2000 character limit reached
Decentralized Finance (DeFi): A Survey
Published 10 Aug 2023 in cs.CR | (2308.05282v2)
Abstract: Decentralized Finance (DeFi) is a new paradigm in the creation, distribution, and utilization of financial services via the integration of blockchain technology. Our research conducts a comprehensive introduction and meticulous classification of various DeFi applications. Beyond that, we thoroughly analyze these risks from both technical and economic perspectives, spanning multiple layers. We point out research gaps and revenues, covering technical advancements, innovative economics, and sociology and ecology optimization.
- SoK: Decentralized finance (DeFi). In ACM Conference on Advances in Financial Technologies (AFT), pages 30–46, 2022.
- CeFi vs. DeFi–comparing centralized to decentralized finance. arXiv preprint arXiv:2106.08157, 2021.
- Patrick Schueffel. DeFi: Decentralized finance-an introduction and overview. Journal of Innovation Management, 9(3):I–XI, 2021.
- How do smart contracts benefit security protocols? arXiv preprint arXiv:2202.08699, 2022.
- Guangsheng Yu et al. Leveraging architectural approaches in Web3 applications-a DAO perspective focused. In IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pages 1–6. IEEE, 2023.
- Towards understanding flash loan and its applications in DeFi ecosystem. International Workshop on Security in Blockchain and Cloud Computing (SBC@AsiaCCS), 2021.
- Attacking the DeFi ecosystem with flash loans for fun and profit. In International Conference on Financial Cryptography and Data Security (FC), pages 3–32. Springer, 2021.
- SoK: Decentralized finance (DeFi) attacks. IEEE Symposium on Security and Privacy (SP), 2023.
- Uniswap v3 core. Tech. rep., Uniswap, Tech. Rep., 2021.
- Antonio Juliano. dydx: A standard for decentralized margin trading and derivatives. Retrieved from https://whitepaper.dydx.exchange, 2018.
- Compound Labs. Compound finance. Retrieved from https://compound.finance/, 2019.
- AAVE. Aave protocol whitepaper v1.0. Retrieved from https://github.com/aave/aave-protocol/blob/master/docs/Aave_Protocol_Whitepaper_v1_0.pdf, 2020.
- Convex Finance. Convex. Retrieved from https://www.convexfinance.com/, 2023.
- Harvest Finance. Harvest finance document. Retrieved from https://docs.harvest.finance/, 2023.
- Lido. Lido docs. Retrieved from https://docs.lido.fi/, 2023.
- Rocket Pool. Rocket pool documentation. Retrieved from https://docs.rocketpool.net/guides/, 2023.
- SoK: A classification framework for stablecoin designs. In International Conference on Financial Cryptography and Data Security (FC), pages 174–197. Springer, 2020.
- Understand volatility of algorithmic stablecoin: Modeling, verification and empirical analysis. In International Conference on Financial Cryptography and Data Security Workshop on Decentralized Finance (DeFi@FC), pages 97–108. Springer, 2021.
- SoK: Lending pools in decentralized finance. In International Conference on Financial Cryptography and Data Security Workshop on Decentralized Finance (DeFi@FC), pages 553–578. Springer, 2021.
- A short survey on business models of decentralized finance (defi) protocols. International Conference on Financial Cryptography and Data Security Workshop on Decentralized Finance (DeFi@FC), 2022.
- Rujia Li et al. SoK: TEE-assisted confidential smart contract. Proceedings on Privacy Enhancing Technologies (PETs), 3:1–21, 2022.
- SoK: Decentralized exchanges (DEX) with automated market maker (AMM) protocols. ACM Computing Surveys (CSUR), 55(11):1–50, 2023.
- SoK: Design, vulnerabilities and defense of cryptocurrency wallets. arXiv preprint arXiv:2307.12874, 2023.
- Quantifying blockchain extractable value: How dark is the forest? In IEEE Symposium on Security and Privacy (SP), pages 198–214. IEEE, 2022.
- SoK: Mev countermeasures: Theory and practice. arXiv preprint arXiv:2212.05111, 2022.
- SoK: Transparent dishonesty: Front-running attacks on blockchain. In International Conference on Financial Cryptography and Data Security (FC), pages 170–189. Springer, 2020.
- On the just-in-time discovery of profit-generating transactions in DeFi protocols. In IEEE Symposium on Security and Privacy (SP), pages 919–936. IEEE, 2021.
- Exploring unfairness on proof of authority: Order manipulation attacks and remedies. In ACM on Asia Conference on Computer and Communications Security (AsiaCCS), pages 123–137, 2022.
- Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review, 2008.
- Vitalik Buterin et al. A next-generation smart contract and decentralized application platform. white paper, 3(37):2–1, 2014.
