Skip to main content

Showing 1–12 of 12 results for author: Juels, A

.
  1. arXiv:2311.03530  [pdf, ps, other

    cs.CR

    DAO Decentralization: Voting-Bloc Entropy, Bribery, and Dark DAOs

    Authors: James Austgen, Andrés Fábrega, Sarah Allen, Kushal Babel, Mahimna Kelkar, Ari Juels

    Abstract: Decentralized Autonomous Organizations (DAOs) use smart contracts to foster communities working toward common goals. Existing definitions of decentralization, however-the 'D' in DAO-fall short of capturing key properties characteristic of diverse and equitable participation. We propose a new metric called Voting-Bloc Entropy (VBE, pronounced ''vibe'') that formalizes a broad notion of decentraliza… ▽ More

    Submitted 6 November, 2023; originally announced November 2023.

  2. arXiv:2310.19201  [pdf, ps, other

    cs.CY

    Open Problems in DAOs

    Authors: Joshua Tan, Tara Merk, Sarah Hubbard, Eliza R. Oak, Helena Rong, Joni Pirovich, Ellie Rennie, Rolf Hoefer, Michael Zargham, Jason Potts, Chris Berg, Reuben Youngblom, Primavera De Filippi, Seth Frey, Jeff Strnad, Morshed Mannan, Kelsie Nabben, Silke Noa Elrifai, Jake Hartnell, Benjamin Mako Hill, Tobin South, Ryan L. Thomas, Jonathan Dotan, Ariana Spring, Alexia Maddox , et al. (4 additional authors not shown)

    Abstract: Decentralized autonomous organizations (DAOs) are a new, rapidly-growing class of organizations governed by smart contracts. Here we describe how researchers can contribute to the emerging science of DAOs and other digitally-constituted organizations. From granular privacy primitives to mechanism designs to model laws, we identify high-impact problems in the DAO ecosystem where existing gaps might… ▽ More

    Submitted 12 June, 2024; v1 submitted 29 October, 2023; originally announced October 2023.

    Comments: includes major coordination problems

  3. arXiv:2205.06837  [pdf, other

    cs.CR cs.GT cs.NI

    Strategic Latency Reduction in Blockchain Peer-to-Peer Networks

    Authors: Weizhao Tang, Lucianna Kiffer, Giulia Fanti, Ari Juels

    Abstract: Most permissionless blockchain networks run on peer-to-peer (P2P) networks, which offer flexibility and decentralization at the expense of performance (e.g., network latency). Historically, this tradeoff has not been a bottleneck for most blockchains. However, an emerging host of blockchain-based applications (e.g., decentralized finance) are increasingly sensitive to latency; users who can reduce… ▽ More

    Submitted 11 September, 2023; v1 submitted 13 May, 2022; originally announced May 2022.

    Journal ref: Proc. ACM Meas. Anal. Comput. Syst. 7, 2, Article 32 (June 2023), 33 pages

  4. Clockwork Finance: Automated Analysis of Economic Security in Smart Contracts

    Authors: Kushal Babel, Philip Daian, Mahimna Kelkar, Ari Juels

    Abstract: We introduce the Clockwork Finance Framework (CFF), a general purpose, formal verification framework for mechanized reasoning about the economic security properties of composed decentralized-finance (DeFi) smart contracts. CFF features three key properties. It is contract complete, meaning that it can model any smart contract platform and all its contracts--Turing complete or otherwise. It does so… ▽ More

    Submitted 18 May, 2023; v1 submitted 9 September, 2021; originally announced September 2021.

    Comments: Full version of the paper published at 44th IEEE Symposium on Security and Privacy 2023

    ACM Class: F.3.1; D.2.4; I.1.4

    Journal ref: in 2023 IEEE Symposium on Security and Privacy (SP) (SP), San Francisco, CA, US, 2023 pp. 622-639

  5. arXiv:2105.04380  [pdf, other

    cs.CR

    Forsage: Anatomy of a Smart-Contract Pyramid Scheme

    Authors: Tyler Kell, Haaroon Yousaf, Sarah Allen, Sarah Meiklejohn, Ari Juels

    Abstract: Pyramid schemes are investment scams in which top-level participants in a hierarchical network recruit and profit from an expanding base of defrauded newer participants. Pyramid schemes have existed for over a century, but there have been no in-depth studies of their dynamics and communities because of the opacity of participants' transactions. In this paper, we present an empirical study of For… ▽ More

    Submitted 24 August, 2021; v1 submitted 10 May, 2021; originally announced May 2021.

