• Publications
  • Influence
Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools
TLDR
We explore the trade-off between these strategies with a series of game-theoretical models of competition between two pools of varying sizes. Expand
  • 132
  • 11
  • PDF
A Survey of Interdependent Information Security Games
TLDR
Risks faced by information system operators and users are not only determined by their own security posture, but are also heavily affected by the security-related decisions of others. Expand
  • 96
  • 6
  • PDF
Designing Secure Ethereum Smart Contracts: A Finite State Machine Based Approach
TLDR
The adoption of blockchain-based distributed computation platforms is growing fast. Expand
  • 96
  • 6
  • PDF
Mitigating Covert Compromises - A Game-Theoretic Model of Targeted and Non-Targeted Covert Attacks
TLDR
We study the economically optimal mitigation strategies in the presence of targeted and non-targeted covert attacks in a game-theoretic framework. Expand
  • 27
  • 5
  • PDF
VeriSolid: Correct-by-Design Smart Contracts for Ethereum
TLDR
We introduce the VeriSolid framework for the formal verification of contracts that are specified using a transition-system based model with rigorous operational semantics, which enables the correct-by-design development of smart contracts. Expand
  • 37
  • 4
  • PDF
Optimal Personalized Filtering Against Spear-Phishing Attacks
TLDR
In this paper, we assume that a learned classifier is given and propose strategic per-user filtering thresholds for mitigating spear-phishing attacks. Expand
  • 26
  • 3
  • PDF
Privacy-Preserving Platform for Transactive Energy Systems
TLDR
We describe the implementation of a novel, blockchain-based transactive energy system that operates in grid-connected mode. Expand
  • 19
  • 3
  • PDF
A Survey of Interdependent Security Games Working paper
Interdependence of information systems is a fundamental property that shapes the problems in information security. The risks faced by system operators and users is not only determined by their ownExpand
  • 14
  • 3
  • PDF
On the design of communication and transaction anonymity in blockchain-based transactive microgrids
TLDR
In this paper, we extend a recently developed trading workflow called PETra and describe our solution for communication and transactional anonymity. Expand
  • 19
  • 2
  • PDF
Optimal thresholds for intrusion detection systems
TLDR
In recent years, we have seen a number of successful attacks against high-profile targets, some of which have even caused severe physical damage. Expand
  • 25
  • 2
  • PDF