Arthur Gervais

Orcid: 0000-0002-3565-3410

According to our database1, Arthur Gervais authored at least 77 papers between 2013 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Multi-Agent Penetration Testing AI for the Web.
CoRR, August, 2025

AI Agent Smart Contract Exploit Generation.
CoRR, July, 2025

Decompiling Smart Contracts with a Large Language Model.
CoRR, June, 2025

AuthorMist: Evading AI Text Detectors with Reinforcement Learning.
CoRR, March, 2025

Enhancing Smart Contract Security Analysis with Execution Property Graphs.
Proc. ACM Softw. Eng., 2025

Blockchain Amplification Attack.
Proceedings of the Abstracts of the 2025 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2025

2024
# Artifact: Smart Contract and DeFi Security Tools: Do They Meet the Needs of Practitioners?
Dataset, January, 2024

# Artifact: Smart Contract and DeFi Security Tools: Do They Meet the Needs of Practitioners?
Dataset, January, 2024

# Artifact: Smart Contract and DeFi Security Tools: Do They Meet the Needs of Practitioners?
Dataset, January, 2024

ORIGO: Proving Provenance of Sensitive Data with Constant Communication.
IACR Cryptol. ePrint Arch., 2024

Do You Need a Zero Knowledge Proof?
IACR Cryptol. ePrint Arch., 2024

Blockchain Economic Denial of Sustainability Attack: Exploiting Latency Optimization in Ethereum Transaction Forwarding.
CoRR, 2024


Speculative Denial-of-Service Attacks In Ethereum.
Proceedings of the 33rd USENIX Security Symposium, 2024

zk-Bench: A Toolset for Comparative Evaluation and Performance Benchmarking of SNARKs.
Proceedings of the Security and Cryptography for Networks - 14th International Conference, 2024

Hunting DeFi Vulnerabilities via Context-Sensitive Concolic Verification.
Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings, 2024

Smart Contract and DeFi Security Tools: Do They Meet the Needs of Practitioners?
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

What Drives the (In)stability of a Stablecoin?
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2024

2023
# Artifact: Smart Contract and DeFi Security Tools: Do They Meet the Needs of Practitioners?
Dataset, December, 2023

Suboptimality in DeFi.
IACR Cryptol. ePrint Arch., 2023

Time to Bribe: Measuring Block Construction Market.
IACR Cryptol. ePrint Arch., 2023

Leveraging Machine Learning for Bidding Strategies in Miner Extractable Value (MEV) Auctions.
IACR Cryptol. ePrint Arch., 2023

Blockchain Large Language Models.
IACR Cryptol. ePrint Arch., 2023

What Drives the (In)stability of a Stablecoin?
CoRR, 2023

Do you still need a manual smart contract audit?
CoRR, 2023

Towards Automated Security Analysis of Smart Contracts based on Execution Property Graph.
CoRR, 2023

Smart Contract and DeFi Security: Insights from Tool Evaluations and Practitioner Surveys.
CoRR, 2023

Exploring the Advantages of Transformers for High-Frequency Trading.
CoRR, 2023

On How Zero-Knowledge Proof Blockchain Mixers Improve, and Worsen User Privacy.
Proceedings of the ACM Web Conference 2023, 2023

The Blockchain Imitation Game.
Proceedings of the 32nd USENIX Security Symposium, 2023

SoK: Decentralized Finance (DeFi) Attacks.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Mitigating Decentralized Finance Liquidations with Reversible Call Options.
Proceedings of the Financial Cryptography and Data Security, 2023

DeFi Auditing: Mechanisms, Effectiveness, and User Perceptions.
Proceedings of the Financial Cryptography and Data Security. FC 2023 International Workshops, 2023

SoK: Data Sovereignty.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

2022
Security of Decentralized Financial Technologies (Dagstuhl Seminar 22421).
Dagstuhl Reports, October, 2022

A study of inline assembly in solidity smart contracts.
Proc. ACM Program. Lang., 2022