- Litecoin Wiki contributors. Main page — litecoin wiki. Retrieved from https://litecoin.info/index.php/Main_Page, 2019.
- Kurt M Alonso et al. Zero to monero, 2020.
- Ringct 2.0: A compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency monero. In European Symposium on Research in Computer Security (ESORICS), pages 456–474. Springer, 2017.
- An empirical analysis of monero cross-chain traceability. International Conference on Financial Cryptography and Data Security (FC), 2019.
- Zcash protocol specification. GitHub: San Francisco, CA, USA, 4:220, 2016.
- An empirical analysis of anonymity in Zcash. In USENIX security symposium (USENIX Sec), pages 463–477, 2018.
- Nexus Mutual. The nexus mutual protocol. Retrieved from https://docs.nexusmutual.io/protocol/, 2020.
- ConsenLabs. imtoken. Retrieved from https://github.com/consenlabs, 2023.
- Minter Team. Bip wallet. Retrieved from https://github.com/MinterTeam/bip-wallet-web, 2023.
- Wetez. Wetez. Retrieved from https://docs.wetez.io/wetez/, 2023.
- Trust Wallet. Trust wallet developer documentation. Retrieved from https://developer.trustwallet.com/developer/, 2023.
- Ledger. Ledger developer portal. Retrieved from https://developers.ledger.com/, 2023.
- Trezor company. Trezor hardware wallet (official). Retrieved from https://trezor.io/, 2013.
- Twap oracle attacks: Easier done than said? In IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pages 1–8. IEEE, 2022.
- A reinforcement learning model for the reliability of blockchain oracles. Expert Systems with Applications, 214:119160, 2023.
- Maker Foundation. The maker protocol: Makerdao’s multi-collateral dai (mcd) system. Retrieved from https://makerdao.com/en/whitepaper/, 2023.
- Truthful decentralized blockchain oracles. International Journal of Network Management, 32(2):e2179, 2022.
- Decentralized oracles via peer-prediction in the presence of lying incentives, 2019.
- Chainlink 2.0: Next steps in the evolution of decentralized oracle networks. Chainlink Labs, 1, 2021.
- nestprotocol.org. Nest: Decentralized martingale network. Retrieved from https://www.nestprotocol.org/doc/ennestwhitepaper.pdf, 2023.
- Gang Wang et al. Exploring blockchains interoperability: A systematic survey. ACM Computing Surveys (CSUR), 2023.
- Cosmos whitepaper. A Netw. Distrib. Ledgers, 27, 2019.
- Gavin Wood. Polkadot: Vision for a heterogeneous multi-chain framework. White paper, 21(2327):4662, 2016.
- Ethereum and Consensys. Btc-relay. Retrieved from http://btcrelay.org/, 2016.
- BTC Relay. Frequently asked questions—btc relay 1.0 documentation. retrieved april 7, 2019, 2016.
- Vitalik Buterin. Chain interoperability. R3 research paper, 9:1–25, 2016.
- Thorchain. Thorchain whitepapers. Retrieved from https://github.com/thorchain/Resources/tree/master/Whitepapers, 2021.
- Defiscanner: Spotting DeFi attacks exploiting logic vulnerabilities on blockchain. IEEE Transactions on Computational Social Systems (TCSS), pages 1–12, 2022.
- Some simple economics of stablecoins. Annual Review of Financial Economics, 14, 2022.
- Tether. Tether: Fiat currencies on the Bitcoin blockchain. Retrieved from https://assets.ctfassets.net/vyse88cgwfbl/5UWgHMvz071t2Cq5yTw5vi/c9798ea8db99311bf90ebe0810938b01/TetherWhitePaper.pdf, 2023.
- Coinbase. Usdc: The dollar for the digital age. Retrieved from https://www.coinbase.com/usdc, 2023.
- Gemini Trust Company. Gemini. Retrieved from https://www.gemini.com/dollar, 2023.
- Liquity. Official liquity documentation. Retrieved from https://docs.liquity.org/, 2023.
- Ampleforth: A new synthetic commodity. Ampleforth White Paper, 2019.
- Basis: a price-stable cryptocurrency with an algorithmic central bank. Retrieved from https://basis.io/basis_whitepaper_en.pdf, 2017.
- Frax: A fractional-algorithmic stablecoin protocol. In 2022 IEEE International Conference on Blockchain (Blockchain), pages 406–411. IEEE, 2022.
- Terra money: Stability and adoption. White Paper, Apr, 2019.
- Anatomy of a stablecoin’s failure: The terra-luna case. Finance Research Letters, 51:103358, 2023.
- (in) stability for the blockchain: Deleveraging spirals and stablecoin attacks, 2021.
