Share This Author
Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools
- Benjamin Johnson, Aron Laszka, Jens Grossklags, Marie Vasek, T. Moore
- Computer ScienceFinancial Cryptography Workshops
- 3 March 2014
A series of game-theoretical models of competition between two pools of varying sizes find that pools have a greater incentive to attack large pools than small ones, and also observe that larger mining pools have more incentive to attacked than smaller ones.
Designing Secure Ethereum Smart Contracts: A Finite State Machine Based Approach
FSolidM, a framework rooted in rigorous semantics for designing con- tracts as Finite State Machines (FSM), is introduced and a tool for creating FSM on an easy-to-use graphical interface and for automatically generating Ethereum contracts is presented.
VeriSolid: Correct-by-Design Smart Contracts for Ethereum
- A. Mavridou, Aron Laszka, Emmanouela Stachtiari, A. Dubey
- Computer ScienceFinancial Cryptography
- 4 January 2019
The VeriSolid framework for the formal verification of contracts that are specified using a transition-system based model with rigorous operational semantics allows developers to reason about and verify contract behavior at a high level of abstraction.
A Survey of Interdependent Information Security Games
This survey summarizes game-theoretic interdependence models, characterize the emerging security inefficiencies, and present mechanisms to improve the security decisions of the participants.
Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts
The FSolidM framework is created, which allows developers to define contracts as finite state machines (FSMs) with rigorous and clear semantics and provides an easy-to-use graphical editor for specifying FSMs, a code generator for creating Ethereum smart contracts, and a set of plugins that developers may add to their FSMs to enhance security and functionality.
Impact of COVID-19 on Public Transit Accessibility and Ridership
It is found that in Nashville and Chattanooga, TN, fixed-line bus ridership dropped by 66.9% and 65.1% from 2019 baselines before stabilizing at 48.4% and 42.8% declines respectively.
Optimal Personalized Filtering Against Spear-Phishing Attacks
This paper assumes that a learned classifier is given and proposes strategic per-user filtering thresholds for mitigating spear-phishing attacks as a Stackelberg security game, and describes the optimal filtering strategies and shows how to compute them in practice.
Improving Network Connectivity and Robustness Using Trusted Nodes With Application to Resilient Consensus
- W. Abbas, Aron Laszka, X. Koutsoukos
- Computer ScienceIEEE Transactions on Control of Network Systems
- 1 December 2018
This paper extends two fundamental metrics of structural robustness with the notion of trusted nodes, network connectivity, and $r$-robustness, and shows that any desired connectivity and robustness can be achieved without adding extra links.
Mitigating Covert Compromises - A Game-Theoretic Model of Targeted and Non-Targeted Covert Attacks
In a game-theoretic framework, this work studies the economically optimal mitigation strategies in the presence of targeted and non-targeted covert attacks and has practical implications for the definition of security policies, in particular, for password and key renewal schedules.
Optimal thresholds for intrusion detection systems
This paper model this scenario as an attacker-defender security game and study the problem of finding optimal intrusion detection thresholds, which is especially challenging in the case when multiple inter-dependent computer systems have to be defended against a strategic attacker.