Follow
Philip Daian
Philip Daian
PhD Student, Cornell University
Verified email at cs.cornell.edu - Homepage
Title
Cited by
Cited by
Year
Kevm: A complete formal semantics of the ethereum virtual machine
E Hildenbrandt, M Saxena, N Rodrigues, X Zhu, P Daian, D Guth, ...
2018 IEEE 31st Computer Security Foundations Symposium (CSF), 204-217, 2018
4192018
Flash boys 2.0: Frontrunning in decentralized exchanges, miner extractable value, and consensus instability
P Daian, S Goldfeder, T Kell, Y Li, X Zhao, I Bentov, L Breidenbach, ...
2020 IEEE Symposium on Security and Privacy (SP), 910-927, 2020
3872020
Flash boys 2.0: Frontrunning, transaction reordering, and consensus instability in decentralized exchanges
P Daian, S Goldfeder, T Kell, Y Li, X Zhao, I Bentov, L Breidenbach, ...
arXiv preprint arXiv:1904.05234, 2019
2552019
Snow White: Robustly Reconfigurable Consensus and Applications to Provably Secure Proof of Stake
P Daian, R Pass, E Shi
Financial Cryptography and Data Security: 23rd International Conference, FC …, 2019
2472019
Tesseract: Real-time cryptocurrency exchange using trusted hardware
I Bentov, Y Ji, F Zhang, L Breidenbach, P Daian, A Juels
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
1832019
A formal verification tool for Ethereum VM bytecode
D Park, Y Zhang, M Saxena, P Daian, G Roşu
Proceedings of the 2018 26th ACM joint meeting on european software …, 2018
1152018
Enter the hydra: Towards principled bug bounties and {Exploit-Resistant} smart contracts
L Breidenbach, P Daian, F Tramèr, A Juels
27th USENIX Security Symposium (USENIX Security 18), 1335-1352, 2018
1092018
Kevm: A complete semantics of the ethereum virtual machine
E Hildenbrandt, M Saxena, X Zhu, N Rodrigues, P Daian, D Guth, G Roşu
952017
SquirRL: Automating attack analysis on blockchain incentive mechanisms with deep reinforcement learning
C Hou, M Zhou, Y Ji, P Daian, F Tramer, G Fanti, A Juels
arXiv preprint arXiv:1912.01798, 2019
832019
Analysis of the DAO exploit
P Daian
Hacking, Distributed 6, 2016
822016
Analysis of the DAO exploit
P Daian
Hacking, Distributed 6, 2016
822016
Snow white: Provably secure proofs of stake
P Daian, R Pass, E Shi
Cryptology ePrint Archive, Report 2016/919, 2016
702016
Real-time cryptocurrency exchange using trusted hardware
I Bentov, A Juels, F Zhang, P Daian, L Breidenbach
US Patent 11,244,309, 2022
512022
Clockwork finance: Automated analysis of economic security in smart contracts
K Babel, P Daian, M Kelkar, A Juels
2023 IEEE Symposium on Security and Privacy (SP), 2499-2516, 2023
472023
An in-depth look at the parity multisig bug
L Breidenbach, P Daian, A Juels, EG Sirer
Hacking, Distributed, July, 2017
462017
Rv-android: Efficient parametric android runtime verification, a brief tutorial
P Daian, Y Falcone, P Meredith, TF Şerbănuţă, S Shiriashi, A Iwai, ...
Runtime Verification: 6th International Conference, RV 2015, Vienna, Austria …, 2015
272015
Unity is strength: A formalization of cross-domain maximal extractable value
A Obadia, A Salles, L Sankar, T Chitra, V Chellani, P Daian
arXiv preprint arXiv:2112.01472, 2021
262021
PieceWork: Generalized Outsourcing Control for Proofs of Work
P Daian, EG Sirer, I Eyal, A Juels
BITCOIN'17, 2017
25*2017
On-chain vote buying and the rise of dark DAOs
P Daian, T Kell, I Miers, A Juels
Hacking, Distributed, 2018
192018
Analysis of the DAO exploit (2016)
P Daian
URL: http://hackingdistributed. com/2016/06/18/analysis-of-thedao-exploit …, 2021
152021
The system can't perform the operation now. Try again later.
Articles 1–20