Sok: Decentralized exchanges (dex) with automated market maker (amm) protocols

J Xu, K Paruch, S Cousaert, Y Feng - ACM Computing Surveys, 2023 - dl.acm.org
As an integral part of the decentralized finance (DeFi) ecosystem, decentralized exchanges
(DEXs) with automated market maker (AMM) protocols have gained massive traction with …

A survey on the use of blockchain for future 6G: Technical aspects, use cases, challenges and research directions

A Kalla, C De Alwis, P Porambage, G Gür… - Journal of Industrial …, 2022 - Elsevier
While 5G is at the early deployment state around the globe, the research and industrial
communities have already started concentrating their efforts on formulating the overall 6G …

Sok: Decentralized finance (defi) attacks

L Zhou, X Xiong, J Ernstberger… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Within just four years, the blockchain-based Decentralized Finance (DeFi) ecosystem has
accumulated a peak total value locked (TVL) of more than 253 billion USD. This surge in …

Distributed denial-of-service (DDoS) attacks and defense mechanisms in various web-enabled computing platforms: issues, challenges, and future research directions

A Singh, BB Gupta - International Journal on Semantic Web and …, 2022 - igi-global.com
The demand for Internet security has escalated in the last two decades because the rapid
proliferation in the number of Internet users has presented attackers with new detrimental …

Design choices for central bank digital currency: Policy and technical considerations

S Allen, S Čapkun, I Eyal, G Fanti, BA Ford… - 2020 - nber.org
Central banks around the world are exploring and in some cases even piloting Central Bank
Digital Currencies (CBDCs). CBDCs promise to realize a broad range of new capabilities …

Exploring sybil and double-spending risks in blockchain systems

M Iqbal, R Matulevičius - IEEE Access, 2021 - ieeexplore.ieee.org
The first step to realise the true potential of blockchain systems is to explain the associated
security risks and vulnerabilities. These risks and vulnerabilities, exploited by the threat …

How can incentive mechanisms and blockchain benefit with each other? a survey

R Han, Z Yan, X Liang, LT Yang - ACM Computing Surveys, 2022 - dl.acm.org
In a blockchain-based system, the lack of centralized control requires active participation
and cooperative behaviors of system entities to ensure system security and sustainability …

Survey on blockchain networking: Context, state-of-the-art, challenges

M Dotan, YA Pignolet, S Schmid, S Tochner… - ACM Computing …, 2021 - dl.acm.org
Blockchains, in general, and cryptocurrencies such as Bitcoin, in particular, are realized
using distributed systems and hence critically rely on the performance and security of the …

IoT security challenges: cloud and blockchain, postquantum cryptography, and evolutionary techniques

S Balogh, O Gallo, R Ploszek, P Špaček, P Zajac - Electronics, 2021 - mdpi.com
Internet of Things connects the physical and cybernetic world. As such, security issues of IoT
devices are especially damaging and need to be addressed. In this treatise, we overview …

Speculative {Denial-of-Service} Attacks In Ethereum

A Yaish, K Qin, L Zhou, A Zohar, A Gervais - 33rd USENIX security …, 2024 - usenix.org
Transaction fees compensate actors for resources expended on transactions and can only
be charged from transactions included in blocks. But, the expressiveness of Turing-complete …