Fan Zhang

Orcid: 0000-0002-8525-4514

Affiliations:
  • Yale University, New Haven, CT USA
  • Cornell University, Cornell Tech, New York City, NY, USA (former)


According to our database1, Fan Zhang authored at least 39 papers between 2015 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Artifact for Paper "Agora: Trust Less and Open More in Verification for Confidential Computing" in OOPSLA 2025.
Dataset, August, 2025

Insecurity Through Obscurity: Veiled Vulnerabilities in Closed-Source Contracts.
CoRR, April, 2025

AUCIL: An Inclusion List Design for Rational Parties.
IACR Cryptol. ePrint Arch., 2025

Decentralization of Ethereum's Builder Market.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

2024
$\mathsf {monoCash}$monoCash: A Channel-Free Payment Network via Trusted Monotonic Counters.
IEEE Trans. Dependable Secur. Comput., 2024

ZIPNet: Low-bandwidth anonymous broadcast from (dis)Trusted Execution Environments.
IACR Cryptol. ePrint Arch., 2024

Mechanism Design for ZK-Rollup Prover Markets.
CoRR, 2024

Sprints: Intermittent Blockchain PoW Mining.
Proceedings of the 33rd USENIX Security Symposium, 2024

SoK: MEV Countermeasures.
Proceedings of the Workshop on Decentralized Finance and Security, 2024

Unpacking Long-Latency Transactions in Ethereum.
Proceedings of the Workshop on Decentralized Finance and Security, 2024

Data Independent Order Policy Enforcement: Limitations and Solutions.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

CrudiTEE: A Stick-And-Carrot Approach to Building Trustworthy Cryptocurrency Wallets with TEEs.
Proceedings of the 6th Conference on Advances in Financial Technologies, 2024

2023
Breaking the Chains of Rationality: Understanding the Limitations to and Obtaining Order Policy Enforcement.
IACR Cryptol. ePrint Arch., 2023

Understand Waiting Time in Transaction Fee Mechanism: An Interdisciplinary Perspective.
CoRR, 2023

He-HTLC: Revisiting Incentives in HTLC.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

To Broadcast or Not to Broadcast: Decision-Making Strategies for Mining Empty Blocks.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

MISO: Legacy-compatible Privacy-preserving Single Sign-on using Trusted Execution Environments.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

The Locality of Memory Checking.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

DeFi '23: Workshop on Decentralized Finance and Security.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
SoK: MEV Countermeasures: Theory and Practice.
CoRR, 2022

Empirical Analysis of EIP-1559: Transaction Fees, Waiting Time, and Consensus Security.
CoRR, 2022

zkBridge: Trustless Cross-chain Bridges Made Practical.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Empirical Analysis of EIP-1559: Transaction Fees, Waiting Times, and Consensus Security.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

2020
Order-Fairness for Byzantine Consensus.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

DECO: Liberating Web Data Using Decentralized Oracles for TLS.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

CHURP: Dynamic-Committee Proactive Secret Sharing.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Tesseract: Real-Time Cryptocurrency Exchange Using Trusted Hardware.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Paralysis Proofs: Secure Dynamic Access Structures for Cryptocurrency Custody and More.
Proceedings of the 1st ACM Conference on Advances in Financial Technologies, 2019

2018
Paralysis Proofs: Safe Access-Structure Updates for Cryptocurrencies and More.
IACR Cryptol. ePrint Arch., 2018

Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contract Execution.
CoRR, 2018

2017
Tesseract: Real-Time Cryptocurrency Exchange using Trusted Hardware.
IACR Cryptol. ePrint Arch., 2017

REM: Resource-Efficient Mining for Blockchains.
Proceedings of the 26th USENIX Security Symposium, 2017

Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

Solidus: Confidential Distributed Ledger Transactions via PVORM.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Stealing Machine Learning Models via Prediction APIs.
Proceedings of the 25th USENIX Security Symposium, 2016

Town Crier: An Authenticated Data Feed for Smart Contracts.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
PlateClick: Bootstrapping Food Preferences Through an Adaptive Visual Interface.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015


  Loading...