- Shange Fu et al. Rational ponzi game in algorithmic stablecoin. In IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pages 1–6. IEEE, 2023.
- Atomic loans: Cryptocurrency debt instruments. arXiv preprint arXiv:1901.05117, 2019.
- Analysis model for decentralized lending protocols. In International Symposium on Information and Communication Technology (SOICT), pages 405–412, 2022.
- Kanis Saengchote. Decentralized lending and its users: Insights from compound. arXiv preprint arXiv:2212.05734, 2022.
- Speculative multipliers on DeFi: Quantifying on-chain leverage risks. In International Conference on Financial Cryptography and Data Security (FC), pages 38–56. Springer, 2022.
- Collateral-free trustworthiness-based personal lending on a decentralized application (DApp). In SECRYPT, pages 839–844, 2021.
- Towards secure and trustworthy flash loans: A blockchain-based trust management approach. In International Conference on Network and System Security (NSS), pages 499–513. Springer, 2022.
- Secure lending: Blockchain and prospect theory-based decentralized credit scoring model. IEEE Transactions on Network Science and Engineering (TNSE), 7(4):2566–2575, 2020.
- TrueFi. Truefi docs. Retrieved from https://docs.truefi.io/faq/, 2023.
- Michael Elisha. Introducing arcx sapphire (v3). Retrieved from https://arcx.substack.com/p/introducing-arcx-sapphire-v3, 2021.
- CreDA. Creda whitepaper: Turn data into wealth. Retrieved from https://creda-app.gitbook.io/creda-protocol/introduction/creda-protocol-whitepaper, 2022.
- On the quality of cryptocurrency markets: Centralized versus decentralized exchanges. arXiv preprint arXiv:2112.07386, 2021.
- An empirical study of market inefficiencies in Uniswap and SushiSwap. arXiv preprint arXiv:2203.07774, 2022.
- Behavior of liquidity providers in decentralized exchanges. arXiv preprint arXiv:2105.13822, 2021.
- 0x: An open protocol for decentralized exchange on the Ethereum blockchain. Retrieved from https://github.com/0xProject/whitepaper, 2017.
- Swap: A peer-to-peer protocol for trading Ethereum tokens. Whitepaper Database, 21, 2017.
- Aurora Labs. Idex: A real-time and high-throughput Ethereum smart contract exchange. Retrieved from https://static1.squarespace.com/static/5d641c0fc8f92f0001cd9358/t/5d691f20eb666000012a45a7/1567170337906/IDEX-Whitepaper-V0.7.6.pdf, 2019.
- StarkEx. Starkex documentation. Retrieved from https://docs.starkware.co/starkex/index.html, 2023.
- Kybernetwork: A trustless decentralized exchange and payment service. Retrieved from https://home.kyber.network/assets/KyberNetworkWhitepaper.pdf, 2017.
- A non-custodial portfolio manager, liquidity provider, and price sensor. Retrieved from https://balancer.finance/whitepaper, 2019.
- Bancor protocol: Continuous liquidity for cryptographic tokens through their smart contracts. Available online: https://storage.googleapis.com/website-bancor/2018/04/01ba8253-bancor_protocol_whitepaper_en.pdf, 2017.
- Automatic market-making with dynamic peg, 2021.
- Vijay Mohan. Automated market makers and decentralized exchanges: a DeFi primer. Financial Innovation, 8(1):20, 2022.
- Improved price oracles: Constant function market makers. In ACM Conference on Advances in Financial Technologies (AFT), pages 80–91, 2020.
- Michael Egorov. Stableswap-efficient mechanism for stablecoin liquidity. Retrieved Feb, 24:2021, 2019.
- The Monero Project. Moneropedia. Retrived from https://www.getmonero.org/resources/moneropedia/, 2014.
- Electric Coin Company. Zcash. Retrieved from https://z.cash/learn/, 2016.
- Erc-20: Token standard. Retrieved from https://eips.ethereum.org/EIPS/eip-20, 2015.
- MetaMask. The crypto wallet for defi, Web3 dapps and nfts. Retrieved from https://metamask.io/, 2016.
- Ouriel Ohayon. Zengo: What is zengo recovery kit? Retrieved from https://help.zengo.com/en/articles/2603673-what-is-zengo-recovery-kit, 2018.
- argentlabs. Argent smart wallet specification. Retrieved from https://github.com/argentlabs/argent-contracts/blob/develop/specifications/specifications.pdf, 2021.
- Polygon Bridge. Matic whitepaper. Retrieved from https://github.com/maticnetwork/whitepaper/, 2020.
- Maple Labs. Maple finance. Retrieved from https://maplefinance.gitbook.io/maple/, 2023.
