Aviv Zohar

Orcid: 0000-0001-8539-9222

Affiliations:
  • The Hebrew University of Jerusalem, Israel


According to our database1, Aviv Zohar authored at least 77 papers between 2005 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Speculative Denial-of-Service Attacks in Ethereum.
IACR Cryptol. ePrint Arch., 2023

Suboptimality in DeFi.
IACR Cryptol. ePrint Arch., 2023

Security of Blockchains at Capacity.
IACR Cryptol. ePrint Arch., 2023

The Vulnerable Nature of Decentralized Governance in DeFi.
Proceedings of the 2023 Workshop on Decentralized Finance and Security, 2023

Correct Cryptocurrency ASIC Pricing: Are Miners Overpaying?
Proceedings of the 5th Conference on Advances in Financial Technologies, 2023

2022
Redesigning Bitcoin's Fee Market.
ACM Trans. Economics and Comput., 2022

Uncle Maker: (Time)Stamping Out The Competition in Ethereum.
IACR Cryptol. ePrint Arch., 2022

Twilight: A Differentially Private Payment Channel Network.
IACR Cryptol. ePrint Arch., 2022

Survey on Blockchain Networking: Context, State-of-the-Art, Challenges.
ACM Comput. Surv., 2022

Validated Byzantine Asynchronous Multidimensional Approximate Agreement.
CoRR, 2022

Blockchain Stretching & Squeezing: Manipulating Time for Your Best Interest.
Proceedings of the EC '22: The 23rd ACM Conference on Economics and Computation, Boulder, CO, USA, July 11, 2022

Sliding Window Challenge Process for Congestion Detection.
Proceedings of the Financial Cryptography and Data Security, 2022

How to Charge Lightning: The Economics of Bitcoin Transaction Channels.
Proceedings of the 58th Annual Allerton Conference on Communication, 2022

2021
Congestion Attacks in Payment Channel Networks.
Proceedings of the Financial Cryptography and Data Security, 2021

PHANTOM GHOSTDAG: a scalable generalization of Nakamoto consensus: September 2, 2021.
Proceedings of the AFT '21: 3rd ACM Conference on Advances in Financial Technologies, Arlington, Virginia, USA, September 26, 2021

2020
Virtual ASICs: Generalized Proof-of-Stake Mining in Cryptocurrencies.
IACR Cryptol. ePrint Arch., 2020

Survey on Cryptocurrency Networking: Context, State-of-the-Art, Challenges.
CoRR, 2020

Optimizing Off-Chain Payment Networks in Cryptocurrencies.
CoRR, 2020

Pricing ASICs for Cryptocurrency Mining.
CoRR, 2020

Responsible vulnerability disclosure in cryptocurrencies.
Commun. ACM, 2020

Reasoning about the Future in Blockchain Databases.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

How to Pick Your Friends A Game Theoretic Approach to P2P Overlay Construction.
Proceedings of the AFT '20: 2nd ACM Conference on Advances in Financial Technologies, 2020

Route Hijacking and DoS in Off-Chain Networks.
Proceedings of the AFT '20: 2nd ACM Conference on Advances in Financial Technologies, 2020

Flood & Loot: A Systemic Attack on The Lightning Network.
Proceedings of the AFT '20: 2nd ACM Conference on Advances in Financial Technologies, 2020

SOK: cryptocurrency networking context, state-of-the-art, challenges.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Hijacking Routes in Payment Channel Networks: A Predictability Tradeoff.
CoRR, 2019

2018
PHANTOM: A Scalable BlockDAG Protocol.
IACR Cryptol. ePrint Arch., 2018

Database Perspectives on Blockchains.
CoRR, 2018

Bitcoin's underlying incentives.
Commun. ACM, 2018

Avoiding Deadlocks in Payment Channel Networks.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018

2017
How to Charge Lightning.
CoRR, 2017

Recent trends in decentralized cryptocurrencies (invited talk).
Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, 2017

Hijacking Bitcoin: Routing Attacks on Cryptocurrencies.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Securing and scaling cryptocurrencies.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

Memory-Based Mechanisms for Economic Agents.
Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, 2017

