentov, L Breidenbach, ... 2020 IEEE symposium on security and privacy (SP), 910-927, 2020 | 544 | 2020 |
Kevm: A complete formal semantics of the ethereum virtual machine E Hildenbrandt, M Saxena, N Rodrigues, X Zhu, P Daian, D Guth, ... 2018 IEEE 31st Computer Security Foundations Symposium (CSF), 204-217, 2018 | 494 | 2018 |
Flash boys 2.0: Frontrunning, transaction reordering, and consensus instability in decentralized exchanges P Daian, S Goldfeder, T Kell, Y Li, X Zhao, I Bentov, L Breidenbach, ... arXiv preprint arXiv:1904.05234, 2019 | 300 | 2019 |
Snow White: Robustly Reconfigurable Consensus and Applications to Provably Secure Proof of Stake P Daian, R Pass, E Shi Financial Cryptography and Data Security: 23rd International Conference, FC …, 2019 | 292 | 2019 |
Tesseract: Real-time cryptocurrency exchange using trusted hardware I Bentov, Y Ji, F Zhang, L Breidenbach, P Daian, A Juels Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 227 | 2019 |
A formal verification tool for Ethereum VM bytecode D Park, Y Zhang, M Saxena, P Daian, G Roşu Proceedings of the 2018 26th ACM joint meeting on european software …, 2018 | 129 | 2018 |
Enter the hydra: Towards principled bug bounties and {Exploit-Resistant} smart contracts L Breidenbach, P Daian, F Tramèr, A Juels 27th USENIX Security Symposium (USENIX Security 18), 1335-1352, 2018 | 127 | 2018 |
Kevm: A complete semantics of the ethereum virtual machine E Hildenbrandt, M Saxena, X Zhu, N Rodrigues, P Daian, D Guth, G Roşu | 100 | 2017 |
Analysis of the DAO exploit P Daian Hacking, Distributed 6, 2016 | 100 | 2016 |
SquirRL: Automating attack analysis on blockchain incentive mechanisms with deep reinforcement learning C Hou, M Zhou, Y Ji, P Daian, F Tramer, G Fanti, A Juels arXiv preprint arXiv:1912.01798, 2019 | 95 | 2019 |
Real-time cryptocurrency exchange using trusted hardware I Bentov, A Juels, F Zhang, P Daian, L Breidenbach US Patent 11,244,309, 2022 | 81 | 2022 |
Snow white: Provably secure proofs of stake P Daian, R Pass, E Shi Cryptology ePrint Archive, Report 2016/919, 2016 | 75 | 2016 |
Clockwork finance: Automated analysis of economic security in smart contracts K Babel, P Daian, M Kelkar, A Juels 2023 IEEE Symposium on Security and Privacy (SP), 2499-2516, 2023 | 67 | 2023 |
An in-depth look at the parity multisig bug L Breidenbach, P Daian, A Juels, EG Sirer Ethereum Parity Wallet Security, 2017 | 59 | 2017 |
Unity is strength: A formalization of cross-domain maximal extractable value A Obadia, A Salles, L Sankar, T Chitra, V Chellani, P Daian arXiv preprint arXiv:2112.01472, 2021 | 39 | 2021 |
On-chain vote buying and the rise of dark DAOs P Daian, T Kell, I Miers, A Juels Hacking, Distributed, 2018 | 34 | 2018 |
Flash boys 2.0: Frontrunning, transaction reordering, and consensus instability in decentralized exchanges (2019) P Daian, S Goldfeder, T Kell, Y Li, X Zhao, I Bentov, L Breidenbach, ... arXiv preprint arXiv:1904.05234, 1904 | 34 | 1904 |
Rv-android: Efficient parametric android runtime verification, a brief tutorial P Daian, Y Falcone, P Meredith, TF Şerbănuţă, S Shiriashi, A Iwai, ... Runtime Verification: 6th International Conference, RV 2015, Vienna, Austria …, 2015 | 28 | 2015 |
PieceWork: Generalized Outsourcing Control for Proofs of Work P Daian, EG Sirer, I Eyal, A Juels BITCOIN'17, 2017 | 25* | 2017 |
Analysis of the DAO exploit (2016) P Daian URL: http://hackingdistributed. com/2016/06/18/analysis-of-thedao-exploit …, 2021 | 15 | 2021 |