- Stellar. Liquidity on stellar: Sdex and liquidity pools. Retrieved from https://developers.stellar.org/docs/encyclopedia/liquidity-on-stellar-sdex-liquidity-pools#sdex, 2023.
- Opium Team. Opium protocol whitepaper. Retrieved from https://github.com/OpiumProtocol/opium-contracts/blob/master/docs/opium_whitepaper.pdf, 2020.
- Zubin Koticha. Building a generalized liquid options protocol in DeFi. Opyn, 2019.
- Molly Wintermute. Hegic: On-chain options trading protocol on Ethereum powered by hedge contracts and liquidity pools. Technical report, Tech. Rep., 2020.[Online]. Available: https://github.com/hegic/whitepaper~…, 2020.
- Enzyme Finance. Enzyme user docs(v4). Retrieved from https://docs.enzyme.finance/, 2023.
- F Feng and B Weickmann. Set: A protocol for baskets of tokenized assets, 2019.
- Insurepal. Vouvhforme(insurepal) whitepaper. Retrieved from http://vouchforme.co/VouchForMe_whitepaper_2018.pdf, 2018.
- Augur: a decentralized oracle and prediction market platform. arXiv preprint arXiv:1501.01042, 2015.
- CDx. Cdx whitepaper. Retrieved from https://cdxproject.com/assets/resources/whitepaper.pdf, 2018.
- Omen. Omen. Retrieved from https://omen.eth.link/, 2020.
- Deribit Insights. The best information for crypto derivatives trading. Retrieved from https://insights.deribit.com/, 2021.
- OKX Team. Okx exchange. Retrieved from https://wp.whitepaper.io/okx/, 2022.
- Matrixport Technologies. Matrixport: All-in-one crypto financial services platform. Retrieved from https://matrixport.com/, 2021.
- Babel Finance. Babel business and solutions. Retrieved from https://babel.finance/solutions.html, 2021.
- Babylon Finance. Babylon litepaper. Retrieved from https://docs.babylon.finance/protocol/litepaper, 2022.
- Index Coop. The definitive guide to earning yield on digital assets. Retrieved from https://indexcoop.com/whitepapers/the-definitive-guide-to-earning-yield-on-digital-assets, 2020.
- Sunlabs. Sw dao. Retrieved from https://www.suninvest.com/, 2020.
- Kava. DeFi for crypto: Leverage assets with kava’s cross-chain cdp platform. Retrieved from https://api-new.whitepaper.io/documents/pdf?id=Sk_Ny2S9v, 2022.
- Daoventures. Daoventures whitepaper. Retrieved from https://daoventures.gitbook.io/daoventures/, 2022.
- Token-based insurance solutions on blockchain. In Blockchains and the Token Economy: Theory and Practice, pages 237–260. Springer, 2022.
- Blockchains can work for car insurance: Using smart contracts and sensors to provide on-demand coverage. IEEE Consumer Electronics Magazine, 7(4):72–81, 2018.
- Andrew W Singer. Can blockchain improve insurance? Risk Management, 66(1):20–25, 2019.
- A blockchain framework for insurance processes. In IFIP International Conference on New Technologies, Mobility and Security (NTMS), pages 1–4. IEEE, 2018.
- Blockcis—a blockchain-based cyber insurance system. In IEEE International Conference on Cloud Engineering (IC2E), pages 378–384. IEEE, 2018.
- K Sayegh and M Desoky. Blockchain application in insurance and reinsurance. france: Skema business school. Work in Progress papers, 2019.
- Identifying fraud in medical insurance based on blockchain and deep learning. Future Generation Computer Systems (FGCS), 130:140–154, 2022.
- A traceable online insurance claims system based on blockchain and smart contract technology. Sustainability, 13(16):9386, 2021.
- Eclipse attacks on {{\{{Bitcoin’s}}\}}{{\{{peer-to-peer}}\}} network. In 24th USENIX security symposium (USENIX Sec), pages 129–144, 2015.
- John R. Douceur. The sybil attack. In Peer-to-Peer Systems, pages 251–260, Berlin, Heidelberg, 2002. Springer Berlin Heidelberg.
- Exploring the attack surface of blockchain: A comprehensive survey. IEEE Communications Surveys & Tutorials (COMST), 22(3):1977–2008, 2020.
- Automated generation and analysis of attack graphs. In IEEE Symposium on Security and Privacy (SP), pages 273–284. IEEE, 2002.
- Toward measuring network security using attack graphs. In ACM workshop on Quality of Protection (QoP@CCS), pages 49–54, 2007.
- Cyber security quantification model. In International Conference on Security of Information and Networks (SIN), pages 142–148, 2010.
