Published Papers
- Design choices for Central Bank Digital Currency. Sarah Allen, Srdjan Capkun, Ittay Eyal, Giulia Fanti, Bryan Ford, James Grimmelmann, Ari Juels, Kari Kostiainen, Sarah Meiklejohn, Andrew Miller, Eswar Prasad, Karl Wüst, Fan Zhang.
- CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability Deepak Maram, Harjasleen Malvai, Fan Zhang, Nerla Jean-Louis, Alexander Frolov, Tyler Kell, Tyrone Lobban, Christine Moy, Ari Juels, Andrew Miller. IEEE Symposium on Security and Privacy (Oakland 2021). TO APPEAR.
- Non-interactive Proofs of Proof-of-Work. Aggelos Kiayias, Andrew Miller, Dionysis Zindros. Financial Cryptography and Data Security (FC 2020). (website)
- Pisa: Arbitration Outsourcing for State Channels. Patrick McCorry, Surya Bakshi, Iddo Bentov, Sarah Meiklejohn, Andrew Miller. ACM Advances in Financial Technology (AFT 2020).
- Flash boys 2.0: Frontrunning, transaction reordering, and consensus instability in decentralized exchanges. Philip Daian, Steven Goldfeder, Tyler Kell, Yunqi Li, Xueyuan Zhao, Iddo Bentov, Lorenz Breidenbach, Ari Juels. IEEE Symposium on Security and Privacy (Oakland 2020).
- HoneyBadgerMPC and AsynchroMix: Practical AsynchronousMPC and its Application to Anonymous Communication. Donghang Lu, Thomas Yurek, Samarth Kulshreshtha, Rahul Govind, Rahul Mahadev, Aniket Kate, Andrew Miller. ACM Conference on Computer and Communications Security (CCS 2019). (code)
- ILC: a calculus for composable, computational cryptography. Kevin Liao, Matthew Hammer, Andrew Miller. ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2019).
- Outguard: Detecting In-Browser Covert Cryptocurrency Mining in the Wild. Amin Kharraz, Zane Ma, Paul Murley, Charles Lever, Joshua Mason, Andrew Miller, Nikita Borisov, Manos Antonakakis, Michael Bailey. The Web Conference (WWW 2019)
- Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contract Execution. Raymond Cheng, Fan Zhang, Jernej Kos, Warren He, Nicholas Hynes, Noah Johnson, Ari Juels, Andrew Miller, Dawn Song. IEEE European Symposium on Security and Privacy (EuroS&P 2019).
- TxProbe: Discovering Bitcoin’s Network Topology Using Orphan Transactions. Sergi Delgado-Segura, Surya Bakshi, Cristina Pérez-Solà, James Litton, Andrew Pachulski, Andrew Miller, Bobby Bhattacharjee. Financial Cryptography and Data Security (FC 2019).
- Sprites and State Channels: Payment Networks that Go Faster than Lightning. Andrew Miller, Iddo Bentov, Surya Bakshi, Ranjit Kumaresan, Patrick McCorry. Financial Cryptography and Data Security (FC 2019).
- You sank my battleship! A case study to evaluate state channels as a scaling solution for cryptocurrencies. Patrick McCorry, Chris Buckland, Surya Bakshi, Karl Wust, Andrew Miller. Financial Cryptography and Data Security (FC 2019).
- Short Paper: I Can’t Believe It’s Not Stake! Resource Exhaustion Attacks on PoS. Sanket Kanjalkar, Joseph Kuo, Yunqi Li, Andrew Miller. Financial Cryptography and Data Security (FC 2019).
- DelegaTEE: Brokered Delegation Using Trusted Execution Environments. Sinisa Matetic, Moritz Schneider, Andrew Miller, Ari Juels, Srdjan Capkun. USENIX Security Symposium (USENIX 2018).
- Reactive redundancy for data destruction protection (R2D2). Christopher N. Gutierrez, Eugene H. Spafford, Saurabh Bagchi, Thomas Yurek. Computers & Security. 2018.
- Erays: Reverse Engineering Ethereum’s Opaque Smart Contracts. Yi Zhou, Deepak Kumar, Surya Bakshi, Joshua Mason, Andrew Miller, Michael Bailey. USENIX Security Symposium (USENIX 2018).
- Dandelion++: Lightweight Cryptocurrency Networking with Formal Anonymity Guarantees. Giulia Fanti, Shaileshh Bojja Venkatakrishnan, Surya Bakshi, Bradley Denby, Shruti Bhargava, Andrew Miller, Pramod Viswanath. Measurement and Modeling of Computer Systems (SIGMETRICS 2018).
- Authenticated Data Structures for Privacy-Preserving Monero Light Clients. Kevin Lee, Andrew Miller. IEEE Security & Privacy on the Blockchain (IEEE S&B 2018).
- Atomically Trading with Roger: Gambling on the success of a hardfork. Patrick McCorry, Ethan Heilman, Andrew Miller. Workshop on Cryptocurrencies and Blockchain Technology (CBT 2017).
- Instantaneous Decentralized Poker. Iddo Bentov, Ranjit Kumaresan, and Andrew Miller. Theory and Application of Cryptology and Information Security (AsiaCrypt 2017).
- Towards an Accountable Software-Defined Networking Architecture. Benjamin Ujcich, Adam Bates, Andrew Miller, William H. Sanders. IEEE Conference on Network Softwarization (NetSoft 2017).
