Skip to content

Commit 1527c08

Browse files
committed
edited bib
1 parent 5032a71 commit 1527c08

File tree

1 file changed

+36
-48
lines changed

1 file changed

+36
-48
lines changed

_bibliography/papers.bib

Lines changed: 36 additions & 48 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@ @INPROCEEDINGS{DICG25
66
booktitle={ICDCS 2025 Workshop - The 5th International Workshop on Distributed Infrastructure for Common Good (DICG)},
77
title={180 Days After EIP-4844: Will Blob Sharing Solve Dilemma for Small Rollups?},
88
year={2025},
9+
month={July},
910
volume={},
1011
number={},
1112
pages={},
@@ -18,27 +19,12 @@ @INPROCEEDINGS{DICG25
1819
}
1920

2021

21-
@INPROCEEDINGS{WTSC25,
22-
author={Suhyeon Lee},
23-
booktitle={FC 2025 Workshop - The 9th Workshop on Trusted Smart Contracts (WTSC)},
24-
title={Hollow Victory: How Malicious Proposers Exploit Validator Incentives in Optimistic Rollup Dispute Games},
25-
year={2025},
26-
volume={},
27-
number={},
28-
pages={},
29-
keywords={Ethereum, Game Theory, Optimistic Rollup, Security, Smart Contract},
30-
abstract={Blockchain systems, such as Ethereum, are increasingly adopting layer-2 scaling solutions to improve transaction throughput and reduce fees. One popular layer-2 approach is the Optimistic Rollup, which relies on a mechanism known as a dispute game for block proposals. In these systems, validators can challenge blocks that they believe contain errors, and a successful challenge results in the transfer of a portion of the proposer's deposit as a reward. In this paper, we reveal a structural vulnerability in the mechanism: validators may not be awarded a proper profit despite winning a dispute challenge. We develop a formal game-theoretic model of the dispute game and analyze several scenarios, including cases where the proposer controls some validators and cases where a secondary auction mechanism is deployed to induce additional participation. Our analysis demonstrates that under current designs, the competitive pressure from validators may be insufficient to deter malicious behavior. We find that increased validator competition, paradoxically driven by higher rewards or participation, can allow a malicious proposer to significantly lower their net loss by capturing value through mechanisms like auctions. To address this, we propose countermeasures such as an escrowed reward mechanism and a commit-reveal protocol. Our findings provide critical insights into enhancing the economic security of layer-2 scaling solutions in blockchain networks.},
31-
html={https://arxiv.org/abs/2504.05094},
32-
pdf={https://arxiv.org/pdf/2504.05094},
33-
doi={https://doi.org/10.48550/arXiv.2504.05094},
34-
preview={WTSC25.png}
35-
}
36-
3722
@INPROCEEDINGS{ICBC25,
3823
author={Suhyeon Lee, and Euisin Gee},
3924
booktitle={ICBC 2025 - IEEE International Conference on Blockchain and Cryptocurrency},
4025
title={Commit-Reveal²: Randomized Reveal Order Mitigates Last-Revealer Attacks in Commit-Reveal},
4126
year={2025},
27+
month={June},
4228
volume={},
4329
number={},
4430
pages={},
@@ -52,6 +38,24 @@ @INPROCEEDINGS{ICBC25
5238

5339

5440

41+
42+
@INPROCEEDINGS{WTSC25,
43+
author={Suhyeon Lee},
44+
booktitle={FC 2025 Workshop - The 9th Workshop on Trusted Smart Contracts (WTSC)},
45+
title={Hollow Victory: How Malicious Proposers Exploit Validator Incentives in Optimistic Rollup Dispute Games},
46+
year={2025},
47+
month={April},
48+
volume={},
49+
number={},
50+
pages={},
51+
keywords={Ethereum, Game Theory, Optimistic Rollup, Security, Smart Contract},
52+
abstract={Blockchain systems, such as Ethereum, are increasingly adopting layer-2 scaling solutions to improve transaction throughput and reduce fees. One popular layer-2 approach is the Optimistic Rollup, which relies on a mechanism known as a dispute game for block proposals. In these systems, validators can challenge blocks that they believe contain errors, and a successful challenge results in the transfer of a portion of the proposer's deposit as a reward. In this paper, we reveal a structural vulnerability in the mechanism: validators may not be awarded a proper profit despite winning a dispute challenge. We develop a formal game-theoretic model of the dispute game and analyze several scenarios, including cases where the proposer controls some validators and cases where a secondary auction mechanism is deployed to induce additional participation. Our analysis demonstrates that under current designs, the competitive pressure from validators may be insufficient to deter malicious behavior. We find that increased validator competition, paradoxically driven by higher rewards or participation, can allow a malicious proposer to significantly lower their net loss by capturing value through mechanisms like auctions. To address this, we propose countermeasures such as an escrowed reward mechanism and a commit-reveal protocol. Our findings provide critical insights into enhancing the economic security of layer-2 scaling solutions in blockchain networks.},
53+
html={https://arxiv.org/abs/2504.05094},
54+
pdf={https://arxiv.org/pdf/2504.05094},
55+
doi={https://doi.org/10.48550/arXiv.2504.05094},
56+
preview={WTSC25.png}
57+
}
58+
5559
@INPROCEEDINGS{ICBC24,
5660
author={Hojung Lee, and Suhyeon Lee, and Seungjoo Kim},
5761
booktitle={ICBC 2024 - IEEE International Conference on Blockchain and Cryptocurrency},
@@ -69,20 +73,22 @@ @INPROCEEDINGS{ICBC24
6973
}
7074