2016
The Axiomatic Approach and the Internet.
Proceedings of the Handbook of Computational Social Choice, 2016

SPECTRE: A Fast and Scalable Cryptocurrency Protocol.
IACR Cryptol. ePrint Arch., 2016

Bitcoin's Security Model Revisited.
CoRR, 2016

Hijacking Bitcoin: Large-scale Network Attacks on Cryptocurrencies.
CoRR, 2016

Online Pricing with Strategic and Patient Buyers.
Proceedings of the Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016, 2016

Optimal Selfish Mining Strategies in Bitcoin.
Proceedings of the Financial Cryptography and Data Security, 2016

2015
Eclipse Attacks on Bitcoin's Peer-to-Peer Network.
IACR Cryptol. ePrint Arch., 2015

An Axiomatic Approach to Routing.
Proceedings of the Proceedings Fifteenth Conference on Theoretical Aspects of Rationality and Knowledge, 2015

Bitcoin: under the hood.
Commun. ACM, 2015

Secure High-Rate Transaction Processing in Bitcoin.
Proceedings of the Financial Cryptography and Data Security, 2015

Inclusive Block Chain Protocols.
Proceedings of the Financial Cryptography and Data Security, 2015

Bitcoin Mining Pools: A Cooperative Game Theoretic Analysis.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

An Axiomatic Approach to Link Prediction.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2013
Accelerating Bitcoin's Transaction Processing. Fast Money Grows on Trees, Not Chains.
IACR Cryptol. ePrint Arch., 2013

2012
Economics of BitTorrent communities.
Proceedings of the 21st World Wide Web Conference 2012, 2012

2011
When is it best to best-respond?
SIGecom Exch., 2011

On Bitcoin and red balloons.
SIGecom Exch., 2011

Interdomain Routing and Games.
SIAM J. Comput., 2011

Best-response auctions.
Proceedings of the Proceedings 12th ACM Conference on Electronic Commerce (EC-2011), 2011

Mechanisms for multi-level marketing.
Proceedings of the Proceedings 12th ACM Conference on Electronic Commerce (EC-2011), 2011

Incentive-compatible distributed greedy protocols.
Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, 2011

Best-Response Mechanisms.
Proceedings of the Innovations in Computer Science, 2011

Exploiting Problem Symmetries in State-Based Planners.
Proceedings of the Twenty-Fifth AAAI Conference on Artificial Intelligence, 2011

2010
A game theoretic approach to communication protocols (עם תקציר בעברית, תכן ושער נוסף: ניתוח ותכנון פרוטוקטלי תקשורת בעזרת תורת המשחקים.).
PhD thesis, 2010

Incentive compatibility and dynamics of congestion control.
Proceedings of the SIGMETRICS 2010, 2010

Search Space Reduction Using Swamp Hierarchies.
Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence, 2010

Competing Schedulers.
Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence, 2010

2009
The learnability of voting rules.
Artif. Intell., 2009

Searching for Stability in Interdomain Routing.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Adding incentives to file-sharing systems.
Proceedings of the 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), 2009

Learning equilibria in repeated congestion games.
Proceedings of the 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), 2009

Using swamps to improve optimal pathfinding.
Proceedings of the 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), 2009

2008
On the complexity of achieving proportional representation.
Soc. Choice Welf., 2008

Complexity of Strategic Behavior in Multi-Winner Elections.
J. Artif. Intell. Res., 2008

Mechanisms for information elicitation.
Artif. Intell., 2008

Asynchronous Best-Reply Dynamics.
Proceedings of the Internet and Network Economics, 4th International Workshop, 2008

Automated design of scoring rules by learning from examples.
Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008), 2008

2007
Multi-Winner Elections: Complexity of Manipulation, Control and Winner-Determination.
Proceedings of the IJCAI 2007, 2007

Learning Voting Trees.
Proceedings of the Twenty-Second AAAI Conference on Artificial Intelligence, 2007

2006
Robust Mechanisms for Information Elicitation.
Proceedings of the Proceedings, 2006

Mechanisms for Partial Information Elicitation: The Truth, but Not the Whole Truth.
Proceedings of the Proceedings, 2006

2005
Using tags to evolve trust and cooperation between groups.
Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), 2005


  Loading...