- Smart contract vulnerabilities: Vulnerable does not imply exploited. In USENIX Security Symposium (USENIX Sec), pages 1325–1341, 2021.
- Time-manipulation attack: Breaking fairness against proof of authority aura. In Proceedings of the ACM Web Conference (WWWW), pages 2076–2086, 2023.
- Flash boys 2.0: Frontrunning in decentralized exchanges, miner extractable value, and consensus instability. In IEEE Symposium on Security and Privacy (SP), pages 910–927. IEEE, 2020.
- Cyclic arbitrage in decentralized exchanges. In Companion Proceedings of the Web Conference (WWW), pages 12–19, 2022.
- Transaction fairness in blockchains, revisited. Cryptology ePrint Archive, 2023.
- Frontrunner jones and the raiders of the dark forest: An empirical study of frontrunning on the Ethereum blockchain. In USENIX Security Symposium (USENIX Sec), pages 1343–1359, 2021.
- Fairblock: Preventing blockchain front-running with minimal overheads. In International Conference on Security and Privacy in Communication Systems (SecureComm), pages 250–271. Springer, 2022.
- Xinrui Zhang et al. Frontrunning block attack in PoA Clique: A case study. In IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pages 1–3. IEEE, 2022.
- A flash (bot) in the pan: measuring maximal extractable value in private pools. In Proceedings of the 22nd ACM Internet Measurement Conference, pages 458–471, 2022.
- Impact and user perception of sandwich attacks in the DeFi ecosystem. In Proceedings of the CHI Conference on Human Factors in Computing Systems (CHI), pages 1–15, 2022.
- Security analysis methods on Ethereum smart contract vulnerabilities: a survey. arXiv preprint arXiv:1908.08605, 2019.
- Smart contract security: A practitioners’ perspective. In IEEE/ACM International Conference on Software Engineering (ICSE), pages 1410–1422. IEEE, 2021.
- A survey on Ethereum systems security: Vulnerabilities, attacks, and defenses. ACM Computing Surveys (CSUR), 53(3):1–43, 2020.
- A survey of attacks on Ethereum smart contracts (SoK). In International Conference on Principles of Security and Trust (POST), pages 164–186. Springer, 2017.
- MAR: A dynamic symbol execution detection method for smart contract reentry vulnerability. In International Conference on Blockchain and Trustworthy Systems (BlockSys), pages 418–429. Springer, 2021.
- Smart contract vulnerability analysis and security audit. IEEE Network, 34(5):276–282, 2020.
- Smartest: Effectively hunting vulnerable transaction sequences in smart contracts through language model-guided symbolic execution. In USENIX Security Symposium (USENIX Sec), pages 1361–1378, 2021.
- Txspector: Uncovering attacks in Ethereum from transactions. In USENIX Security Symposium (USENIX Sec), 2020.
- Bdos: Blockchain denial-of-service. In ACM SIGSAC conference on Computer and Communications Security (CCS), pages 601–619, 2020.
- A comprehensive review of denial of service attacks in blockchain ecosystem and open challenges. IEEE Access, 10:96538–96555, 2022.
- Dos attacks on blockchain ecosystem. In Euro-Par 2021: Parallel Processing Workshops, pages 230–242. Springer International Publishing, 2022.
- Ethereum eclipse attacks. Technical report, ETH Zurich, 2016.
- Low-resource eclipse attacks on Ethereum’s peer-to-peer network. Cryptology ePrint Archive, 2018.
- Meritrank: Sybil tolerant reputation for merit-based tokenomics. In Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), pages 95–102. IEEE, 2022.
- Double-spend counterattacks: Threat of retaliation in proof-of-work systems. arXiv preprint arXiv:2002.10736, 2020.
- Martijn Bastiaan. Preventing the 51%-attack: a stochastic analysis of two phase proof of work in Bitcoin. In Availab le at https://fmt.ewi.utwente.nl/media/175.pdf, 2015.
- Quantifying blockchain extractable value: How dark is the forest? In IEEE Symposium on Security and Privacy (SP), pages 198–214, 2022.
- Analyzing and preventing sandwich attacks in Ethereum. ETH Zürich, 2021.
- Eliminating sandwich attacks with the help of game theory. In ACM on Asia Conference on Computer and Communications Security (AsiaCCS), pages 153–167, 2022.
- Arbitrage attack: Miners of the world, unite! In International Conference on Financial Cryptography and Data Security (FC), pages 464–487. Springer, 2022.
- Clockwork finance: Automated analysis of economic security in smart contracts. In IEEE Symposium on Security and Privacy (SP), pages 2499–2516. IEEE, 2023.
- Baptiste Pretre. Attacks on peer-to-peer networks. Dept. of Computer Science Swiss Federal Institute of Technology (ETH) Zurich Autumn, 2005.
