Arthur Gervais

Orcid: 0000-0002-3565-3410

According to our database1, Arthur Gervais authored at least 63 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Do You Need a Zero Knowledge Proof?
IACR Cryptol. ePrint Arch., 2024

Smart Contract and DeFi Security Tools: Do They Meet the Needs of Practitioners?
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

2023
Speculative Denial-of-Service Attacks in Ethereum.
IACR Cryptol. ePrint Arch., 2023

Suboptimality in DeFi.
IACR Cryptol. ePrint Arch., 2023

On How Zero-Knowledge Proof Blockchain Mixers Improve, and Worsen User Privacy.
IACR Cryptol. ePrint Arch., 2023

Time to Bribe: Measuring Block Construction Market.
IACR Cryptol. ePrint Arch., 2023

Leveraging Machine Learning for Bidding Strategies in Miner Extractable Value (MEV) Auctions.
IACR Cryptol. ePrint Arch., 2023

Mitigating Decentralized Finance Liquidations with Reversible Call Options.
IACR Cryptol. ePrint Arch., 2023

Blockchain Large Language Models.
IACR Cryptol. ePrint Arch., 2023

DeFi Auditing: Mechanisms, Effectiveness, and User Perceptions.
IACR Cryptol. ePrint Arch., 2023

SoK: Data Sovereignty.
IACR Cryptol. ePrint Arch., 2023

zk-Bench: A Toolset for Comparative Evaluation and Performance Benchmarking of SNARKs.
IACR Cryptol. ePrint Arch., 2023

What Drives the (In)stability of a Stablecoin?
CoRR, 2023

Do you still need a manual smart contract audit?
CoRR, 2023

Blockchain Censorship.
CoRR, 2023

Towards Automated Security Analysis of Smart Contracts based on Execution Property Graph.
CoRR, 2023

Smart Contract and DeFi Security: Insights from Tool Evaluations and Practitioner Surveys.
CoRR, 2023

Exploring the Advantages of Transformers for High-Frequency Trading.
CoRR, 2023

The Blockchain Imitation Game.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
Security of Decentralized Financial Technologies (Dagstuhl Seminar 22421).
Dagstuhl Reports, October, 2022

A study of inline assembly in solidity smart contracts.
Proc. ACM Program. Lang., 2022

SoK: Decentralized Finance (DeFi) Attacks.
IACR Cryptol. ePrint Arch., 2022

SoK: Decentralized Finance (DeFi) Incidents.
CoRR, 2022

Quantifying Blockchain Extractable Value: How dark is the forest?
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Finding typing compiler bugs.
Proceedings of the PLDI '22: 43rd ACM SIGPLAN International Conference on Programming Language Design and Implementation, San Diego, CA, USA, June 13, 2022

Speculative Multipliers on DeFi: Quantifying On-Chain Leverage Risks.
Proceedings of the Financial Cryptography and Data Security, 2022

2021
The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts.
IACR Cryptol. ePrint Arch., 2021

Proof of Steak.
CoRR, 2021

Towards Private On-Chain Algorithmic Trading.
CoRR, 2021

CeFi vs. DeFi - Comparing Centralized to Decentralized Finance.
CoRR, 2021

A2MM: Mitigating Frontrunning, Transaction Reordering and Consensus Instability in Decentralized Exchanges.
CoRR, 2021

High-Frequency Trading on Decentralized On-Chain Exchanges.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

An empirical study of DeFi liquidations: incentives, risks, and instabilities.
Proceedings of the IMC '21: ACM Internet Measurement Conference, 2021

Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit.
Proceedings of the Financial Cryptography and Data Security, 2021

ConFuzzius: A Data Dependency-Aware Hybrid Fuzzer for Smart Contracts.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

AMR: autonomous coin mixer with privacy preserving reward distribution.
Proceedings of the AFT '21: 3rd ACM Conference on Advances in Financial Technologies, Arlington, Virginia, USA, September 26, 2021

2020
Towards Smart Hybrid Fuzzing for Smart Contracts.
CoRR, 2020

The Decentralized Financial Crisis: Attacking DeFi.
CoRR, 2020

SoK: Layer-Two Blockchain Protocols.
Proceedings of the Financial Cryptography and Data Security, 2020

FileBounty: Fair Data Exchange.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

The Decentralized Financial Crisis.
Proceedings of the Crypto Valley Conference on Blockchain Technology, 2020

2019
TEX - A Securely Scalable Trustless Exchange.
IACR Cryptol. ePrint Arch., 2019

Balance : Dynamic Adjustment of Cryptocurrency Deposits.
IACR Cryptol. ePrint Arch., 2019

SoK: Off The Chain Transactions.
IACR Cryptol. ePrint Arch., 2019

XCLAIM: Trustless, Interoperable, Cryptocurrency-Backed Assets.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Applying Private Information Retrieval to Lightweight Bitcoin Clients.
Proceedings of the Crypto Valley Conference on Blockchain Technology, 2019

2018
NOCUST - A Non-Custodial 2nd-Layer Financial Intermediary.
IACR Cryptol. ePrint Arch., 2018

TLS-N: Non-repudiation over TLS Enablign Ubiquitous Content Signing.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Securify: Practical Security Analysis of Smart Contracts.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Do you need a Blockchain?
IACR Cryptol. ePrint Arch., 2017

TLS-N: Non-repudiation over TLS Enabling - Ubiquitous Content Signing for Disintermediation.
IACR Cryptol. ePrint Arch., 2017

ROTE: Rollback Protection for Trusted Execution.
IACR Cryptol. ePrint Arch., 2017

Revive: Rebalancing Off-Blockchain Payment Networks.
IACR Cryptol. ePrint Arch., 2017

2016
On the Security and Performance of Proof of Work Blockchains.
IACR Cryptol. ePrint Arch., 2016

Quantifying Web Adblocker Privacy.
IACR Cryptol. ePrint Arch., 2016

Quantifying Location Privacy Leakage from Transaction Prices.
Proceedings of the Computer Security - ESORICS 2016, 2016

2015
Misbehavior in Bitcoin: A Study of Double-Spending and Accountability.
ACM Trans. Inf. Syst. Secur., 2015

Quantifying Location Privacy Leakage from Transaction Prices.
IACR Cryptol. ePrint Arch., 2015

Tampering with the Delivery of Blocks and Transactions in Bitcoin.
IACR Cryptol. ePrint Arch., 2015

2014
Is Bitcoin a Decentralized Currency?
IEEE Secur. Priv., 2014

On the Privacy Provisions of Bloom Filters in Lightweight Bitcoin Clients.
IACR Cryptol. ePrint Arch., 2014

Quantifying Web-Search Privacy.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014


  Loading...