You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: _bibliography/papers.bib
+36-48Lines changed: 36 additions & 48 deletions
Original file line number
Diff line number
Diff line change
@@ -6,6 +6,7 @@ @INPROCEEDINGS{DICG25
6
6
booktitle={ICDCS 2025 Workshop - The 5th International Workshop on Distributed Infrastructure for Common Good (DICG)},
7
7
title={180 Days After EIP-4844: Will Blob Sharing Solve Dilemma for Small Rollups?},
8
8
year={2025},
9
+
month={July},
9
10
volume={},
10
11
number={},
11
12
pages={},
@@ -18,27 +19,12 @@ @INPROCEEDINGS{DICG25
18
19
}
19
20
20
21
21
-
@INPROCEEDINGS{WTSC25,
22
-
author={Suhyeon Lee},
23
-
booktitle={FC 2025 Workshop - The 9th Workshop on Trusted Smart Contracts (WTSC)},
24
-
title={Hollow Victory: How Malicious Proposers Exploit Validator Incentives in Optimistic Rollup Dispute Games},
25
-
year={2025},
26
-
volume={},
27
-
number={},
28
-
pages={},
29
-
keywords={Ethereum, Game Theory, Optimistic Rollup, Security, Smart Contract},
30
-
abstract={Blockchain systems, such as Ethereum, are increasingly adopting layer-2 scaling solutions to improve transaction throughput and reduce fees. One popular layer-2 approach is the Optimistic Rollup, which relies on a mechanism known as a dispute game for block proposals. In these systems, validators can challenge blocks that they believe contain errors, and a successful challenge results in the transfer of a portion of the proposer's deposit as a reward. In this paper, we reveal a structural vulnerability in the mechanism: validators may not be awarded a proper profit despite winning a dispute challenge. We develop a formal game-theoretic model of the dispute game and analyze several scenarios, including cases where the proposer controls some validators and cases where a secondary auction mechanism is deployed to induce additional participation. Our analysis demonstrates that under current designs, the competitive pressure from validators may be insufficient to deter malicious behavior. We find that increased validator competition, paradoxically driven by higher rewards or participation, can allow a malicious proposer to significantly lower their net loss by capturing value through mechanisms like auctions. To address this, we propose countermeasures such as an escrowed reward mechanism and a commit-reveal protocol. Our findings provide critical insights into enhancing the economic security of layer-2 scaling solutions in blockchain networks.},
31
-
html={https://arxiv.org/abs/2504.05094},
32
-
pdf={https://arxiv.org/pdf/2504.05094},
33
-
doi={https://doi.org/10.48550/arXiv.2504.05094},
34
-
preview={WTSC25.png}
35
-
}
36
-
37
22
@INPROCEEDINGS{ICBC25,
38
23
author={Suhyeon Lee, and Euisin Gee},
39
24
booktitle={ICBC 2025 - IEEE International Conference on Blockchain and Cryptocurrency},
40
25
title={Commit-Reveal²: Randomized Reveal Order Mitigates Last-Revealer Attacks in Commit-Reveal},
41
26
year={2025},
27
+
month={June},
42
28
volume={},
43
29
number={},
44
30
pages={},
@@ -52,6 +38,24 @@ @INPROCEEDINGS{ICBC25
52
38
53
39
54
40
41
+
42
+
@INPROCEEDINGS{WTSC25,
43
+
author={Suhyeon Lee},
44
+
booktitle={FC 2025 Workshop - The 9th Workshop on Trusted Smart Contracts (WTSC)},
45
+
title={Hollow Victory: How Malicious Proposers Exploit Validator Incentives in Optimistic Rollup Dispute Games},
46
+
year={2025},
47
+
month={April},
48
+
volume={},
49
+
number={},
50
+
pages={},
51
+
keywords={Ethereum, Game Theory, Optimistic Rollup, Security, Smart Contract},
52
+
abstract={Blockchain systems, such as Ethereum, are increasingly adopting layer-2 scaling solutions to improve transaction throughput and reduce fees. One popular layer-2 approach is the Optimistic Rollup, which relies on a mechanism known as a dispute game for block proposals. In these systems, validators can challenge blocks that they believe contain errors, and a successful challenge results in the transfer of a portion of the proposer's deposit as a reward. In this paper, we reveal a structural vulnerability in the mechanism: validators may not be awarded a proper profit despite winning a dispute challenge. We develop a formal game-theoretic model of the dispute game and analyze several scenarios, including cases where the proposer controls some validators and cases where a secondary auction mechanism is deployed to induce additional participation. Our analysis demonstrates that under current designs, the competitive pressure from validators may be insufficient to deter malicious behavior. We find that increased validator competition, paradoxically driven by higher rewards or participation, can allow a malicious proposer to significantly lower their net loss by capturing value through mechanisms like auctions. To address this, we propose countermeasures such as an escrowed reward mechanism and a commit-reveal protocol. Our findings provide critical insights into enhancing the economic security of layer-2 scaling solutions in blockchain networks.},
53
+
html={https://arxiv.org/abs/2504.05094},
54
+
pdf={https://arxiv.org/pdf/2504.05094},
55
+
doi={https://doi.org/10.48550/arXiv.2504.05094},
56
+
preview={WTSC25.png}
57
+
}
58
+
55
59
@INPROCEEDINGS{ICBC24,
56
60
author={Hojung Lee, and Suhyeon Lee, and Seungjoo Kim},
57
61
booktitle={ICBC 2024 - IEEE International Conference on Blockchain and Cryptocurrency},