- A survey of DeFi security: Challenges and opportunities. arXiv preprint arXiv:2206.11821, 2022.
- Kris Oosthoek. Flash crash for cash: Cyber threats in decentralized finance. arXiv preprint arXiv:2106.10740, 2021.
- Hunting vulnerable smart contracts via graph embedding based bytecode matching. IEEE Transactions on Information Forensics and Security (TIFS), 16:2144–2156, 2021.
- Smartembed: A tool for clone and bug detection in smart contracts through structural code embedding. In IEEE International Conference on Software Maintenance and Evolution (ICSME), pages 394–397. IEEE, 2019.
- A new era of blockchain-powered decentralized finance (DeFi)-a review. In IEEE Annual Computers, Software, and Applications Conference (COMPSAC), pages 1286–1292. IEEE, 2022.
- Do not rug on me: Leveraging machine learning techniques for automated scam detection. Mathematics, 10(6):949, 2022.
- SoK: Not quite water under the bridge: Review of cross-chain bridge hacks. In IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pages 1–14. IEEE, 2023.
- Disincentivizing double spend attacks across interoperable blockchains. In First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), pages 36–45. IEEE, 2019.
- Cross-chain deals and adversarial commerce. arXiv preprint arXiv:1905.09743, 2019.
- Replay attacks and defenses against cross-shard consensus in sharded distributed ledgers. In IEEE European Symposium on Security and Privacy (EuroSP), pages 294–308. IEEE, 2020.
- A survey on cross-chain technologies. Distributed Ledger Technologies: Research and Practice, 2(2):1–30, 2023.
- Attacks against cross-chain systems and defense approaches: A contemporary survey. IEEE/CAA Journal of Automatica Sinica, 10(8):1647–1667, 2023.
- Maqsood Ahamed Abdul Careem and Aveek Dutta. Reputation based routing in manet using blockchain. In International Conference on COMmunication Systems & NETworkS (COMSNETS), pages 1–6. IEEE, 2020.
- Attack and protection schemes on fabric isomorphic crosschain systems. International Journal of Distributed Sensor Networks, 18(1):15501477211059945, 2022.
- Anonymous multi-hop locks for blockchain scalability and interoperability. Cryptology ePrint Archive, 2018.
- A decentralized cross-chain service protocol based on notary schemes and hash-locking. In IEEE International Conference on Services Computing (SCC), pages 152–157. IEEE, 2022.
- Christopher G Harris. Cross-chain technologies: Challenges and opportunities for blockchain interoperability. In 2023 IEEE International Conference on Omni-layer Intelligent Systems (COINS), pages 1–6. IEEE, 2023.
- DefiRanger: Detecting price manipulation attacks on DeFi applications. arXiv preprint arXiv:2104.15068, 2021.
- Evil under the sun: Understanding and discovering attacks on Ethereum decentralized applications. In USENIX Security Symposium (USENIX Sec), pages 1307–1324, 2021.
- SoK: Oracles from the ground truth to market manipulation. In ACM Conference on Advances in Financial Technologies (AFT), pages 127–141, 2021.
- What’s in your wallet? privacy and security issues in web 3.0. arXiv preprint arXiv:2109.06836, 2021.
- Self-supervised incremental deep graph learning for Ethereum phishing scam detection. arXiv preprint arXiv:2106.10176, 2021.
- Tsgn: Transaction subgraph networks assisting phishing detection in Ethereum. arXiv preprint arXiv:2208.12938, 2022.
- alethio. Illiquidity and bank run risk in defi. Retrieved from https://medium.com/alethio/overlooked-risk-illiquidity-and-bank-runs-on-compound-finance-5d6fc3922d0d, 2019.
- Defi risks and the decentralisation illusion. BIS Quarterly Review, 2021.
- Beanstalk Farms. Beanstalk governance exploit. Retrieved from https://bean.money/blog/beanstalk-governance-exploit, 2022.
- Decentralised autonomous organisations: The future of corporate governance or an illusion? Aris (Aristeidis), Decentralised Autonomous Organisations: The Future of Corporate Governance or an Illusion, 2022.
- Nathan Reiff. Cryptocurrency spoofing: How it works, protecting yourself. Retrieved from https://www.investopedia.com/tech/what-cryptocurrency-spoofing/, 2021.
- Miners as intermediaries: extractable value and market manipulation in crypto and defi. Technical report, Bank for International Settlements, 2022.
- Cryptocurrency risks, fraud cases, and financial performance. Risks, 11(3):51, 2023.
- FTX collapse: a Ponzi story. arXiv preprint arXiv:2212.09436, 2022.