- SmartCast: An Incentive Compatible Consensus Protocol Using Smart Contracts. Abhiram Kothapalli, Andrew Miller, Nikita Borisov. Workshop on Trusted Smart Contracts (WTSC 2017).
- Zero-Collateral Lotteries in Bitcoin and Ethereum. Iddo Bentov, Andrew Miller. IEEE European Symposium on Security and Privacy Workshops (EuroS&PW 2017).
- The Honey Badger of BFT Protocols. Andrew Miller, Yu Xia, Kyle Croman, Elaine Shi, Dawn Song. ACM Computer and Communications Security (CCS 2017).
- Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. Ahmed Kosba, Andrew Miller, Elaine Shi, Zikai Wen, Charalampos Papamanthou. IEEE Symposium on Security and Privacy (Oakland 2016). (Video!) top cited paper in blockchains over the past 5 years
- Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack. Kartik Nayak, Srijan Kumar, Andrew Miller, Elaine Shi. IEEE European Symposium on Security and Privacy (EuroS&P 2016).
- Non-outsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions. Andrew Miller, Elaine Shi, Ahmed Kosba, Jonathan Katz. ACM Computer and Communications Security (CCS 2015).
- SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, Edward W. Felten. IEEE Symposium on Security and Privacy (Oakland 2015).
- Permacoin: Repurposing Bitcoin Work for Long-Term Data Preservation. Andrew Miller, Ari Juels, Elaine Shi, Bryan Parno, Jonathan Katz. IEEE Symposium on Security and Privacy (Oakland 2014).
- Authenticated Data Structures, Generically. Andrew Miller, Michael Hicks, Jonathan Katz, Elaine Shi. ACM Symposium on Principles of Programming Languages (POPL 2014).
- Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications. Andrew Miller, Rob Jansen. USENIX Workshop on Cyber Security Experimentation and Test (CSET 2015). (code)
- On Scaling Decentralized Blockchains (A Position Paper). Kyle Croman, Christian Decker, Ittay Eyal, Adem Efe Gencer, Ari Juels, Ahmed Kosba, Andrew Miller, Prateek Saxena, Elaine Shi, Emin Gun Sirer, Dawn Song, Roger Wattenhofer. Workshop on Bitcoin and Blockchain Research. 2016.
- Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab. Kevin Delmolino, Mitchell Arnett, Ahmed Kosba, Andrew Miller, Elaine Shi. Workshop on Bitcoin and Blockchain Research. 2016. (website)
- From Onions to Shallots: Rewarding Tor Relays with TEARS. Rob Jansen, Andrew Miller, Paul Syverson, Bryan Ford. Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2014).
- On Decentralizing Prediction Markets and Order Books. Joseph Bonneau, Jeremy Clark, Edward Felten, Joshua Kroll, Andrew Miller, Arvind Narayanan. Workshop on the Economics of Information Security (WEIS 2014).
- Fawkescoin: A cryptocurrency without public-key cryptography. Joseph Bonneau, Andrew Miller. International Workshop on Security Protocols 2014.
- Mixcoin: Anonymity for Bitcoin with accountable mixes. Arvind Narayanan, Joseph Bonneau, Andrew Miller, Jeremy Clark, Joshua Kroll. Financial Cryptography and Data Security (FC 2014).
Preprints
- Post-Quantum Multi-Party Computation in Constant Rounds. Amit Agarwal, James Bartusek, Vipul Goyal, Dakshita Khurana, Giulio Malavolta. 2020.
- An Empirical Analysis of Privacy in the Lightning Network. George Kappos, Haaroon Yousaf, Ania M. Piotrowska, Sanket Kanjalkar, Sergi Delgado-Segura, Andrew Miller, Sarah Meiklejohn. 2020.
- Brief Note: Asynchronous Verifiable Secret Sharing with Optimal Resilience and Linear Amortized Overhead. Aniket Kate, Andrew Miller, Tom Yurek. 2019.
- How to use SNARKs in Universally Composable Protocols. Ahmed Kosba, Zhichao Zhao, Andrew Miller, Hubert Chan, Charalampos Papamanthou, Rafael Pass, Abhi Shelat, Elaine Shi. 2015.
- Pseudonymous Secure Computation from Time-Lock Puzzles. Jonathan Katz, Andrew Miller, Elaine Shi. 2014.
Tech Reports
Blog Posts
- Design choices for central bank digital currency. Sarah Allen, Srđan Čapkun, Ittay Eyal, Giulia Fanti, Bryan Ford, James Grimmelmann, Ari Juels, Kari Kostiainen, Sarah Meiklejohn, Andrew Miller, Eswar Prasad, Karl Wüst, Fan Zhang. 2020.
- Using HoneyBadgerMPC for the multi-party Proof-of-Custody. Amit Agarwal. 2019.
- Side Effects due to Speculative Execution in Hyperledger Fabric. Rahul Mahadev. 2019.
- How to deploy and test system chaincodes on Hyperledger Fabric effectively. Rahul Mahadev. 2019.
- “Fake Stake” attacks on chain-based Proof-of-Stake cryptocurrencies. Sanket Kanjalkar, Yunqi Li, Yuguang Chen, Joseph Kuo, Andrew Miller. 2019.