• Publications
  • Influence
Exploring the Attack Surface of Blockchain: A Systematic Overview
TLDR
In this paper, we systematically explore the attack surface of the Blockchain technology, with an emphasis on public Blockchains. Expand
  • 41
  • 4
  • PDF
Adaptive Indexing over Encrypted Numeric Data
TLDR
We propose and analyze a scheme for lightweight and indexable encryption, based on linear-algebra operations. Expand
  • 26
  • 4
End-to-End Analysis of In-Browser Cryptojacking
TLDR
In-browser cryptojacking involves hijacking the CPU power of a website visitor to perform CPU-intensive cryptocurrency mining, and has been on the rise, with 8500% growth during 2017. Expand
  • 20
  • 2
  • PDF
Towards Blockchain-Driven, Secure and Transparent Audit Logs
TLDR
We present BlockAudit: a scalable and tamper-proof system that leverages the design properties of audit logs and security guarantees of blockchains to enable secure and trustworthy audit logs. Expand
  • 20
  • 1
  • PDF
Fog Computing and Its Role in the Internet of Things: Concept, Security and Privacy Issues
TLDR
The Internet has evolved in ways that we could never have imagined. Expand
  • 15
  • 1
Dine and Dash: Static, Dynamic, and Economic Analysis of In-Browser Cryptojacking
TLDR
We systematically analyze the static, dynamic, and economic aspects of in-browser cryptojacking through the lenses of characterization, static and dynamic analyses. Expand
  • 3
  • 1
  • PDF
Towards characterizing blockchain-based cryptocurrencies for highly-accurate predictions
TLDR
In 2017, the Blockchain-based crypto currency market witnessed enormous growth. Expand
  • 24
  • PDF
Cyber security in internet of things
Received: 2
  • 9
  • PDF
Countering Selfish Mining in Blockchains
TLDR
In this paper, we introduce a new form of selfish mining attack on blockchains, that guarantees high rewards with low cost. Expand
  • 14
  • PDF