Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
ultimate-defi-research-base
Here we collect and discuss the best DeFI & Blockchain researches and tools. Feel free to DM me on Twitter or open pool request.
https://github.com/OffcierCia/ultimate-defi-research-base
Last synced: 2 days ago
JSON representation
-
Hack Incident Reporting
- Retrospective: Hacks in Web3
- Rekt News - Anonymous platform for whistleblowers and DeFi detectives to present their information to the community.
- Retrospective: Hacks in Web3
- Retrospective: Hacks in Web3
- Retrospective: Hacks in Web3
- Retrospective: Hacks in Web3
- Retrospective: Hacks in Web3
- Blockchain Graveyard - A list of all massive security breaches or thefts involving blockchains.
- Retrospective: Hacks in Web3
- Retrospective: Hacks in Web3
- Retrospective: Hacks in Web3
- Retrospective: Hacks in Web3
- Retrospective: Hacks in Web3
- Retrospective: Hacks in Web3
- Retrospective: Hacks in Web3
- Retrospective: Hacks in Web3
- Retrospective: Hacks in Web3
- Retrospective: Hacks in Web3
- Retrospective: Hacks in Web3
- Retrospective: Hacks in Web3
- Retrospective: Hacks in Web3
- Retrospective: Hacks in Web3
- Retrospective: Hacks in Web3
- Retrospective: Hacks in Web3
- Retrospective: Hacks in Web3
- Retrospective: Hacks in Web3
- Retrospective: Hacks in Web3
- Retrospective: Hacks in Web3
- Retrospective: Hacks in Web3
- Retrospective: Hacks in Web3
- Retrospective: Hacks in Web3
- Retrospective: Hacks in Web3
- Retrospective: Hacks in Web3
- Retrospective: Hacks in Web3
- Retrospective: Hacks in Web3
- Retrospective: Hacks in Web3
- Retrospective: Hacks in Web3
- Retrospective: Hacks in Web3
-
General information:
- Bandcoin: Using Smart Contracts to Automate Mobile Network Bandwidth Roaming Agreements - Authors propose a new way to share licensed spectrum bandwidth capacity in mobile networks between operators, service providers and consumers using blockchain-based smart contracts.
- A Blockchain Architecture for Industrial Applications - In this work authors compare public and permissioned blockchains for industrial applications.
- Exploring Blockchain for The Coordination of Distributed Energy Resources - In this paper, authors develop a trustable and distributed coordination system for DERs using blockchain technology.
- Blockchain for Transactive Energy Management of Distributed Energy Resources in Smart Grid - Considering the dispersed nature and diverse ownership of DERs, authors develop a distributed algorithm to solve the optimization problem using the alternating direction method of multipliers (ADMM) method.
- The rich still get richer: Empirical comparison of preferential attachment via linking statistics in Bitcoin and Ethereum - Authors show that preferential attachment continues to be a key factor in the evolution of both currencies.
- How to Issue a Central Bank Digital Currency - Authors contribute to the current research debate by showing how a central bank could do CBDC so, if desired.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- Stochastic Properties of EIP1559 Basefees - Authors explain the new pricing mechanism for the Ethereum developed to bring stability to fluctuating gas prices.
- 101 the Principles of Tokenomics - This article is a reprint of the original on Eat Sleep Crypto, last edited Jan 12, 2023
- A Big Data Analysis of the Ethereum Network: from Blockchain to Google Trends - An analysis of the crypto prices and search trends suggests the existence of big players (and not the regular users), manipulating the market after a drop in prices.
- A DLT-based Smart Contract Architecture for Atomic and Scalable Trading - In this paper, authors propose an atomic, scalable and privacy-preserving protocol that enables secure and dynamic updates. Then develop a smart contract-based Credit-Note System (CNS) that allows participants to lock funds before a state channel initialisation, which enhances flexibility and efficiency.
- A Systematic Literature Review on Blockchain Governance - This study comprehensively investigates blockchain governance via 5W1H questions.
- On Technical Trading and Social Media Indicators in Cryptocurrencies' Price Classification Through Deep Learning - The study shows that, based on the hourly frequency results, the unrestricted model outperforms the restricted one both in ETH and BTC.
- A general framework for blockchain analytics - Authors propose a general-purpose framework, supporting data analytics on Bitcoin Ethereum — it allows to integrate block data with data from other sources, and to organise them in a database.
- Bandcoin: Using Smart Contracts to Automate Mobile Network Bandwidth Roaming Agreements - Authors propose a new way to share licensed spectrum bandwidth capacity in mobile networks between operators, service providers and consumers using blockchain-based smart contracts.
- A Blockchain Architecture for Industrial Applications - In this work authors compare public and permissioned blockchains for industrial applications.
- Changes to the extreme and erratic behaviour of cryptocurrency during COVID-19 - This paper introduces new methods for analysing the extreme and erratic behaviour of time series to evaluate the impact of COVID-19 on market dynamics.
- Financial Markets Prediction with Deep Learning - Authors propose a novel one-dimensional convolutional neural networks (CNN) model to predict financial market movement.
- AMR:Autonomous Coin Mixer with Privacy Preserving Reward Distribution - In this work, authors propose the first censorship resilient mixer, which can reward its users in a privacy-preserving manner for participating in the system.
- Ethna: Analyzing the Underlying Peer-to-Peer Network of the Ethereum Blockchain - Ethna implements a novel method that accurately measures the degrees of Ethereum nodes.
- Dynamical Analysis of the EIP-1559 Ethereum Fee Market - Authors perform a thorough analysis of the resulting fee market dynamic mechanism via a combination of tools from game theory and dynamical systems.
- Transaction Fee Mechanism Design for the Ethereum Blockchain: An Economic Analysis of EIP-1559 - This report assesses the game-theoretic strengths and weaknesses of the proposal and explores some alternative designs.
- Exploring Blockchain for The Coordination of Distributed Energy Resources - In this paper, authors develop a trustable and distributed coordination system for DERs using blockchain technology.
- Exploring asymmetric multifractal cross-correlations of price-volatility in cryptocurrency markets - Authors find that cross-correlations are stronger in downtrend markets than in uptrend markets. In contrast, for Ripple and Litecoin, inverted reactions are present where cross-correlations are stronger in uptrend markets. Authors uncover the dynamics of asymmetric volatility structure and provide new guidance in investigating dynamical relationships between price and volatility for cryptocurrencies.
- Blockchain for Transactive Energy Management of Distributed Energy Resources in Smart Grid - Considering the dispersed nature and diverse ownership of DERs, authors develop a distributed algorithm to solve the optimization problem using the alternating direction method of multipliers (ADMM) method.
- Measuring Decentralization in Bitcoin and Ethereum using Multiple Metrics and Granularities - Authors show that the degree of decentralization in Bitcoin is higher, while the degree of decentralization in Ethereum is more stable.
- Block Access Control in Wireless Blockchain Network: Design, Modeling and Analysis - The results show that BAC approaches can help the network to achieve a high transaction throughput while improving block utilization and saving computational power. Meanwhile, the trade-off between transaction throughput and block utilization is demonstrated, which can act as a guidance for practical deployment of blockchain.
- A Regulatory System for Optimal Legal Transaction Throughput in Cryptocurrency Blockchains - Authors present a regulatory framework for blockchain protocols, for ensuring legal transaction confirmation as part of the blockchain distributed consensus.
- Towards External Calls for Blockchain and Distributed Ledger Technology - In this paper authors show that this belief is preconceived by demonstrating a method that enables blockchain and distributed ledger technologies to perform calls to external systems initiated from the blockchain/DLT itself.