    Comments: 17 pages, 13 figures

  6. arXiv:1912.07497  [pdf

    cs.CR

    BDoS: Blockchain Denial of Service

    Authors: Michael Mirkin, Yan Ji, Jonathan Pang, Ariah Klages-Mundt, Ittay Eyal, Ari Juels

    Abstract: Proof-of-work (PoW) cryptocurrency blockchains like Bitcoin secure vast amounts of money. Their operators, called miners, expend resources to generate blocks and receive monetary rewards for their effort. Blockchains are, in principle, attractive targets for Denial-of-Service (DoS) attacks: There is fierce competition among coins, as well as potential gains from short selling. Classical DoS attack… ▽ More

    Submitted 4 November, 2020; v1 submitted 16 December, 2019; originally announced December 2019.

  7. arXiv:1912.01798  [pdf, other

    cs.CR

    SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Reinforcement Learning

    Authors: Charlie Hou, Mingxun Zhou, Yan Ji, Phil Daian, Florian Tramer, Giulia Fanti, Ari Juels

    Abstract: Incentive mechanisms are central to the functionality of permissionless blockchains: they incentivize participants to run and secure the underlying consensus protocol. Designing incentive-compatible incentive mechanisms is notoriously challenging, however. As a result, most public blockchains today use incentive mechanisms whose security properties are poorly understood and largely untested. In th… ▽ More

    Submitted 4 August, 2020; v1 submitted 3 December, 2019; originally announced December 2019.

  8. DECO: Liberating Web Data Using Decentralized Oracles for TLS

    Authors: Fan Zhang, Sai Krishna Deepak Maram, Harjasleen Malvai, Steven Goldfeder, Ari Juels

    Abstract: Thanks to the widespread deployment of TLS, users can access private data over channels with end-to-end confidentiality and integrity. What they cannot do, however, is prove to third parties the {\em provenance} of such data, i.e., that it genuinely came from a particular website. Existing approaches either introduce undesirable trust assumptions or require server-side modifications. As a result… ▽ More

    Submitted 6 March, 2023; v1 submitted 2 September, 2019; originally announced September 2019.

    Comments: This is the extended version of the CCS'20 paper

  9. arXiv:1904.05234  [pdf, other

    cs.CR cs.GT

    Flash Boys 2.0: Frontrunning, Transaction Reordering, and Consensus Instability in Decentralized Exchanges

    Authors: Philip Daian, Steven Goldfeder, Tyler Kell, Yunqi Li, Xueyuan Zhao, Iddo Bentov, Lorenz Breidenbach, Ari Juels

    Abstract: Blockchains, and specifically smart contracts, have promised to create fair and transparent trading ecosystems. Unfortunately, we show that this promise has not been met. We document and quantify the widespread and rising deployment of arbitrage bots in blockchain systems, specifically in decentralized exchanges (or "DEXes"). Like high-frequency traders on Wall Street, these bots exploit ineffic… ▽ More

    Submitted 10 April, 2019; originally announced April 2019.

  10. Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contract Execution

    Authors: Raymond Cheng, Fan Zhang, Jernej Kos, Warren He, Nicholas Hynes, Noah Johnson, Ari Juels, Andrew Miller, Dawn Song

    Abstract: Smart contracts are applications that execute on blockchains. Today they manage billions of dollars in value and motivate visionary plans for pervasive blockchain deployment. While smart contracts inherit the availability and other security assurances of blockchains, however, they are impeded by blockchains' lack of confidentiality and poor performance. We present Ekiden, a system that addresses… ▽ More

    Submitted 26 August, 2019; v1 submitted 13 April, 2018; originally announced April 2018.

  11. arXiv:1609.02943  [pdf, other

    cs.CR cs.LG stat.ML

    Stealing Machine Learning Models via Prediction APIs

    Authors: Florian Tramèr, Fan Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart

    Abstract: Machine learning (ML) models may be deemed confidential due to their sensitive training data, commercial value, or use in security applications. Increasingly often, confidential ML models are being deployed with publicly accessible query interfaces. ML-as-a-service ("predictive analytics") systems are an example: Some allow users to train models on potentially sensitive data and charge others for… ▽ More

    Submitted 2 October, 2016; v1 submitted 9 September, 2016; originally announced September 2016.

    Comments: 19 pages, 7 figures, Proceedings of USENIX Security 2016

  12. arXiv:1510.02377  [pdf, other

    cs.CY

    FairTest: Discovering Unwarranted Associations in Data-Driven Applications

    Authors: Florian Tramèr, Vaggelis Atlidakis, Roxana Geambasu, Daniel Hsu, Jean-Pierre Hubaux, Mathias Humbert, Ari Juels, Huang Lin

    Abstract: In a world where traditional notions of privacy are increasingly challenged by the myriad companies that collect and analyze our data, it is important that decision-making entities are held accountable for unfair treatments arising from irresponsible data usage. Unfortunately, a lack of appropriate methodologies and tools means that even identifying unfair or discriminatory effects can be a challe… ▽ More

    Submitted 16 August, 2016; v1 submitted 8 October, 2015; originally announced October 2015.

    Comments: 27 pages, 12 figures