• Publications
  • Influence
KEVM: A Complete Formal Semantics of the Ethereum Virtual Machine
TLDR
We present KEVM, an executable formal specification of the EVM's bytecode stack-based language built with the K Framework, designed to serve as a solid foundation for further formal analyses. Expand
  • 141
  • 13
  • PDF
KEVM: A Complete Semantics of the Ethereum Virtual Machine
TLDR
In this work, we present KEVM, the first fully executable formal semantics of the EVM, the bytecode language in which smart contracts are executed. Expand
  • 113
  • 7
Flash Boys 2.0: Frontrunning, Transaction Reordering, and Consensus Instability in Decentralized Exchanges
TLDR
We document and quantify the widespread and rising deployment of arbitrage bots in blockchain systems, specifically in decentralized exchanges (or "DEXes"). Expand
  • 47
  • 4
  • PDF
A formal verification tool for Ethereum VM bytecode
TLDR
We present a formal verification tool for the Ethereum Virtual Machine bytecode that is capable and scalable enough to verify various high-profile, safe-critical smart contracts. Expand
  • 39
  • 3
  • PDF
Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability
TLDR
We document and quantify the widespread and rising deployment of arbitrage bots in blockchain systems, specifically in decentralized exchanges (DEXes). Expand
  • 19
  • 3
Tesseract: Real-Time Cryptocurrency Exchange Using Trusted Hardware
TLDR
We propose Tesseract, a secure real-time cryptocurrency exchange service that achieves a best-of-both-worlds design by using a trusted execution environment. Expand
  • 56
  • 2
  • PDF
Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts
TLDR
We present the Hydra Framework, the first general, principled approach to modeling and administering bug bounties and boosting incentives for hackers to report bugs. Expand
  • 36
  • 2
  • PDF
(Short Paper) PieceWork: Generalized Outsourcing Control for Proofs of Work
TLDR
We introduce PieceWork, a generalized scheme for restructuring standard hashbased PoWs that addresses the two drawbacks of existing PoWs described above. Expand
  • 16
  • 2
  • PDF
A model for Bitcoin’s security and the declining block subsidy
We are grateful to Anthony Towns, Arjun Balaji, Brian Venturo, David Vorick, Joe Kendzicky, Lucas Nuzzi, Matthew Hammond, Nic Carter, Philip Daian, Steve Lee, Su Zhu, Tarun Chitra, and YassineExpand
  • 2
  • 1
  • PDF
RV-Android: Efficient Parametric Android Runtime Verification, a Brief Tutorial
TLDR
RV-Android improves on previous Android monitoring work by replacing the JavaMOP framework with RV-Monitor, a more advanced monitoring library generation tool with core algorithmic improvements. Expand
  • 15
  • PDF