- Managing Blockchain Systems and Applications: A Process Model for Blockchain Configurations - Authors demonstrate the applicability of the proposed blockchain configuration process model on four blockchain projects
- Blockchain Systems, Technologies and Applications: A Methodology Perspective - First, this article introduces how blockchain works, the research activity and challenge, and illustrates the roadmap involving the classic methodology with typical blockchain use cases and topics. Second, in a blockchain system, how to adopt stochastic processes, game theory, optimization, machine learning and cryptography to study blockchain running processes and design blockchain protocol/algorithm are discussed in detail.
- A Note on Optimal Fees for Constant Function Market Makers - Authors present a framework that can be used to compute optimal fees for real world pools using past trade data.
- The rich still get richer: Empirical comparison of preferential attachment via linking statistics in Bitcoin and Ethereum - Authors show that preferential attachment continues to be a key factor in the evolution of both currencies.
- Reward Mechanism for Blockchains Using Evolutionary Game Theory - In this paper, authors develop a reward mechanism framework that could apply to many PoS blockchains.
- Summing Up Smart Transitions - In this paper, authors present a generalization of first-order logic which can express the unbounded sum of balances.
- How to Issue a Central Bank Digital Currency - Authors contribute to the current research debate by showing how a central bank could do CBDC so, if desired.
- Decentralized Finance: On Blockchain- and Smart Contract-Based Financial Markets - Written by Fabian Schar, gives an overview of blockchain based markets with technical details but in a digestible format; great paper for newcomers to the space.
- Theory and Implementation of Elliptic Curve Cryptography - This work describes the mathematics needed to implement Elliptic Curve Cryptography (ECC) with special attention to its implementation in Galois Field. Here the functionality of ECC, its advantages and challenges over other cryptosystems are also explained.
- An Incomplete Guide to Rollups by Vitalik - Rollups are all the rage in the Ethereum community, and are poised to be the key scalability solution for Ethereum for the foreseeable future. But what exactly is this technology, what can you expect from it and how will you be able to use it? This post will attempt to answer some of those key questions.
- Understanding an Ethereum Transaction - Coverage of the transaction life cycle.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- The Decentralised Financial Crisis - The Global Financial Crisis of 2008, caused by the accumulation of excessive financial risk, inspired Satoshi Nakamoto to create Bitcoin. Now, more than ten years later, Decentralized Finance (DeFi), a peer-to-peer financial paradigm which leverages blockchain-based smart contracts to ensure its integrity and security, contains over 702m USD of capital as of April 15th, 2020. As this ecosystem develops, it is at risk of the very sort of financial meltdown it is supposed to be preventing. In this paper we explore how design weaknesses and price fluctuations in DeFi protocols could lead to a potential DeFi crisis.
- On the Performance of Blockchain-enabled RAN-as-a-service in Beyond 5G Networks - In this paper, authors propose the application of BC to facilitate Mobile Network Operators (MNOs) and other players such as Verticals or Over-The-Top (OTT) service providers to exchange Radio Access Network (RAN) resources (e.g., infrastructure, spectrum) in a secure, flexible and autonomous manner.
- 100+ Metrics for Software Startups - A Multi-Vocal Literature Review - Using data in the form of metrics can help software startups to make the right decisions amidst uncertainty and limited resources.
- How to Issue a Central Bank Digital Currency - Authors contribute to the current research debate by showing how a central bank could do CBDC so, if desired.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- Stochastic Properties of EIP1559 Basefees - Authors explain the new pricing mechanism for the Ethereum developed to bring stability to fluctuating gas prices.
- A DLT-based Smart Contract Architecture for Atomic and Scalable Trading - In this paper, authors propose an atomic, scalable and privacy-preserving protocol that enables secure and dynamic updates. Then develop a smart contract-based Credit-Note System (CNS) that allows participants to lock funds before a state channel initialisation, which enhances flexibility and efficiency.
- Exploring Ethereum Data Stores: A Cost and Performance Comparison - In this work, authors examine a comprehensive set of data management approaches for ETH apps and assess the associated cost in gas as well as the retrieval performance.
- A Systematic Literature Review on Blockchain Governance - This study comprehensively investigates blockchain governance via 5W1H questions.
- On Technical Trading and Social Media Indicators in Cryptocurrencies' Price Classification Through Deep Learning - The study shows that, based on the hourly frequency results, the unrestricted model outperforms the restricted one both in ETH and BTC.
- A general framework for blockchain analytics - Authors propose a general-purpose framework, supporting data analytics on Bitcoin Ethereum — it allows to integrate block data with data from other sources, and to organise them in a database.
- Changes to the extreme and erratic behaviour of cryptocurrency during COVID-19 - This paper introduces new methods for analysing the extreme and erratic behaviour of time series to evaluate the impact of COVID-19 on market dynamics.
- Financial Markets Prediction with Deep Learning - Authors propose a novel one-dimensional convolutional neural networks (CNN) model to predict financial market movement.
- AMR:Autonomous Coin Mixer with Privacy Preserving Reward Distribution - In this work, authors propose the first censorship resilient mixer, which can reward its users in a privacy-preserving manner for participating in the system.
- Technology Review of Blockchain Data Privacy Solutions - This report aims to review existing enterprise blockchain technologies: EOSIO powered systems, Hyperledger Fabric and Besu, Consensus Quorum, R3 Corda and Ernst and Young’s Nightfall.
- Blockchain Systems, Technologies and Applications: A Methodology Perspective - First, this article introduces how blockchain works, the research activity and challenge, and illustrates the roadmap involving the classic methodology with typical blockchain use cases and topics. Second, in a blockchain system, how to adopt stochastic processes, game theory, optimization, machine learning and cryptography to study blockchain running processes and design blockchain protocol/algorithm are discussed in detail.
- Ethna: Analyzing the Underlying Peer-to-Peer Network of the Ethereum Blockchain - Ethna implements a novel method that accurately measures the degrees of Ethereum nodes.
- Dynamical Analysis of the EIP-1559 Ethereum Fee Market - Authors perform a thorough analysis of the resulting fee market dynamic mechanism via a combination of tools from game theory and dynamical systems.
- Transaction Fee Mechanism Design for the Ethereum Blockchain: An Economic Analysis of EIP-1559 - This report assesses the game-theoretic strengths and weaknesses of the proposal and explores some alternative designs.
- Community Detection in Blockchain Social Networks - A novel community detection algorithm which is designed for low-rank signals on graph can help find users’ communities based on user-token subscription.
- Exploring asymmetric multifractal cross-correlations of price-volatility in cryptocurrency markets - Authors find that cross-correlations are stronger in downtrend markets than in uptrend markets. In contrast, for Ripple and Litecoin, inverted reactions are present where cross-correlations are stronger in uptrend markets. Authors uncover the dynamics of asymmetric volatility structure and provide new guidance in investigating dynamical relationships between price and volatility for cryptocurrencies.
- Measuring Decentralization in Bitcoin and Ethereum using Multiple Metrics and Granularities - Authors show that the degree of decentralization in Bitcoin is higher, while the degree of decentralization in Ethereum is more stable.
- Towards External Calls for Blockchain and Distributed Ledger Technology - In this paper authors show that this belief is preconceived by demonstrating a method that enables blockchain and distributed ledger technologies to perform calls to external systems initiated from the blockchain/DLT itself.
- Managing Blockchain Systems and Applications: A Process Model for Blockchain Configurations - Authors demonstrate the applicability of the proposed blockchain configuration process model on four blockchain projects
- A Note on Optimal Fees for Constant Function Market Makers - Authors present a framework that can be used to compute optimal fees for real world pools using past trade data.