SoK: Decentralized Finance (DeFi) Incidents.
CoRR, 2022

Quantifying Blockchain Extractable Value: How dark is the forest?
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Finding typing compiler bugs.
Proceedings of the PLDI '22: 43rd ACM SIGPLAN International Conference on Programming Language Design and Implementation, San Diego, CA, USA, June 13, 2022

Speculative Multipliers on DeFi: Quantifying On-Chain Leverage Risks.
Proceedings of the Financial Cryptography and Data Security, 2022

2021
Proof of Steak.
CoRR, 2021

Towards Private On-Chain Algorithmic Trading.
CoRR, 2021

CeFi vs. DeFi - Comparing Centralized to Decentralized Finance.
CoRR, 2021

A2MM: Mitigating Frontrunning, Transaction Reordering and Consensus Instability in Decentralized Exchanges.
CoRR, 2021

High-Frequency Trading on Decentralized On-Chain Exchanges.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

An empirical study of DeFi liquidations: incentives, risks, and instabilities.
Proceedings of the IMC '21: ACM Internet Measurement Conference, 2021

The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts.
Proceedings of the Financial Cryptography and Data Security, 2021

Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit.
Proceedings of the Financial Cryptography and Data Security, 2021

ConFuzzius: A Data Dependency-Aware Hybrid Fuzzer for Smart Contracts.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

AMR: autonomous coin mixer with privacy preserving reward distribution.
Proceedings of the 3rd ACM Conference on Advances in Financial Technologies, 2021

2020
Towards Smart Hybrid Fuzzing for Smart Contracts.
CoRR, 2020

The Decentralized Financial Crisis: Attacking DeFi.
CoRR, 2020

SoK: Layer-Two Blockchain Protocols.
Proceedings of the Financial Cryptography and Data Security, 2020

FileBounty: Fair Data Exchange.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

The Decentralized Financial Crisis.
Proceedings of the Crypto Valley Conference on Blockchain Technology, 2020

2019
TEX - A Securely Scalable Trustless Exchange.
IACR Cryptol. ePrint Arch., 2019

SoK: Off The Chain Transactions.
IACR Cryptol. ePrint Arch., 2019

XCLAIM: Trustless, Interoperable, Cryptocurrency-Backed Assets.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Applying Private Information Retrieval to Lightweight Bitcoin Clients.
Proceedings of the Crypto Valley Conference on Blockchain Technology, 2019

Balance: Dynamic Adjustment of Cryptocurrency Deposits.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
NOCUST - A Non-Custodial 2nd-Layer Financial Intermediary.
IACR Cryptol. ePrint Arch., 2018

TLS-N: Non-repudiation over TLS Enablign Ubiquitous Content Signing.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Do you Need a Blockchain?
Proceedings of the Crypto Valley Conference on Blockchain Technology, 2018

Securify: Practical Security Analysis of Smart Contracts.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
TLS-N: Non-repudiation over TLS Enabling - Ubiquitous Content Signing for Disintermediation.
IACR Cryptol. ePrint Arch., 2017

ROTE: Rollback Protection for Trusted Execution.
Proceedings of the 26th USENIX Security Symposium, 2017

Quantifying Web Adblocker Privacy.
Proceedings of the Computer Security - ESORICS 2017, 2017

Revive: Rebalancing Off-Blockchain Payment Networks.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Quantifying Location Privacy Leakage from Transaction Prices.
Proceedings of the Computer Security - ESORICS 2016, 2016

On the Security and Performance of Proof of Work Blockchains.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Misbehavior in Bitcoin: A Study of Double-Spending and Accountability.
ACM Trans. Inf. Syst. Secur., 2015

Quantifying Location Privacy Leakage from Transaction Prices.
IACR Cryptol. ePrint Arch., 2015

Tampering with the Delivery of Blocks and Transactions in Bitcoin.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Quantifying Web-Search Privacy.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

On the privacy provisions of Bloom filters in lightweight bitcoin clients.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Is Bitcoin a Decentralized Currency?
IACR Cryptol. ePrint Arch., 2013


  Loading...