7175

72-
@ARTICLE{Access2023,
73-
author={Lee, Soohan and Lee, Suhyeon and Park, Jiwon and Kim, Kyoungmin and Lee, Kyungho},
74-
journal={IEEE Access},
75-
title={Hiding in the Crowd: Ransomware Protection by Adopting Camouflage and Hiding Strategy With the Link File},
76-
year={2023},
77-
volume={11},
78-
number={},
79-
pages={92693-92704},
80-
keywords={Ransomware;Behavioral sciences;Feature extraction;Monitoring;Encryption;Usability;Static analysis;Computer security;Malware;Cybersecurity;ransomware;avoidance mechanism;malware analysis},
81-
abstract = {Ransomware is a growing threat and is building ecosystems in the form of ransomware as a service (RaaS). While there have been diverse efforts to detect and mitigate such threats, techniques to bypass such countermeasures have advanced considerably. Since detecting all evolving threats has become challenging, there is a growing interest in developing proactive countermeasures that can minimize the damage even in environments where ransomware has already been executed. In this study, we gained insights from an attacker’s perspective by analyzing ransomware such as LockBit and derived a generic counterstrategy against features that are common in ransomware attacks. Our proposed method protects critical files from existing ransomware by applying a hiding strategy that poses a challenge to attackers in finding the target files. We also present best practices for implementing the strategy while considering both in terms of security and usability using the link file and improving the method through the addition of a linker and encrypted database to reduce the attack surface. By using real-world ransomware samples, our experiments show that the proposed method successfully protects valuable files against ransomware in a cost-effective manner.},
82-
html = {https://ieeexplore.ieee.org/abstract/document/10233856},
83-
pdf = {https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10233856},
84-
doi={10.1109/ACCESS.2023.3309879},
85-
preview={Access23-1.png}
76+
@article{shorting,
77+
abbr={CPE},
78+
bibtex_show={true},
79+
author = {Lee, Suhyeon and Kim, Seungjoo},
80+
title = {Shorting attack: Predatory, destructive short selling on Proof-of-Stake cryptocurrencies},
81+
journal = {Concurrency and Computation: Practice and Experience},
82+
volume = {35},
83+
number = {16},
84+
pages = {e6585},
85+
keywords = {blockchain, Proof-of-Stake, security, short selling},
86+
doi = {10.1002/cpe.6585},
87+
pdf = {https://onlinelibrary.wiley.com/doi/abs/10.1002/cpe.6585},
88+
eprint = {https://onlinelibrary.wiley.com/doi/pdf/10.1002/cpe.6585},
89+
abstract = {Summary Bitcoin introduced blockchain which is the transparent and decentralized way of recording the lists of digital currency transactions. Bitcoin's blockchain uses Proof-of-Work as a Sybil control mechanism. However, PoW wastes energy since it uses hash computing competitions to find a block. Hence, various alternative mechanisms have been proposed. Among them, Proof-of-Stake, which is based on the deposit, has been spotlighted. As opposed to Proof-of-Work, Proof-of-Stake requires nodes to have a certain amount of tokens (stake) in order to qualify to validate blocks. The “one-sentence philosophy” of proof of stake is not “security comes from burning energy,” but rather “security comes from putting up economic value-at-loss.” In this article, contrary to popular belief, we point out that this value-at-loss can be hedged by short selling or other financial products. We propose a “shorting attack,” which makes a profit by massive short selling and sabotage to a Proof-of-Stake-based cryptocurrency. The shorting attack implies that the security of Proof-of-Stake-based cryptocurrency can be vulnerable by a low stake ratio.},
90+
year = {2023},
91+
preview={CPE2021.png},
8692
}
8793

8894

@@ -170,24 +176,6 @@ @ARTICLE{9654201
170176
month={},
171177
}
172178

173-
@article{shorting,
174-
abbr={CPE},
175-
bibtex_show={true},
176-
author = {Lee, Suhyeon and Kim, Seungjoo},
177-
title = {Shorting attack: Predatory, destructive short selling on Proof-of-Stake cryptocurrencies},
178-
journal = {Concurrency and Computation: Practice and Experience},
179-
volume = {35},
180-
number = {16},
181-
pages = {e6585},
182-
keywords = {blockchain, Proof-of-Stake, security, short selling},
183-
doi = {10.1002/cpe.6585},
184-
pdf = {https://onlinelibrary.wiley.com/doi/abs/10.1002/cpe.6585},
185-
eprint = {https://onlinelibrary.wiley.com/doi/pdf/10.1002/cpe.6585},
186-
abstract = {Summary Bitcoin introduced blockchain which is the transparent and decentralized way of recording the lists of digital currency transactions. Bitcoin's blockchain uses Proof-of-Work as a Sybil control mechanism. However, PoW wastes energy since it uses hash computing competitions to find a block. Hence, various alternative mechanisms have been proposed. Among them, Proof-of-Stake, which is based on the deposit, has been spotlighted. As opposed to Proof-of-Work, Proof-of-Stake requires nodes to have a certain amount of tokens (stake) in order to qualify to validate blocks. The “one-sentence philosophy” of proof of stake is not “security comes from burning energy,” but rather “security comes from putting up economic value-at-loss.” In this article, contrary to popular belief, we point out that this value-at-loss can be hedged by short selling or other financial products. We propose a “shorting attack,” which makes a profit by massive short selling and sabotage to a Proof-of-Stake-based cryptocurrency. The shorting attack implies that the security of Proof-of-Stake-based cryptocurrency can be vulnerable by a low stake ratio.},
187-
year = {2023},
188-
preview={CPE2021.png},
189-
}
190-
191179

192180

193181

0 commit comments

Comments
 (0)