- Reward Mechanism for Blockchains Using Evolutionary Game Theory - In this paper, authors develop a reward mechanism framework that could apply to many PoS blockchains.
- Summing Up Smart Transitions - In this paper, authors present a generalization of first-order logic which can express the unbounded sum of balances.
- On the Performance of Blockchain-enabled RAN-as-a-service in Beyond 5G Networks - In this paper, authors propose the application of BC to facilitate Mobile Network Operators (MNOs) and other players such as Verticals or Over-The-Top (OTT) service providers to exchange Radio Access Network (RAN) resources (e.g., infrastructure, spectrum) in a secure, flexible and autonomous manner.
- 100+ Metrics for Software Startups - A Multi-Vocal Literature Review - Using data in the form of metrics can help software startups to make the right decisions amidst uncertainty and limited resources.
- Blockchain Networks: Data Structures of Bitcoin , Monero, Zcash, Ethereum, Ripple and IOTA - Authors discuss how blockchain data can be abstracted as various types of networks, and how network abstractions are used to reap insights into the structure.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- Block Access Control in Wireless Blockchain Network: Design, Modeling and Analysis - The results show that BAC approaches can help the network to achieve a high transaction throughput while improving block utilization and saving computational power. Meanwhile, the trade-off between transaction throughput and block utilization is demonstrated, which can act as a guidance for practical deployment of blockchain.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- Exploring Ethereum Data Stores: A Cost and Performance Comparison - In this work, authors examine a comprehensive set of data management approaches for ETH apps and assess the associated cost in gas as well as the retrieval performance.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- 101 the Principles of Tokenomics - This article is a reprint of the original on Eat Sleep Crypto, last edited Jan 12, 2023
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- Comparing Virtual Machines: Message Only vs Asset-Oriented - Web3 is predicated on the notion that individuals can own assets on the internet. From DeFi, to Sovereign Identity, to Decentralized Autonomous Organizations (DAOs), every Web3 use case depends on digital assets of value - tokens; combined with self-executing rules on how those assets can be used - smart contracts, to incentivize decentralized communities of node-runners, developers, and users to deliver Web3 products and services.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- Technology Review of Blockchain Data Privacy Solutions - This report aims to review existing enterprise blockchain technologies: EOSIO powered systems, Hyperledger Fabric and Besu, Consensus Quorum, R3 Corda and Ernst and Young’s Nightfall.
- Community Detection in Blockchain Social Networks - A novel community detection algorithm which is designed for low-rank signals on graph can help find users’ communities based on user-token subscription.
- Blockchain Networks: Data Structures of Bitcoin , Monero, Zcash, Ethereum, Ripple and IOTA - Authors discuss how blockchain data can be abstracted as various types of networks, and how network abstractions are used to reap insights into the structure.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- A Big Data Analysis of the Ethereum Network: from Blockchain to Google Trends - An analysis of the crypto prices and search trends suggests the existence of big players (and not the regular users), manipulating the market after a drop in prices.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
- An in-depth guide into how the mempool works - Understanding the mempool, short but in-depth coverage.
-
NFTs
- Cryptoart - Top artists and artworks
- Cryptoart - Top artists and artworks
- CryptoArtPulse - Live View
- PumpMyGas - Live estimates of gas fees on all major NFT marketplaces
- NonFungible Tracker - NFT tracker
- RMRK App - NFT Project on Kusama & Polkadot - added by [Swader](https://github.com/Swader)
- PumpMyGas - Live estimates of gas fees on all major NFT marketplaces
- RMRK App - NFT Project on Kusama & Polkadot - added by [Swader](https://github.com/Swader)
- PumpMyGas - Live estimates of gas fees on all major NFT marketplaces
- PumpMyGas - Live estimates of gas fees on all major NFT marketplaces
- PumpMyGas - Live estimates of gas fees on all major NFT marketplaces
- PumpMyGas - Live estimates of gas fees on all major NFT marketplaces
- PumpMyGas - Live estimates of gas fees on all major NFT marketplaces
- RMRK App - NFT Project on Kusama & Polkadot - added by [Swader](https://github.com/Swader)
- PumpMyGas - Live estimates of gas fees on all major NFT marketplaces
-
[Transaction Visualization, Scoring & Tracking:](https://github.com/OffcierCia/On-Chain-Investigations-Tools-List/blob/main/README.md)
-
Moved here: [Link](https://github.com/OffcierCia/On-Chain-Investigations-Tools-List/blob/main/README.md)
-
-
Blockchain Governance:
- Blockchain as a confidence machine: The problem of trust & challenges of governance - Authors expound upon how the distributed heterogeneous web of actors participating in the network and their various behaviors ultimately determine the trustworthiness of a blockchain platform as a critical factor aside zero-trust networking fundamentals.
- Governance in the Blockchain Economy: A Framework and Research Agenda - Authors discuss the new implications and radical differences of a blockchain-powered economy from established notions of governance, measured by three dimensions in IT governance literature- decision rights, accountability, and incentives.
- Governance in Blockchain Technologies & Social Contract Theories - Authors evaluate blockchain governance and their unique challenges in contrast to contemporary governance structures is evaluated on key governance themes in functional social contracts, focusing on sovereignty, initial context, decentralization, and distributive justice.
- Blockchain Governance—A New Way of Organizing Collaborations? - Authors examine what different types of blockchain platforms may emerge, who is involved and impacted by blockchain governance, why actors may want blockchain, when and where blockchain is more effective compared to existing technologies, and how blockchains influence a number of organizational outcomes.
- Governance in the Blockchain Economy: A Framework and Research Agenda - Authors discuss the new implications and radical differences of a blockchain-powered economy from established notions of governance, measured by three dimensions in IT governance literature- decision rights, accountability, and incentives.
-
Security & Safety:
- DApp frontend security - In this article, Author will take a look at security for DApps.
- Demystifying Exploitable Bugs in Smart Contracts - The research indicates that a notable proportion of exploitable bugs in smart contracts are functional bugs, which cannot be detected using simple and general oracles like reentrancy.
- The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts - Investigation shows that the number of attacks did not necessarily decrease over the past few years, but for some vulnerabilities remained constant.
- Analysis of Bitcoin Vulnerability to Bribery Attacks Launched Through Large Transactions - In this paper, authors design a novel bribery attack and show that this guarantee can be hugely undermined.
- Vulnerability of Blockchain Technologies to Quantum Attacks - Here authors analyze the major blockchain-based cryptocurrencies deployed today -- including Bitcoin, Ethereum, Litecoin and ZCash, and determine risk exposure to quantum attacks.
- BLOCKEYE - Hunting For DeFi Attacks on Blockchain. In this paper, authors proposed BLOCKEYE, a real-time attack detection system for DeFi projects on the Ethereum blockchain.
- Topological Anomaly Detection in Dynamic Multilayer Blockchain Networks - Authors introduce a new topological perspective to structural anomaly detection in dynamic multilayer networks.
- Ponzi Scheme Detection in Ethereum Transaction Network - Authors discover new ways of detecting Ethereum-based Ponzi schemes.
- Verification of the Incremental Merkle Tree Algorithm with Dafny - Authors present our new and original correctness proof of the algorithm along with the Dafny machine-checkable version.
- GoHammer Blockchain Performance Test Tool - This tool will help in developing more efficient decentralized systems and will affect decreasing the costs of developing decentralized application projects.
- Requirement Analyses and Evaluations of Blockchain Platforms per Possible Use Cases - This document provides a generic model of understanding blockchain and its applications.