- The impact of the SVB collapse on global financial markets: Substantial but narrow. Finance Research Letters, page 103948, 2023.
- Cryptocurrency in the aftermath: Unveiling the impact of the SVB collapse. HAL-04216338, 2023.
- CoinGeco. Coingecko yield farming survey 2020. Retrieved from https://www.coingecko.com/, 2020.
- Fabian Schär. Decentralized finance: On blockchain-and smart contract-based financial markets. FRB of St. Louis Review, 2021.
- An empirical study on Snapshot DAOs. arXiv preprint arXiv:2211.15993, 2022.
- Risks and returns of Uniswap v3 liquidity providers. ACM Conference on Advances in Financial Technologies (AFT), 2022.
- Token spammers, rug pulls, and sniperbots: An analysis of the ecosystem of tokens in Ethereum and the Binance smart chain (BNB). USENIX Security Symposium (USENIX Sec), 2023.
- The anatomy of a cryptocurrency Pump-and-Dump scheme. In USENIX Security Symposium (USENIX Sec), pages 1609–1625, 2019.
- Blockchain transaction censorship:(in) secure and (in) efficient? Cryptology ePrint Archive, 2023.
- Blockchain censorship. arXiv preprint arXiv:2305.18545, 2023.
- Scalable performance predictions of distributed peer-to-peer applications. In IEEE International Conference on High Performance Computing and Communication & IEEE International Conference on Embedded Software and Systems, pages 193–201, 2012.
- An evaluation system for defi lending protocols. In 2023 42nd Chinese Control Conference (CCC), pages 8888–8893, 2023.
- Decision-making and impact of blockchain on accounts receivable financing. In LISS 2021, pages 465–477, Singapore, 2022. Springer Nature Singapore.
- Tp-detect: trigram-pixel based vulnerability detection for ethereum smart contracts. Multimedia Tools and Applications, 82(23):36379–36393, 2023.
- A novel smart contract reentrancy vulnerability detection model based on bigas. Journal of Signal Processing Systems, 2023.
- Hgat: smart contract vulnerability detection method based on hierarchical graph attention network. Journal of Cloud Computing, 12(1):93, 2023.
- Real-time detection of cryptocurrency mining behavior. In Blockchain and Trustworthy Systems, pages 278–291, Singapore, 2022. Springer Nature Singapore.
- Variants of crypto-jacking attacks and their detection techniques. In Applications and Techniques in Information Security, pages 71–87, Singapore, 2023. Springer Nature Singapore.
- Short and distort manipulations in the cryptocurrency market: Case study, patterns and detection. In Algorithms and Architectures for Parallel Processing, pages 494–508, Cham, 2022. Springer International Publishing.
- Our approach to formal verification of token economy models. In Information and Communication Technologies in Education, Research, and Industrial Applications, pages 348–363, Cham, 2020. Springer International Publishing.
- Li Zhihong and Zhang Jie. Online knowledge community governance based on blockchain token incentives. In Knowledge and Systems Sciences, pages 64–72, Singapore, 2019. Springer Singapore.
- Implications of the Token Economy: A Taxonomy and Research Agenda, pages 1–30. Springer International Publishing, Cham, 2022.
- Being accountable never cheats: An incentive protocol for DeFi oracles. In IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS), pages 1–10, 2022.
- Blockchain-based access control scheme with incentive mechanism for ehealth systems: patient as supervisor. Multimedia Tools and Applications, 80(20):30605–30621, 2021.
- Sok: Algorithmic incentive manipulation attacks on permissionless PoW cryptocurrencies. In Financial Cryptography and Data Security Workshops, pages 507–532, Berlin, Heidelberg, 2021. Springer Berlin Heidelberg.
- Ib2p: An image-based privacy-preserving blockchain model for financial services. In 2021 IEEE International Conference on Blockchain (Blockchain), pages 552–558, 2021.
- Privacy considerations for a decentralized finance (defi) loans platform. Cluster Computing, 26(4):2147–2161, 2023.
- Stéphane Blemus. The compatibility of cbdcs with “defi” protocols: A governance rather than a technological issue to comply with financial crime regulations. In Financial Cryptography and Data Security Workshops, pages 97–105, Cham, 2023. Springer International Publishing.
- Regulatory considerations on centralized aspects of defi managed by daos. In Financial Cryptography and Data Security Workshops, pages 21–36, Berlin, Heidelberg, 2021. Springer Berlin Heidelberg.
- José Carlos Laguna De Paz. Some implications of the new global digital economy for financial regulation and supervision. Journal of Banking Regulation, 24(2):146–155, 2023.
