Crypto misuse study for CCA


CPA analysis paper:

Examples of misuse of CCA implementation:

Importance of the CCA model

Our Approach

For public-key encryption, check whether a proper padding scheme (e.g., OAEP) is applied.

For private-key encryption, check whether authentication encryption (e.g., GCM mode or CBC mode with MAC) is properly implemented.

A list of blockchain papers (2018. 10. 6)

* Introduction & Overview

Blockchains: How They Work and Why They’ll Change the World: 

Bitcoin and Cryptocurrency Technologies:

Bitcoin: A Peer-to-Peer Electronic Cash System:

Blockchain Technology Overview: 

SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies:

Untangling Blockchain: A Data Processing View of Blockchain Systems:

* Scalability & Performance

Blockchains from a Distributed Computing Perspective:

A Secure Sharding Protocol For Open Blockchains:

Bitcoin-NG: A Scalable Blockchain Protocol:

BLOCKBENCH: A Framework for Analyzing Private Blockchains:

Hyperledger fabric: a distributed operating system for permissioned blockchains:

The Bitcoin Lightning Network:
Scalable Off-Chain Instant Payments:

* Consensus algorithms

Practical Byzantine Fault Tolerance:

Algorand: Scaling Byzantine Agreements for Cryptocurrencies:

The Stellar Consensus Protocol: A Federated Model for Internet-level Consensus:

Majority is not enough: Bitcoin mining is vulnerable:

SoK: Consensus in the Age of Blockchains:

* Security & Privacy

Zerocash: Decentralized Anonymous Payments from Bitcoin:

On the Security and Performance of Proof of Work Blockchains:

* Smart contracts

Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab:


Ethereum Development Tutorial:

ZEUS: Analyzing Safety of Smart Contracts:

teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts:

Minimum requirements for Seclab students

Minimum requirements for Seclab PhD degree

  • 1st/2nd Top tier conference (according to the BK21+ list) (first author): 1 publication
  • 1st/2nd Top tier conference (according to the BK21+ list) (first/co-author): 3 publications
  • Minimum requirements for our university

Minimum requirements for Seclab Master degree

  • 1st/2nd Top tier conference (according to the BK21+ list), SCI(E) journal or the following papers (co-author) : 1 publication

– IEEE S&P, USENIX Security, ACM CCS, NDSS conferences (submission)
– IEEE S&P, USENIX Security, ACM CCS, NDSS workshops
– ACM CCS Poster
– ACISP: Australasia Conference on Information Security and Privacy
– ACNS: International Conference on Applied Cryptography and Network Security
– ARES: International Conference on Availability, Reliability and Security
– SecureComm: International Conference on Security and Privacy for Communication Networks
– PST: Annual Conference on Privacy, Security and Trust
– IH&MMSec: Information Hiding and Multimedia Security Workshop
– WISA: World Conference on Information Security Applications
– Vissec: International Workshop on Visualization for Cyber Security
– NSPW: New Security Paradigms Workshop
– USEC: Usable Security Workshop
– FPS: International Symposium on Foundations & Practice of Security
– DIMVA: Conference on Detection of Intrusions and Malware & Vulnerability Assessment

  • Minimum requirements for our university