- A Note on Privacy in Constant Function Market Makers - In this note, authors show that privacy is impossible with the usual implementations of CFMMs under most reasonable models of an adversary and provide some mitigating strategies.
- A Survey of Security Vulnerabilities in Ethereum Smart Contracts - This paper explains eight vulnerabilities that are specific to the application level of BT by analyzing the exploitation case scenarios of these vulnerabilities.
- Low-cost attacks on Ethereum 2.0 by sub-1/3 stakeholders - Authors outline two dishonest strategies that can be cheaply executed on the Ethereum 2.0 beacon chain, even by validators holding less than one-third of the total stake: malicious chain reorganizations ("reorgs") and finality delays.
- AGSolT: a Tool for Automated Test-Case Generation for Solidity Smart Contracts - Authors found that AGSolT is capable of achieving high branch overage with both approaches and even discovered some errors in some of the most popular Solidity smart contracts on Github.
- Temporal-Amount Snapshot MultiGraph for Ethereum Transaction Tracking - Authors propose TASMG to model Ethereum transaction records as a temporal-amount network and then present TAW to effectively embed accounts via their transaction records, which integrates temporal and amount information of the proposed network.
- Smart Contract Vulnerability Detection: From Pure Neural Network to Interpretable Graph Feature and Expert Pattern Fusion - Understanding smart contracts scan tools.
- Ethereum Name Service: the Good, the Bad, and the Ugly - Yet, no existing work has studied this emerging system, the security issues and misbehaviors in ENS. Authors present the first study of ENS by analyzing millions of event logs related to ENS.
- The Anatomy of a Cryptocurrency Pump-and-Dump Scheme - This paper represents the first detailed empirical query of pump-and-dump activities in cryptocurrency markets.
- Distinguishing manipulated stocks via trading network analysis - These findings may help to detect manipulated stocks. Distinguishing manipulated stocks via trading network analysis.
- From Innovations to Prospects: What Is Hidden Behind Cryptocurrencies? - In this paper, an empirical study on existing altcoins is carried out to offer a thorough understanding of various aspects associated with altcoin innovations.
- Demystifying Cryptocurrency Mining Attacks: A Semi-supervised Learning Approach Based on Digital Forensics and Dynamic Network Characteristics - This paper addresses the detection of crypto mining attacks in a generic network environment using dynamic network characteristics.
- FASTEN: Fair and Secure Distributed Voting Using Smart Contracts - Authors prove that the probability of privacy breaches is negligibly small. Further, cost analysis of executing FASTEN over Ethereum is comparable to most of the existing cost of elections.
- Interdependencies between Mining Costs, Mining Rewards and Blockchain Security - This paper studies to what extent the cost of operating a proof-of-work blockchain is intrinsically linked to the cost of preventing attacks, and to what extent the underlying digital ledger security budgets are correlated with the cryptocurrency market outcomes
- HyperSec: Visual Analytics for blockchain security monitoring - HyperSec, a visual analytics monitoring tool that provides relevant information at a glance to detect ongoing attacks on Hyperledger Fabric.
- Reentrancy Vulnerability Identification in Ethereum Smart Contracts - In this paper, authors present a framework that combines static and dynamic analysis to detect Reentrancy vulnerabilities in Ethereum smart contracts.
- A General Framework for the Security Analysis of Blockchain Protocols - This paper presents a parsimonious abstraction sufficient for capturing and comparing properties of many well-known permissionless blockchain protocols.
- SoK: Blockchain Solutions for Forensics - In this paper, authors provide an overview and classification of the available blockchain-based digital forensic tools, and further describe their main features.
- Coinbugs: Enumerating Common Blockchain Implementation-Level Vulnerabilities - The paper is aimed at security testers aiming to start out in blockchain security reviews and blockchain developers as a reference on common pitfalls.
- Vulnerabilities and Open Issues of Smart Contracts: A Systematic Mapping - This paper conducted a systematic literature mapping identifying initiatives and tools to analyze SCs and how to deal with the identified vulnerabilities.
- SuMo: A Mutation Testing Strategy for Solidity Smart Contracts - Authors report a first evaluation of SuMo on open-source projects for which test suites were available. The results authors got are encouraging, and they suggest that SuMo can effectively help developers to deliver more reliable smart contracts.
- (In)Stability for the Blockchain: Deleveraging Spirals and Stablecoin Attacks - The possibility of deleveraging spirals was first predicted in the initial release of this paper in 2019 and later observed in the Black Thursday crisis in Dai in 2020.
- An Anonymous Trust-Marking Scheme on Blockchain Systems - In this paper, authors propose an anonymous trust-marking scheme on blockchain systems that is universally applicable to any cryptocurrency.
- A Framework and DataSet for Bugs in Ethereum Smart Contracts - In this paper, to fill the gap, authors first collect as many smart contract bugs as possible from multiple sources and divide these bugs into 9 categories by extending the IEEE Standard Classification for Software Anomalies.
- A Secure Multi-chains Consensus Scheme Against Diverse Miners Behaviors Attacks in Blockchain Networks. - Experimental results show that PoDT is secure against DMB attacks and more effective than traditional consensus schemes in multi-chains environments.
- A Survey on Consortium Blockchain Consensus Mechanisms - This paper highlights several state-of-the art solutions in consensus algorithms for enterprise blockchain.
- Extracting Smart Contracts Tested and Verified in Coq - Authors implement extraction of Coq programs to functional languages based on MetaCoq's certified erasure.
- Trustless, privacy-preserving blockchain bridges - In this paper, authors present a protocol for facilitating trust-less cross-chain cryptocurrency transfers that preserve privacy of bridge withdrawals.
- Measuring Financial Advice: aligning client elicited and revealed risk - This paper compares client Know Your Client (KYC) profile risk allocations to their investment portfolio risk selections using a value-at-risk discrepancy methodology.
- Security checklists for Ethereum smart contract development: patterns and best practices - Authors cover the phases of design, coding, and testing and deployment of the software lifecycle.
- Dynamic Vulnerability Detection on Smart Contracts Using Machine Learning - In this work authors propose Dynamit, a monitoring framework to detect reentrancy vulnerabilities in Ethereum smart contracts.
- Detecting Malicious Accounts showing Adversarial Behavior in Permissionless Blockchains - Authors identify that Neural Networks (NN) holds up the best in the face of such bias inducing dataset at the same time being robust against certain adversarial attacks.
- Targeting the Weakest Link: Social Engineering Attacks in Ethereum Smart Contracts - In this work, authors explore the possibility and existence of new social engineering attacks beyond smart contract honeypots.
- OptSmart: A Space Efficient Optimistic Concurrent Execution of Smart Contracts - In this paper, authors develop a concurrent miner that proposes a block by executing the AUs concurrently using optimistic Software Transactional Memory systems (STMs).
- The Doge of Wall Street: Analysis and Detection of Pump and Dump Cryptocurrency Manipulations - Authors monitored crypto chats for more than 3 years detecting and analysing around 900 individual events. Then, authors move on to the crowd pump, a new phenomenon that hit the news in the first months of 2021, when a Reddit community inflates the price of the GameStop stocks (GME) and XRP with Dogecoin.
- DEFECTCHECKER: Automated Smart Contract Defect Detection by Analyzing EVM Bytecode - Experimental results show that DefectChecker performs much better than these tools in terms of both speed and accuracy.
- SmartBugs: A Framework to Analyze Solidity Smart Contracts - Authors show how it enables easy integration and comparison of analysis tools by presenting a new extension to the tool SmartCheck that improves substantially the detection of vulnerabilities related to the DASP10 categories Bad Randomness, Time Manipulation, and Access Control (identified vulnerabilities increased from 11% to 24%).
