A list of blockchain papers (2018. 10. 6)

* Introduction & Overview

Blockchains: How They Work and Why They’ll Change the World: https://spectrum.ieee.org/computing/networks/blockchains-how-they-work-and-why-theyll-change-the-world 

Bitcoin and Cryptocurrency Technologies: https://d28rh4a8wq0iu5.cloudfront.net/bitcointech/readings/princeton_bitcoin_book.pdf

Bitcoin: A Peer-to-Peer Electronic Cash System: https://bitcoin.org/bitcoin.pdf

Blockchain Technology Overview: https://csrc.nist.gov/publications/detail/nistir/8202/final#pubs-documentation 

SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies: https://ieeexplore.ieee.org/document/7163021/

Untangling Blockchain: A Data Processing View of Blockchain Systems: https://ieeexplore.ieee.org/document/8246573/

* Scalability & Performance

Blockchains from a Distributed Computing Perspective: http://cs.brown.edu/courses/csci2952-a/papers/perspective.pdf

A Secure Sharding Protocol For Open Blockchains: https://dl.acm.org/citation.cfm?id=2978389

Bitcoin-NG: A Scalable Blockchain Protocol: https://www.usenix.org/system/files/conference/nsdi16/nsdi16-paper-eyal.pdf

BLOCKBENCH: A Framework for Analyzing Private Blockchains: https://dl.acm.org/citation.cfm?id=3064033

Hyperledger fabric: a distributed operating system for permissioned blockchains: https://dl.acm.org/citation.cfm?id=3190538

The Bitcoin Lightning Network:
Scalable Off-Chain Instant Payments: https://lightning.network/lightning-network-paper.pdf

* Consensus algorithms

Practical Byzantine Fault Tolerance: http://pmg.csail.mit.edu/papers/osdi99.pdf

Algorand: Scaling Byzantine Agreements for Cryptocurrencies: https://dl.acm.org/citation.cfm?id=3132757

The Stellar Consensus Protocol: A Federated Model for Internet-level Consensus: https://cdn.relayto.com/media/files/bHseNPaMRnmuKKqyO8hT_stellar-consensus-protocol.pdf

Majority is not enough: Bitcoin mining is vulnerable: https://arxiv.org/abs/1311.0243

SoK: Consensus in the Age of Blockchains: https://arxiv.org/pdf/1711.03936.pdf

* Security & Privacy

Zerocash: Decentralized Anonymous Payments from Bitcoin: https://ieeexplore.ieee.org/abstract/document/6956581/

On the Security and Performance of Proof of Work Blockchains: https://dl.acm.org/citation.cfm?id=2976749.2978341

* Smart contracts

Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab: http://fc16.ifca.ai/bitcoin/papers/DAKMS16.pdf

Solidity: https://solidity.readthedocs.io/en/latest/

Ethereum Development Tutorial: https://github.com/ethereum/wiki/wiki/Ethereum-Development-Tutorial

ZEUS: Analyzing Safety of Smart Contracts: http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2018/02/ndss2018_09-1_Kalra_paper.pdf

teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts: https://www.usenix.org/conference/usenixsecurity18/presentation/krupp

Minimum requirements for Seclab students

Minimum requirements for Seclab PhD degree

  • 1st/2nd Top tier conference (according to the BK21+ list) (first author): 1 publication
  • 1st/2nd Top tier conference (according to the BK21+ list) (first/co-author): 3 publications
  • Minimum requirements for our university

Minimum requirements for Seclab Master degree

  • 1st/2nd Top tier conference (according to the BK21+ list), SCI(E) journal or the following papers (co-author) : 1 publication

– IEEE S&P, USENIX Security, ACM CCS, NDSS conferences (submission)
– IEEE S&P, USENIX Security, ACM CCS, NDSS workshops
– ACM CCS Poster
– ACISP: Australasia Conference on Information Security and Privacy
– ACNS: International Conference on Applied Cryptography and Network Security
– ARES: International Conference on Availability, Reliability and Security
– SecureComm: International Conference on Security and Privacy for Communication Networks
– PST: Annual Conference on Privacy, Security and Trust
– IH&MMSec: Information Hiding and Multimedia Security Workshop
– WISA: World Conference on Information Security Applications
– Vissec: International Workshop on Visualization for Cyber Security
– NSPW: New Security Paradigms Workshop
– USEC: Usable Security Workshop
– FPS: International Symposium on Foundations & Practice of Security
– DIMVA: Conference on Detection of Intrusions and Malware & Vulnerability Assessment

  • Minimum requirements for our university