- Dieter Reichert. How customer communications and interactions become digital assets and critical resources in customer engagement — an interview with dieter reichert, co-founder of censhare ag. Journal of Digital Asset Management, 6(4):232–242, 2010.
- Chetan Saiya. Dam in marketing operations and the emergence of customer engagement objects – an interview with chetan saiya, ceo of assetlink. Journal of Digital Asset Management, 6(2):124–129, 2010.
- An educational guide to creating your own cryptocurrency. In Advances in Software Engineering, Education, and e-Learning, pages 163–177, Cham, 2021. Springer International Publishing.
- Enhancing blockchain technology education with innovative active learning. In 2022 IEEE 2nd International Conference on Advanced Learning Technologies on Education & Research (ICALTER), pages 1–4, 2022.
- Securify: Practical security analysis of smart contracts. In Proceedings of the ACM SIGSAC conference on Computer and Communications Security (CCS), pages 67–82, 2018.
- SoK: Consensus in the age of blockchains. In Proceedings of the ACM Conference on Advances in Financial Technologies (AFT), pages 183–198, 2019.
- Zeinab Amin. A practical road map for assessing cyber risk. Journal of Risk Research, 22(1):32–43, 2019.
- SoK: Quantifying cyber risk. In IEEE Symposium on Security and Privacy (SP), pages 211–228. IEEE, 2021.
- A fistful of bitcoins: characterizing payments among men with no names. In Proceedings of the 2013 conference on Internet measurement conference, pages 127–140, 2013.
- Evaluating user privacy in bitcoin. In International Conference on Financial Cryptography and Data Security, pages 34–51, Berlin, Heidelberg, 2013. Springer, Springer Science & Business Media.
- On how zero-knowledge proof blockchain mixers improve, and worsen user privacy. In Proceedings of the ACM Web Conference (WWW), pages 2022–2032, 2023.
- Rujia Li et al. An accountable decryption system based on privacy-preserving smart contracts. In International Conference on Information Security (ISC), pages 372–390. Springer, 2020.
- Zerocoin: Anonymous distributed e-cash from Bitcoin. In IEEE Symposium on Security and Privacy (SP), pages 397–411. IEEE, 2013.
- Jens Groth. On the size of pairing-based non-interactive arguments. In International Conference on the Theory and Applications of Cryptographic Techniques, pages 305–326. Springer, 2016.
- Bulletproofs: Short proofs for confidential transactions and more. In IEEE Symposium on Security and Privacy (SP), pages 315–334. IEEE, 2018.
- SoK: Privacy-enhancing technologies in finance. Cryptology ePrint Archive, 2023.
- How to time-stamp a digital document. Springer, 1991.
- Gavin Wood et al. Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper, 151(2014):1–32, 2014.
- Andrei-Dragoş Popescu. Decentralized finance (DeFi)–the lego of finance. Social Sciences and Education Research Review, 7(1):321–349, 2020.
- Tamás Katona. Decentralized finance: The possibilities of a blockchain “money lego” system. Financial and Economic Review, 20(1):74–102, 2021.
- Practical key recovery model for self-sovereign identity based digital wallets. In IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), pages 320–325. IEEE, 2019.
- A key recovery system based on password-protected secret sharing in a permissioned blockchain. Computers, Materials & Continua, 65(1):153–170, 2020.
- Password-protected secret sharing. In ACM conference on Computer and Communications Security (CCS), pages 433–444, 2011.
- Memento: How to reconstruct your secrets from a single password in a hostile environment. In Annual Cryptology Conference (CRYPTO), pages 256–275. Springer, 2014.
- A social-network-based cryptocurrency wallet-management scheme. IEEE Access, 6:7654–7663, 2018.
- Cryptovault-a secure hardware wallet for decentralized key management. In 2021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS), pages 1–4. IEEE, 2021.
- Crsa: A cryptocurrency recovery scheme based on hidden assistance relationships. IEEE Transactions on Information Forensics and Security (TIFS), 16:4291–4305, 2021.
- A multi-factor authentication framework for secure access to blockchain. In International Conference on Computer and Technology Applications (CCAT), pages 160–164, 2019.
- Biowallet: a biometric digital wallet. ICONS 2017, page 45, 2017.
- Private key encryption and recovery in blockchain. arXiv preprint arXiv:1907.04156, 2019.
- A Jagadeesan and K Duraiswamy. Secured cryptographic key generation from multimodal biometrics: feature level fusion of fingerprint and iris. arXiv preprint arXiv:1003.1458, 2010.
- Securing the private key in your blockchain wallet: a continuous authentication approach based on behavioral biometric. In Journal of Physics: Conference Series, volume 1631, page 012104. IOP Publishing, 2020.
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.
Top Community Prompts
Collections
Sign up for free to add this paper to one or more collections.