- Profiling Gas Leaks in Solidity Smart Contracts - In this paper, authors identify a set of 19 Solidity code smells affecting the deployment and transaction costs of a smart contract, and assess the relevance of such smells through a survey involving 34 participants.
- Securing Parallel-chain Protocols under Variable Mining Power - In this paper, authors consider the design of provably secure parallel-chain protocols which can adapt to such mining power variations.
- Blockchain in Cyberdefence: A Technology Review from a Swiss Perspective - Review is targeted to readers with little prior domain knowledge as a support to decide where it makes sense to use a blockchain and where a blockchain might not be the right tool at hand.
- Ethereum SmartContract Vulnerability Detection using Deep Neural Network and Transfer Learning - ESCORT framework enables transfer learning on new vulnerability types with minimal modification of the DNN model architecture and re-training overhead.
- Detecting and Quantifying Wash Trading on Decentralized Cryptocurrency Exchanges - In this paper, authors illustrate how wash trading activity can be identified on two of the first limit order book-based exchanges on the Ethereum blockchain.
- SCSGuard: Deep Scam Detection for Ethereum Smart Contracts - Experimental results manifest that SCSGuard achieves high accuracy (0.94), precision (0.96\%) and recall (0.98) for both Ponzi and Honeypot scams, and new Phishing smart contracts.
- Securing Cyber-Physical Systems Through Blockchain-Based Digital Twins and Threat Intelligence - This article focuses on securing CPSs by integrating Artificial Intelligence (AI) and blockchain for intelligent and trusted DTs.
- Vyper: A Security Comparison with Solidity Based on Common Vulnerabilities - This article focuses on well-known and commonly-encountered vulnerabilities in Solidity feature in Vyper’s development environment.
- The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts - Investigation shows that the number of attacks did not necessarily decrease over the past few years, but for some vulnerabilities remained constant.
- A chronological and (hopefully) complete list of reentrancy attacks to date.
- Analysis of Bitcoin Vulnerability to Bribery Attacks Launched Through Large Transactions - In this paper, authors design a novel bribery attack and show that this guarantee can be hugely undermined.
- Vulnerability of Blockchain Technologies to Quantum Attacks - Here authors analyze the major blockchain-based cryptocurrencies deployed today -- including Bitcoin, Ethereum, Litecoin and ZCash, and determine risk exposure to quantum attacks.
- BLOCKEYE - Hunting For DeFi Attacks on Blockchain. In this paper, authors proposed BLOCKEYE, a real-time attack detection system for DeFi projects on the Ethereum blockchain.
- Topological Anomaly Detection in Dynamic Multilayer Blockchain Networks - Authors introduce a new topological perspective to structural anomaly detection in dynamic multilayer networks.
- Verification of the Incremental Merkle Tree Algorithm with Dafny - Authors present our new and original correctness proof of the algorithm along with the Dafny machine-checkable version.
- GoHammer Blockchain Performance Test Tool - This tool will help in developing more efficient decentralized systems and will affect decreasing the costs of developing decentralized application projects.
- Requirement Analyses and Evaluations of Blockchain Platforms per Possible Use Cases - This document provides a generic model of understanding blockchain and its applications.
- A Note on Privacy in Constant Function Market Makers - In this note, authors show that privacy is impossible with the usual implementations of CFMMs under most reasonable models of an adversary and provide some mitigating strategies.
- A Survey of Security Vulnerabilities in Ethereum Smart Contracts - This paper explains eight vulnerabilities that are specific to the application level of BT by analyzing the exploitation case scenarios of these vulnerabilities.
- AGSolT: a Tool for Automated Test-Case Generation for Solidity Smart Contracts - Authors found that AGSolT is capable of achieving high branch overage with both approaches and even discovered some errors in some of the most popular Solidity smart contracts on Github.
- Temporal-Amount Snapshot MultiGraph for Ethereum Transaction Tracking - Authors propose TASMG to model Ethereum transaction records as a temporal-amount network and then present TAW to effectively embed accounts via their transaction records, which integrates temporal and amount information of the proposed network.
- Ethereum Name Service: the Good, the Bad, and the Ugly - Yet, no existing work has studied this emerging system, the security issues and misbehaviors in ENS. Authors present the first study of ENS by analyzing millions of event logs related to ENS.
- Demystifying Cryptocurrency Mining Attacks: A Semi-supervised Learning Approach Based on Digital Forensics and Dynamic Network Characteristics - This paper addresses the detection of crypto mining attacks in a generic network environment using dynamic network characteristics.
- FASTEN: Fair and Secure Distributed Voting Using Smart Contracts - Authors prove that the probability of privacy breaches is negligibly small. Further, cost analysis of executing FASTEN over Ethereum is comparable to most of the existing cost of elections.
- Interdependencies between Mining Costs, Mining Rewards and Blockchain Security - This paper studies to what extent the cost of operating a proof-of-work blockchain is intrinsically linked to the cost of preventing attacks, and to what extent the underlying digital ledger security budgets are correlated with the cryptocurrency market outcomes
- HyperSec: Visual Analytics for blockchain security monitoring - HyperSec, a visual analytics monitoring tool that provides relevant information at a glance to detect ongoing attacks on Hyperledger Fabric.
- Reentrancy Vulnerability Identification in Ethereum Smart Contracts - In this paper, authors present a framework that combines static and dynamic analysis to detect Reentrancy vulnerabilities in Ethereum smart contracts.
- A General Framework for the Security Analysis of Blockchain Protocols - This paper presents a parsimonious abstraction sufficient for capturing and comparing properties of many well-known permissionless blockchain protocols.
- Coinbugs: Enumerating Common Blockchain Implementation-Level Vulnerabilities - The paper is aimed at security testers aiming to start out in blockchain security reviews and blockchain developers as a reference on common pitfalls.
- Vulnerabilities and Open Issues of Smart Contracts: A Systematic Mapping - This paper conducted a systematic literature mapping identifying initiatives and tools to analyze SCs and how to deal with the identified vulnerabilities.
- SuMo: A Mutation Testing Strategy for Solidity Smart Contracts - Authors report a first evaluation of SuMo on open-source projects for which test suites were available. The results authors got are encouraging, and they suggest that SuMo can effectively help developers to deliver more reliable smart contracts.
- (In)Stability for the Blockchain: Deleveraging Spirals and Stablecoin Attacks - The possibility of deleveraging spirals was first predicted in the initial release of this paper in 2019 and later observed in the Black Thursday crisis in Dai in 2020.
- An Anonymous Trust-Marking Scheme on Blockchain Systems - In this paper, authors propose an anonymous trust-marking scheme on blockchain systems that is universally applicable to any cryptocurrency.
- A Framework and DataSet for Bugs in Ethereum Smart Contracts - In this paper, to fill the gap, authors first collect as many smart contract bugs as possible from multiple sources and divide these bugs into 9 categories by extending the IEEE Standard Classification for Software Anomalies.
- A Secure Multi-chains Consensus Scheme Against Diverse Miners Behaviors Attacks in Blockchain Networks. - Experimental results show that PoDT is secure against DMB attacks and more effective than traditional consensus schemes in multi-chains environments.
- A Survey on Consortium Blockchain Consensus Mechanisms - This paper highlights several state-of-the art solutions in consensus algorithms for enterprise blockchain.
- Extracting Smart Contracts Tested and Verified in Coq - Authors implement extraction of Coq programs to functional languages based on MetaCoq's certified erasure.
- Trustless, privacy-preserving blockchain bridges - In this paper, authors present a protocol for facilitating trust-less cross-chain cryptocurrency transfers that preserve privacy of bridge withdrawals.
