STAKESURE: Proof of Stake Mechanisms with Strong Cryptoeconomic Safety
This article investigates the cryptoeconomic safety of Proof of Stake (PoS) blockchains like Ethereum, which despite having…
This article investigates the cryptoeconomic safety of Proof of Stake (PoS) blockchains like Ethereum, which despite having…
Smart Grid networks, which rely on advanced technologies for energy generation, distribution, and consumption, are increasingly susceptible…
This paper reviews the techniques for analyzing WebAssembly, a bytecode language that allows high-level languages to be…
The paper discusses the concept of Conditional Information Reveal (CIR), an automated system that reveals information upon…
The article discusses the role of Application Layer Gateways (ALGs) in securing critical systems such as railways,…
This academic article delves into the security risks of unlabeled data in model adaptation, focusing on potential…
This study investigates adversarial attacks through the lens of diffusion models, but not for enhancing the adversarial…
This article presents a study on the feasibility of implementing a spatial-provenance framework in Vehicle-to-Everything (V2X) networks…
The article presents a novel method for protecting analog Intellectual Property (IP) in Integrated Circuits (ICs) by…