Sok: Decentralized exchanges (dex) with automated market maker (amm) protocols
As an integral part of the decentralized finance (DeFi) ecosystem, decentralized exchanges
(DEXs) with automated market maker (AMM) protocols have gained massive traction with …
(DEXs) with automated market maker (AMM) protocols have gained massive traction with …
A survey on the use of blockchain for future 6G: Technical aspects, use cases, challenges and research directions
While 5G is at the early deployment state around the globe, the research and industrial
communities have already started concentrating their efforts on formulating the overall 6G …
communities have already started concentrating their efforts on formulating the overall 6G …
Sok: Decentralized finance (defi) attacks
Within just four years, the blockchain-based Decentralized Finance (DeFi) ecosystem has
accumulated a peak total value locked (TVL) of more than 253 billion USD. This surge in …
accumulated a peak total value locked (TVL) of more than 253 billion USD. This surge in …
Distributed denial-of-service (DDoS) attacks and defense mechanisms in various web-enabled computing platforms: issues, challenges, and future research directions
A Singh, BB Gupta - International Journal on Semantic Web and …, 2022 - igi-global.com
The demand for Internet security has escalated in the last two decades because the rapid
proliferation in the number of Internet users has presented attackers with new detrimental …
proliferation in the number of Internet users has presented attackers with new detrimental …
Design choices for central bank digital currency: Policy and technical considerations
Central banks around the world are exploring and in some cases even piloting Central Bank
Digital Currencies (CBDCs). CBDCs promise to realize a broad range of new capabilities …
Digital Currencies (CBDCs). CBDCs promise to realize a broad range of new capabilities …
Exploring sybil and double-spending risks in blockchain systems
M Iqbal, R Matulevičius - IEEE Access, 2021 - ieeexplore.ieee.org
The first step to realise the true potential of blockchain systems is to explain the associated
security risks and vulnerabilities. These risks and vulnerabilities, exploited by the threat …
security risks and vulnerabilities. These risks and vulnerabilities, exploited by the threat …
How can incentive mechanisms and blockchain benefit with each other? a survey
In a blockchain-based system, the lack of centralized control requires active participation
and cooperative behaviors of system entities to ensure system security and sustainability …
and cooperative behaviors of system entities to ensure system security and sustainability …
Survey on blockchain networking: Context, state-of-the-art, challenges
Blockchains, in general, and cryptocurrencies such as Bitcoin, in particular, are realized
using distributed systems and hence critically rely on the performance and security of the …
using distributed systems and hence critically rely on the performance and security of the …
IoT security challenges: cloud and blockchain, postquantum cryptography, and evolutionary techniques
Internet of Things connects the physical and cybernetic world. As such, security issues of IoT
devices are especially damaging and need to be addressed. In this treatise, we overview …
devices are especially damaging and need to be addressed. In this treatise, we overview …
Speculative {Denial-of-Service} Attacks In Ethereum
Transaction fees compensate actors for resources expended on transactions and can only
be charged from transactions included in blocks. But, the expressiveness of Turing-complete …
be charged from transactions included in blocks. But, the expressiveness of Turing-complete …