- Security checklists for Ethereum smart contract development: patterns and best practices - Authors cover the phases of design, coding, and testing and deployment of the software lifecycle.
- Dynamic Vulnerability Detection on Smart Contracts Using Machine Learning - In this work authors propose Dynamit, a monitoring framework to detect reentrancy vulnerabilities in Ethereum smart contracts.
- Targeting the Weakest Link: Social Engineering Attacks in Ethereum Smart Contracts - In this work, authors explore the possibility and existence of new social engineering attacks beyond smart contract honeypots.
- OptSmart: A Space Efficient Optimistic Concurrent Execution of Smart Contracts - In this paper, authors develop a concurrent miner that proposes a block by executing the AUs concurrently using optimistic Software Transactional Memory systems (STMs).
- DEFECTCHECKER: Automated Smart Contract Defect Detection by Analyzing EVM Bytecode - Experimental results show that DefectChecker performs much better than these tools in terms of both speed and accuracy.
- SmartBugs: A Framework to Analyze Solidity Smart Contracts - Authors show how it enables easy integration and comparison of analysis tools by presenting a new extension to the tool SmartCheck that improves substantially the detection of vulnerabilities related to the DASP10 categories Bad Randomness, Time Manipulation, and Access Control (identified vulnerabilities increased from 11% to 24%).
- Profiling Gas Leaks in Solidity Smart Contracts - In this paper, authors identify a set of 19 Solidity code smells affecting the deployment and transaction costs of a smart contract, and assess the relevance of such smells through a survey involving 34 participants.
- Securing Parallel-chain Protocols under Variable Mining Power - In this paper, authors consider the design of provably secure parallel-chain protocols which can adapt to such mining power variations.
- Ethereum SmartContract Vulnerability Detection using Deep Neural Network and Transfer Learning - ESCORT framework enables transfer learning on new vulnerability types with minimal modification of the DNN model architecture and re-training overhead.
- SCSGuard: Deep Scam Detection for Ethereum Smart Contracts - Experimental results manifest that SCSGuard achieves high accuracy (0.94), precision (0.96\%) and recall (0.98) for both Ponzi and Honeypot scams, and new Phishing smart contracts.
- Securing Cyber-Physical Systems Through Blockchain-Based Digital Twins and Threat Intelligence - This article focuses on securing CPSs by integrating Artificial Intelligence (AI) and blockchain for intelligent and trusted DTs.
- Vyper: A Security Comparison with Solidity Based on Common Vulnerabilities - This article focuses on well-known and commonly-encountered vulnerabilities in Solidity feature in Vyper’s development environment.
- EtherClue: Digital investigation of attacks on Ethereum smart contracts - In this work, authors study the problem of post-factum investigation of Ethereum attacks using Indicators of Compromise specially crafted for use in the blockchain.
- Ponzi Scheme Detection in Ethereum Transaction Network - Authors discover new ways of detecting Ethereum-based Ponzi schemes.
- EtherClue: Digital investigation of attacks on Ethereum smart contracts - In this work, authors study the problem of post-factum investigation of Ethereum attacks using Indicators of Compromise specially crafted for use in the blockchain.
- Low-cost attacks on Ethereum 2.0 by sub-1/3 stakeholders - Authors outline two dishonest strategies that can be cheaply executed on the Ethereum 2.0 beacon chain, even by validators holding less than one-third of the total stake: malicious chain reorganizations ("reorgs") and finality delays.
- The Anatomy of a Cryptocurrency Pump-and-Dump Scheme - This paper represents the first detailed empirical query of pump-and-dump activities in cryptocurrency markets.
- Distinguishing manipulated stocks via trading network analysis - These findings may help to detect manipulated stocks. Distinguishing manipulated stocks via trading network analysis.
- From Innovations to Prospects: What Is Hidden Behind Cryptocurrencies? - In this paper, an empirical study on existing altcoins is carried out to offer a thorough understanding of various aspects associated with altcoin innovations.
- SoK: Blockchain Solutions for Forensics - In this paper, authors provide an overview and classification of the available blockchain-based digital forensic tools, and further describe their main features.
- Measuring Financial Advice: aligning client elicited and revealed risk - This paper compares client Know Your Client (KYC) profile risk allocations to their investment portfolio risk selections using a value-at-risk discrepancy methodology.
- Detecting Malicious Accounts showing Adversarial Behavior in Permissionless Blockchains - Authors identify that Neural Networks (NN) holds up the best in the face of such bias inducing dataset at the same time being robust against certain adversarial attacks.
- The Doge of Wall Street: Analysis and Detection of Pump and Dump Cryptocurrency Manipulations - Authors monitored crypto chats for more than 3 years detecting and analysing around 900 individual events. Then, authors move on to the crowd pump, a new phenomenon that hit the news in the first months of 2021, when a Reddit community inflates the price of the GameStop stocks (GME) and XRP with Dogecoin.
- Blockchain in Cyberdefence: A Technology Review from a Swiss Perspective - Review is targeted to readers with little prior domain knowledge as a support to decide where it makes sense to use a blockchain and where a blockchain might not be the right tool at hand.
- Detecting and Quantifying Wash Trading on Decentralized Cryptocurrency Exchanges - In this paper, authors illustrate how wash trading activity can be identified on two of the first limit order book-based exchanges on the Ethereum blockchain.
- An approach to detect Denial of Service Vulnerability in Ethereum Smart Contracts - In this paper, authors propose a framework that combines static and dynamic analysis to detect DoS due to an unexpected revert in ETH Smart Contracts.
- An approach to detect Denial of Service Vulnerability in Ethereum Smart Contracts - In this paper, authors propose a framework that combines static and dynamic analysis to detect DoS due to an unexpected revert in ETH Smart Contracts.
-
Non-Fungible Token (NFT):
- Mapping the NFT revolution - Market trends, trade networks and visual features.
- The Economics of Blockchain-Based Virtual Worlds: A Hedonic Regression Model for Virtual Land - Empirical analysis of land prices in Decentraland.
- Mapping the NFT revolution - Market trends, trade networks and visual features.
- Fairness in ERC token markets - A Case Study of CryptoKitties.
- Non-Fungible Token: Overview, Evaluation, Opportunities and Challenges - In this technical report, authors explore the NFT ecosystems in several aspects.
- Networks of Ethereum Non-Fungible Tokens: A graph-based analysis of the ERC-721 ecosystem - This paper presents the first systematic study of the interactions occurring in a number of NFT ecosystems.
- Fairness in ERC token markets - A Case Study of CryptoKitties.
- Non-Fungible Token: Overview, Evaluation, Opportunities and Challenges - In this technical report, authors explore the NFT ecosystems in several aspects.
- Networks of Ethereum Non-Fungible Tokens: A graph-based analysis of the ERC-721 ecosystem - This paper presents the first systematic study of the interactions occurring in a number of NFT ecosystems.
-
Stable-Coins:
- Understand Volatility of Algorithmic Stablecoin: Modeling, Verification and Empirical Analysis - Authors performed a systematic empirical analysis on real transaction activities of the Basis Cash stablecoin to relate theoretical possibilities to market observations.
- T-Cash: Transferable Fiat Backed Coins - In this paper authors propose a transferable electronic cash scheme using blockchain technology which allows users to continuously reuse coins within the system.
- Stablecoins 2.0 - Authors seek to provide a sound foundation for stablecoin theory, with a risk-based functional characterization of the economic structure of stablecoins.
- Stablecoins 2.0 - Authors seek to provide a sound foundation for stablecoin theory, with a risk-based functional characterization of the economic structure of stablecoins.