@@ -69,20 +73,22 @@ @INPROCEEDINGS{ICBC24
69
73
}
70
74
71
75
72
-
@ARTICLE{Access2023,
73
-
author={Lee, Soohan and Lee, Suhyeon and Park, Jiwon and Kim, Kyoungmin and Lee, Kyungho},
74
-
journal={IEEE Access},
75
-
title={Hiding in the Crowd: Ransomware Protection by Adopting Camouflage and Hiding Strategy With the Link File},
abstract = {Ransomware is a growing threat and is building ecosystems in the form of ransomware as a service (RaaS). While there have been diverse efforts to detect and mitigate such threats, techniques to bypass such countermeasures have advanced considerably. Since detecting all evolving threats has become challenging, there is a growing interest in developing proactive countermeasures that can minimize the damage even in environments where ransomware has already been executed. In this study, we gained insights from an attacker’s perspective by analyzing ransomware such as LockBit and derived a generic counterstrategy against features that are common in ransomware attacks. Our proposed method protects critical files from existing ransomware by applying a hiding strategy that poses a challenge to attackers in finding the target files. We also present best practices for implementing the strategy while considering both in terms of security and usability using the link file and improving the method through the addition of a linker and encrypted database to reduce the attack surface. By using real-world ransomware samples, our experiments show that the proposed method successfully protects valuable files against ransomware in a cost-effective manner.},
82
-
html = {https://ieeexplore.ieee.org/abstract/document/10233856},
83
-
pdf = {https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10233856},
84
-
doi={10.1109/ACCESS.2023.3309879},
85
-
preview={Access23-1.png}
76
+
@article{shorting,
77
+
abbr={CPE},
78
+
bibtex_show={true},
79
+
author = {Lee, Suhyeon and Kim, Seungjoo},
80
+
title = {Shorting attack: Predatory, destructive short selling on Proof-of-Stake cryptocurrencies},
81
+
journal = {Concurrency and Computation: Practice and Experience},
82
+
volume = {35},
83
+
number = {16},
84
+
pages = {e6585},
85
+
keywords = {blockchain, Proof-of-Stake, security, short selling},
86
+
doi = {10.1002/cpe.6585},
87
+
pdf = {https://onlinelibrary.wiley.com/doi/abs/10.1002/cpe.6585},
abstract = {Summary Bitcoin introduced blockchain which is the transparent and decentralized way of recording the lists of digital currency transactions. Bitcoin's blockchain uses Proof-of-Work as a Sybil control mechanism. However, PoW wastes energy since it uses hash computing competitions to find a block. Hence, various alternative mechanisms have been proposed. Among them, Proof-of-Stake, which is based on the deposit, has been spotlighted. As opposed to Proof-of-Work, Proof-of-Stake requires nodes to have a certain amount of tokens (stake) in order to qualify to validate blocks. The “one-sentence philosophy” of proof of stake is not “security comes from burning energy,” but rather “security comes from putting up economic value-at-loss.” In this article, contrary to popular belief, we point out that this value-at-loss can be hedged by short selling or other financial products. We propose a “shorting attack,” which makes a profit by massive short selling and sabotage to a Proof-of-Stake-based cryptocurrency. The shorting attack implies that the security of Proof-of-Stake-based cryptocurrency can be vulnerable by a low stake ratio.},
90
+
year = {2023},
91
+
preview={CPE2021.png},
86
92
}
87
93
88
94
@@ -170,24 +176,6 @@ @ARTICLE{9654201
170
176
month={},
171
177
}
172
178
173
-
@article{shorting,
174
-
abbr={CPE},
175
-
bibtex_show={true},
176
-
author = {Lee, Suhyeon and Kim, Seungjoo},
177
-
title = {Shorting attack: Predatory, destructive short selling on Proof-of-Stake cryptocurrencies},
178
-
journal = {Concurrency and Computation: Practice and Experience},
179
-
volume = {35},
180
-
number = {16},
181
-
pages = {e6585},
182
-
keywords = {blockchain, Proof-of-Stake, security, short selling},
183
-
doi = {10.1002/cpe.6585},
184
-
pdf = {https://onlinelibrary.wiley.com/doi/abs/10.1002/cpe.6585},
abstract = {Summary Bitcoin introduced blockchain which is the transparent and decentralized way of recording the lists of digital currency transactions. Bitcoin's blockchain uses Proof-of-Work as a Sybil control mechanism. However, PoW wastes energy since it uses hash computing competitions to find a block. Hence, various alternative mechanisms have been proposed. Among them, Proof-of-Stake, which is based on the deposit, has been spotlighted. As opposed to Proof-of-Work, Proof-of-Stake requires nodes to have a certain amount of tokens (stake) in order to qualify to validate blocks. The “one-sentence philosophy” of proof of stake is not “security comes from burning energy,” but rather “security comes from putting up economic value-at-loss.” In this article, contrary to popular belief, we point out that this value-at-loss can be hedged by short selling or other financial products. We propose a “shorting attack,” which makes a profit by massive short selling and sabotage to a Proof-of-Stake-based cryptocurrency. The shorting attack implies that the security of Proof-of-Stake-based cryptocurrency can be vulnerable by a low stake ratio.},
0 commit comments