Philip Daian
Philip Daian
PhD Student, Cornell University
Verified email at cs.cornell.edu - Homepage
Title
Cited by
Cited by
Year
Kevm: A complete formal semantics of the ethereum virtual machine
E Hildenbrandt, M Saxena, N Rodrigues, X Zhu, P Daian, D Guth, ...
2018 IEEE 31st Computer Security Foundations Symposium (CSF), 204-217, 2018
2112018
Snow White: Robustly Reconfigurable Consensus and Applications to Provably Secure Proof of Stake
P Daian, R Pass, E Shi
International Conference on Financial Cryptography and Data Security, 23-41, 2019
1052019
Kevm: A complete semantics of the ethereum virtual machine
E Hildenbrandt, M Saxena, X Zhu, N Rodrigues, P Daian, D Guth, G Roşu
802017
Tesseract: Real-time cryptocurrency exchange using trusted hardware
I Bentov, Y Ji, F Zhang, L Breidenbach, P Daian, A Juels
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
782019
Flash boys 2.0: Frontrunning, transaction reordering, and consensus instability in decentralized exchanges
P Daian, S Goldfeder, T Kell, Y Li, X Zhao, I Bentov, L Breidenbach, ...
arXiv preprint arXiv:1904.05234, 2019
782019
Snow white: Provably secure proofs of stake
P Daian, R Pass, E Shi
Cryptology ePrint Archive, Report 2016/919, 2016
642016
A formal verification tool for Ethereum VM bytecode
D Park, Y Zhang, M Saxena, P Daian, G Roşu
Proceedings of the 2018 26th ACM Joint Meeting on European Software …, 2018
632018
Enter the hydra: Towards principled bug bounties and exploit-resistant smart contracts
L Breidenbach, P Daian, F Tramèr, A Juels
27th {USENIX} Security Symposium ({USENIX} Security 18), 1335-1352, 2018
472018
Flash boys 2.0: Frontrunning in decentralized exchanges, miner extractable value, and consensus instability
P Daian, S Goldfeder, T Kell, Y Li, X Zhao, I Bentov, L Breidenbach, ...
2020 IEEE Symposium on Security and Privacy (SP), 910-927, 2020
402020
Analysis of the DAO exploit
P Daian
Hacking, Distributed 6, 2016
372016
Analysis of the DAO exploit
P Daian
Hacking, Distributed 6, 2016
372016
An in-depth look at the parity multisig bug
L Breidenbach, P Daian, A Juels, EG Sirer
URL: http://hackingdistributed. com/2017/07/22/deep-dive-parity-bug/(visited …, 2017
232017
Squirrl: Automating attack discovery on blockchain incentive mechanisms with deep reinforcement learning
C Hou, M Zhou, Y Ji, P Daian, F Tramer, G Fanti, A Juels
arXiv preprint arXiv:1912.01798, 2019
212019
Rv-android: Efficient parametric android runtime verification, a brief tutorial
P Daian, Y Falcone, P Meredith, TF Şerbănuţă, A Iwai, G Rosu
Runtime Verification, 342-357, 2015
192015
PieceWork: Generalized Outsourcing Control for Proofs of Work
P Daian, EG Sirer, I Eyal, A Juels
BITCOIN'17, 2017
16*2017
Analysis of the DAO exploit. 2016
P Daian
URL: http://hackingdistributed. com/2016/06/18/analysis-of-thedao-exploit …, 2016
102016
An in-depth look at the parity multisig bug. 2017
L Breidenbach, P Daian, A Juels, EG Sirer
URL: http://hackingdistributed. com/2017/07/22/deepdive-parity-bug, 2017
82017
& Juels, A.(2019). Flash Boys 2.0: Frontrunning, Transaction Reordering, and Consensus Instability in Decentralized Exchanges
P Daian, S Goldfeder, T Kell, Y Li, X Zhao, I Bentov
arXiv preprint arXiv:1904.05234, 0
8
On-Chain Vote Buying and the Rise of Dark DAOs
P Daian, T Kell, I Miers, A Juels
Hacking, Distributed, 2018
72018
To sink frontrunners, send in the submarines
L Breidenbach, P Daian, A Juels, F Tramèr
72017
The system can't perform the operation now. Try again later.
Articles 1–20