- Reducing the Volatility of Cryptocurrencies — A Survey of Stablecoins - Authors discuss how stablecoins help reduce the volatility of cryptocurrencies by surveying different types of stablecoins and their stability mechanisms.
- Understand Volatility of Algorithmic Stablecoin: Modeling, Verification and Empirical Analysis - Authors performed a systematic empirical analysis on real transaction activities of the Basis Cash stablecoin to relate theoretical possibilities to market observations.
- T-Cash: Transferable Fiat Backed Coins - In this paper authors propose a transferable electronic cash scheme using blockchain technology which allows users to continuously reuse coins within the system.
- EVO Protocol: a Volumetric time based stabilizing pool to make any asset price-stable - Author demonstrates a
- Reducing the Volatility of Cryptocurrencies — A Survey of Stablecoins - Authors discuss how stablecoins help reduce the volatility of cryptocurrencies by surveying different types of stablecoins and their stability mechanisms.
-
MEV - Maximal Extractable Value:
- Quantifying Blockchain Extractable Value: How dark is the forest? - Authors provide evidence that miners already extract Miner Extractable Value (MEV), which could destabilize the blockchain consensus security, as related work has shown.
- Flash Boys 2.0: Frontrunning, Transaction Reordering, and Consensus Instability in Decentralized Exchanges - Introduces the concept of MEV, the work highlights the large, complex risks created by transaction-ordering dependencies in smart contracts and the ways in which traditional forms of financial-market exploitation are adapting to and penetrating blockchain economies.
- Flashbots: MEV in Eth2 - In this post, authors study transaction ordering in eth2 and analyze MEV-enabled staking yields. Then they find that MEV will significantly boost validator rewards but may reinforce inequalities among participants of eth2. Authors also discuss qualitative aspects of MEV in eth2 such as the potential dynamics that will unfold between its largest stakeholders like exchanges and validator pools.
- A Survey on Blockchain Interoperability: Past, Present, and Future Trends - In this post, authors study blockchain interoperability techniques and solutions, providing a holistic overview of blockchain interoperability, paving the way for systematic research in this domain.
- Flash Boys 2.0: Frontrunning, Transaction Reordering, and Consensus Instability in Decentralized Exchanges - Introduces the concept of MEV, the work highlights the large, complex risks created by transaction-ordering dependencies in smart contracts and the ways in which traditional forms of financial-market exploitation are adapting to and penetrating blockchain economies.
- Quantifying Blockchain Extractable Value: How dark is the forest? - Authors provide evidence that miners already extract Miner Extractable Value (MEV), which could destabilize the blockchain consensus security, as related work has shown.
-
Favourites:
-
Developer Tools
- MythX - Security verification platform and tools ecosystem for Ethereum developers
- Securify - Security scanner for Ethereum smart contracts
- SmartCheck - Static smart contract security analyzer
- Piet - A visual Solidity architecture analyzer
- Dappy - A no-DNS web browser and name system powered by the blockchain. - added by [Fabcotech](https://github.com/fabcotech)
- Source
- CryptoFin Solidity Auditing Checklist - A checklist of common findings, and issues to watch out for when auditing a contract for a mainnet launch.
- Mythril - Open-source EVM bytecode security analysis tool
- Ethersplay - EVM disassembler
- Evmdis - Alternative EVM disassembler
- Hydra - Framework for cryptoeconomic contract security, decentralised security bounties
- Solgraph - Visualise Solidity control flow for smart contract security analysis
- Manticore - Symbolic execution tool on Smart Contracts and Binaries
- Slither - A Solidity static analysis framework
- Adelaide - The SECBIT static analysis extension to Solidity compiler
- Solidity security blog - Comprehensive list of known attack vectors and common anti-patterns
- Awesome Buggy ERC20 Tokens - A Collection of Vulnerabilities in ERC20 Smart Contracts With Tokens Affected
- Ethereum-datafarm - Easy-to-use console app for parsing historical event data without requiring an archive node, using the Etherscan API.
- Oyente - Alternative static smart contract security analysis
- solc-verify - A modular verifier for Solidity smart contracts
-
Discussion:
-
Ethereum Tools
-
Ethereum 2.0
-
Support Me:
-
Moved here: [Link](https://github.com/OffcierCia/On-Chain-Investigations-Tools-List/blob/main/README.md)
- 17Ydx9m7vrhnx4XjZPuGPMqrhw3sDviNTU - BTC
- Mirror articles NFTs
- Check out my Telegram Channel
- Follow my Twitter
- 0xB25C5E8fA1E53eEb9bE3421C59F6A66B786ED77A - search?search=officercia.eth)
- All my Socials
-
-
DeFi Science:
- www.arxiv-vanity.com - 04-19)!
- DeFi-ning DeFi: Challenges & Pathway - Good Retrospective into the beginning of decentralized finance.
- A theory of Automated Market Makers in DeFi - Authors exploit our theory to formally prove a set of fundamental properties of AMMs, characterizing both structural and economic aspects.
- Leveraged Trading on Blockchain Technology - Authors document an ongoing research process towards the implementation and integration of a digital artefact, executing the lifecycle of a leveraged trade with permissionless blockchain.
- From banks to DeFi: the evolution of the lending market - Authors discuss the persisting reliance of DeFi lending on the traditional financial system, and conclude with the outlook of the lending market in the IOV era.
- Towards Self-Regulating AI - Challenges and Opportunities of AI Model Governance in Financial Services.
- On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols - In this paper, authors investigate two methods that allow them to automatically create profitable DeFi trades.
- Maximizing Extractable Value from Automated Market Makers - In this paper authors formally characterize rational miners as players which follow an optimal strategy in the mining game.
- The Decentralized Financial Crisis - In this paper authors explore how design weaknesses and price fluctuations in DeFi protocols could lead to a DeFi crisis.
- Liquidations: DeFi on a Knife-edge - In order to protect protocols from suffering losses, undercollateralized positions can be liquidated. In this paper, authors present empirical analysis of liquidations on protocols for loanable funds (PLFs).
- Measuring Asset Composability as a Proxy for DeFi Integration - Authors seek to understand the degree to which this practice may contribute to financial integration on Ethereum by examining transactions in 'composed' derivatives for the assets DAI, USDC, USDT, ETH and tokenized BTC for the full set of 344.8 million Ethereum transactions computed in 2020.
- Dynamic Curves for Decentralized Autonomous Cryptocurrency Exchanges - Authors propose in this work a new approach to constructing the AMM by proposing the idea of dynamic curves.
- High-Frequency Trading on Decentralized On-Chain Exchanges - In this work authors formalize, analytically exposit and empirically evaluate an augmented variant of front-running: sandwich attacks, which involve front- and back-running victim TXs.
- Flashot - A Snapshot of Flash Loan Attack on DeFi Ecosystem.
- DeFiRanger - Detecting Price Manipulation Attacks on DeFi Applications.
- Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit - Flash Loans. DeFi. Classic.
- Empirical Evidence from four Governance Token Distributions - This paper provides a framework to quantify decentralization of governance power among blockchain applications.
- The Adoption of Blockchain-based Decentralized Exchanges - Authors show that liquidity providers lose token value if exchange rates are volatile due to the order execution mechanism of the blockchain-based exchange.
- An analysis of Uniswap markets - One of the best studies on Uniswap DEX activity, authors started researching in 2019 and recently released fresh 2021 analysis.
- Finance 4.0: Design principles for a value-sensitive cryptoecnomic system to address sustainability - Authors provide new insights on designing crypto systems.
- Behavior of Liquidity Providers in Decentralized Exchanges - Authors aim to understand how liquidity providers react to market information and how they benefit from providing liquidity in DEX.
- Cyclic Arbitrage in Decentralized Exchange Markets - Good Read. This paper suggests that with the smart contract technology and the replicated state machine setting of Ethereum, arbitrage strategies are easier implemented in DEXes than in CEX.
- SoK: Oracles from the Ground Truth to Market Manipulation - In this SoK, authors systemize the design alternatives for oracles, showcase attacks, and discuss attack mitigation strategies.
- Composing Networks of Automated Market Makers - This paper proposes a mathematical model for AMM composition.
- Constant Function Market Makers: Multi-Asset Trades via Convex Optimization - A very pedagogical overview of CFMMs and their properties through mathematical modelization from first principles.
- Formal Analysis of Composable DeFi Protocols - In this paper, authors propose a formal process-algebraic technique that models DeFi protocols in a compositional manner to allow for efficient property verification.
- DeFi-ning DeFi: Challenges & Pathway - Good Retrospective into the beginning of decentralized finance.
- A theory of Automated Market Makers in DeFi - Authors exploit our theory to formally prove a set of fundamental properties of AMMs, characterizing both structural and economic aspects.
- From banks to DeFi: the evolution of the lending market - Authors discuss the persisting reliance of DeFi lending on the traditional financial system, and conclude with the outlook of the lending market in the IOV era.
- On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols - In this paper, authors investigate two methods that allow them to automatically create profitable DeFi trades.
- Maximizing Extractable Value from Automated Market Makers - In this paper authors formally characterize rational miners as players which follow an optimal strategy in the mining game.
- The Decentralized Financial Crisis - In this paper authors explore how design weaknesses and price fluctuations in DeFi protocols could lead to a DeFi crisis.
- Liquidations: DeFi on a Knife-edge - In order to protect protocols from suffering losses, undercollateralized positions can be liquidated. In this paper, authors present empirical analysis of liquidations on protocols for loanable funds (PLFs).
- Measuring Asset Composability as a Proxy for DeFi Integration - Authors seek to understand the degree to which this practice may contribute to financial integration on Ethereum by examining transactions in 'composed' derivatives for the assets DAI, USDC, USDT, ETH and tokenized BTC for the full set of 344.8 million Ethereum transactions computed in 2020.
- Dynamic Curves for Decentralized Autonomous Cryptocurrency Exchanges - Authors propose in this work a new approach to constructing the AMM by proposing the idea of dynamic curves.
- High-Frequency Trading on Decentralized On-Chain Exchanges - In this work authors formalize, analytically exposit and empirically evaluate an augmented variant of front-running: sandwich attacks, which involve front- and back-running victim TXs.
- Flashot - A Snapshot of Flash Loan Attack on DeFi Ecosystem.
- DeFiRanger - Detecting Price Manipulation Attacks on DeFi Applications.
- Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit - Flash Loans. DeFi. Classic.
- SoK: Decentralized Finance (DeFi) - In this Systematization of Knowledge (SoK), authors delineate the DeFi ecosystem along its principal axes. SCSGuard: Deep Scam Detection for Ethereum Smart Contracts
- Empirical Evidence from four Governance Token Distributions - This paper provides a framework to quantify decentralization of governance power among blockchain applications.
- The Adoption of Blockchain-based Decentralized Exchanges - Authors show that liquidity providers lose token value if exchange rates are volatile due to the order execution mechanism of the blockchain-based exchange.
- Finance 4.0: Design principles for a value-sensitive cryptoecnomic system to address sustainability - Authors provide new insights on designing crypto systems.
- SoK: Oracles from the Ground Truth to Market Manipulation - In this SoK, authors systemize the design alternatives for oracles, showcase attacks, and discuss attack mitigation strategies.
- Formal Analysis of Composable DeFi Protocols - In this paper, authors propose a formal process-algebraic technique that models DeFi protocols in a compositional manner to allow for efficient property verification.
- SoK: Decentralized Finance (DeFi) - In this Systematization of Knowledge (SoK), authors delineate the DeFi ecosystem along its principal axes. SCSGuard: Deep Scam Detection for Ethereum Smart Contracts
- Leveraged Trading on Blockchain Technology - Authors document an ongoing research process towards the implementation and integration of a digital artefact, executing the lifecycle of a leveraged trade with permissionless blockchain.
- Composing Networks of Automated Market Makers - This paper proposes a mathematical model for AMM composition.
- Constant Function Market Makers: Multi-Asset Trades via Convex Optimization - A very pedagogical overview of CFMMs and their properties through mathematical modelization from first principles.
- Towards Self-Regulating AI - Challenges and Opportunities of AI Model Governance in Financial Services.
- An analysis of Uniswap markets - One of the best studies on Uniswap DEX activity, authors started researching in 2019 and recently released fresh 2021 analysis.
- Behavior of Liquidity Providers in Decentralized Exchanges - Authors aim to understand how liquidity providers react to market information and how they benefit from providing liquidity in DEX.
- Cyclic Arbitrage in Decentralized Exchange Markets - Good Read. This paper suggests that with the smart contract technology and the replicated state machine setting of Ethereum, arbitrage strategies are easier implemented in DEXes than in CEX.
-
Uncategorized
-
Uncategorized
- My Blog on Mirror
- Cryptsecurity Studies
- Awesome Article
- Follow ArxivAbs
- Follow Arxiv
- Follow fin_tech
- Sov's Compendium
- Awesome Blogs
- Repository of 500 web3 reports
- How to Become a 1000 Year Old Vampire
- How to know when to stop
- What is SoK
- smartcontractresearch.org
- Library of Ethereum
- blockchain science - rust edition
- Crypto Research Papers
- Compendium
- Academic_Smart_Contract_Papers
- Retrospective: Hacks in Web3
- Retrospective: Hacks in Web3
- Retrospective: Hacks in Web3
- Retrospective: Hacks in Web3
- Retrospective: Hacks in Web3
- Retrospective: Hacks in Web3
- ethereum-magicians.org
- Retrospective: Hacks in Web3
- Retrospective: Hacks in Web3
- Retrospective: Hacks in Web3
- How to Become a 1000 Year Old Vampire
-
Programming Languages
Categories
General information:
135
Security & Safety:
112
DeFi Science:
53
Hack Incident Reporting
38
Uncategorized
29
Developer Tools
20
NFTs
15
[Transaction Visualization, Scoring & Tracking:](https://github.com/OffcierCia/On-Chain-Investigations-Tools-List/blob/main/README.md)
15
Non-Fungible Token (NFT):
9
Stable-Coins:
9
Ethereum 2.0
8
Favourites:
7
Support Me:
6
MEV - Maximal Extractable Value:
6
Ethereum Tools
5
Blockchain Governance:
5
Discussion:
5
Sub Categories
Keywords
ethereum
16
solidity
10
security
7
blockchain
6
smart-contracts
4
evm
3
erc20
3
static-analysis
3
program-analysis
2
symbolic-execution
2
bitcoin
2
trading
2
tokens
2
vyper
2
mev
2
defi
2
awesome-list
2
derivatives-pricing
1
derivatives
1
erc721
1
cryptocurrency
1
cryptocoins
1
commodities
1
finance
1
trading-bot
1
futures
1
statistical-arbitrage
1
searcher
1
rust
1
mempool
1
machine-learning
1
dexes
1
dex
1
decoder
1
cypherpunk
1
cex
1
boilerplate
1
arbitrage-bot
1
zkp
1
layer2
1
cryptography
1
cairo
1
binary-analysis
1
emulation
1
python
1
smt
1
testing
1
z3
1
compiler
1
awesome
1