Skip to main content

Fan Zhang

Adjunct Assistant Professor of Computer Science
Computer Science
Box 90129, Durham, NC 27708
D327 LSRC, Durham, NC 27708

Selected Publications


Data Independent Order Policy Enforcement: Limitations and Solutions

Conference Ccs 2024 Proceedings of the 2024 ACM Sigsac Conference on Computer and Communications Security · December 9, 2024 Order manipulation attacks such as frontrunning and sandwiching have become an increasing concern in blockchain applications such as DeFi. To protect from such attacks, several recent works have designed order policy enforcement (OPE) protocols to order tr ... Full text Cite

SoK: MEV Countermeasures

Conference Defi 2024 Proceedings of the Workshop on Decentralized Finance and Security Co Located with Ccs 2024 · November 19, 2024 Blockchains offer strong security guarantees, but they cannot protect the ordering of transactions. Powerful players, such as miners, sequencers, and sophisticated bots, can reap significant profits by selectively including, excluding, or reordering user t ... Full text Cite

Unpacking Long-Latency Transactions in Ethereum

Conference Defi 2024 Proceedings of the Workshop on Decentralized Finance and Security Co Located with Ccs 2024 · November 19, 2024 Blockchain systems such as Bitcoin and Ethereum have limitations in efficiency, resulting in an inability to immediately confirm all transactions, leading to extended periods of transactions residing in the mempool. We refer to these transactions as “long ... Full text Cite

CrudiTEE: A Stick-And-Carrot Approach to Building Trustworthy Cryptocurrency Wallets with TEEs

Conference Leibniz International Proceedings in Informatics Lipics · September 1, 2024 Cryptocurrency introduces usability challenges by requiring users to manage signing keys. Popular signing key management services (e.g., custodial wallets), however, either introduce a trusted party or burden users with managing signing key shares, posing ... Full text Cite

monoCash: A Channel-Free Payment Network via Trusted Monotonic Counters

Journal Article IEEE Transactions on Dependable and Secure Computing · January 1, 2024 Cryptocurrencies such as Bitcoin and Ethereum are gaining popularity thanks to their prominent advantages compared to legacy financial transaction systems. However, they require all participants to reach a consensus on the order of transactions, which fund ... Full text Cite

The Locality of Memory Checking

Conference Ccs 2023 Proceedings of the 2023 ACM Sigsac Conference on Computer and Communications Security · November 21, 2021 Motivated by the extended deployment of authenticated data structures (e.g., Merkle Patricia Tries) for verifying massive amounts of data in blockchain systems, we begin a systematic study of the I/O efficiency of such systems. We first explore the fundame ... Full text Cite

DeFi'23: Workshop on Decentralized Finance and Security

Conference Ccs 2023 Proceedings of the 2023 ACM Sigsac Conference on Computer and Communications Security · November 21, 2021 Decentralized Finance (DeFi) heralds a transformative moment in the realm of finance, challenging traditional intermediaries with a blockchain-centric blueprint. As DeFi burgeons, the intricate dance between its evolution and security emerges as an area of ... Full text Cite

CanDID: Can-do decentralized identity with legacy compatibility, sybil-resistance, and accountability

Conference Proceedings IEEE Symposium on Security and Privacy · May 1, 2021 We present CanDID, a platform for practical, user-friendly realization of decentralized identity, the idea of empowering end users with management of their own credentials.While decentralized identity promises to give users greater control over their priva ... Full text Cite

DECO: Liberating Web Data Using Decentralized Oracles for TLS

Journal Article CCS ’20: 2020 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020 · 2020 Full text Open Access Cite

Order-Fairness for Byzantine Consensus

Conference Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part III · 2020 Full text Cite

Order-Fairness for Byzantine Consensus

Journal Article IACR Cryptol. ePrint Arch. · 2020 Cite

Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts

Journal Article IEEE European Symposium on Security and Privacy, EuroS&P 2019, Stockholm, Sweden, June 17-19, 2019 · 2019 Full text Cite

Tesseract: Real-Time Cryptocurrency Exchange Using Trusted Hardware

Conference Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, London, UK, November 11-15, 2019 · 2019 Full text Cite

CHURP: Dynamic-Committee Proactive Secret Sharing

Conference Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, London, UK, November 11-15, 2019 · 2019 Full text Cite

Paralysis Proofs: Secure Dynamic Access Structures for Cryptocurrency Custody and More

Conference Proceedings of the 1st ACM Conference on Advances in Financial Technologies, AFT 2019, Zurich, Switzerland, October 21-23, 2019 · 2019 Full text Cite

CHURP: Dynamic-Committee Proactive Secret Sharing

Journal Article IACR Cryptol. ePrint Arch. · 2019 Cite

Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge

Conference 2017 IEEE European Symposium on Security and Privacy, EuroS&P 2017, Paris, France, April 26-28, 2017 · 2017 Full text Cite

Solidus: Confidential Distributed Ledger Transactions via PVORM

Conference Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017 · 2017 Full text Cite

REM: Resource-Efficient Mining for Blockchains

Conference 26th USENIX Security Symposium, USENIX Security 2017, Vancouver, BC, Canada, August 16-18, 2017 · 2017 Cite

REM: Resource-Efficient Mining for Blockchains

Journal Article IACR Cryptol. ePrint Arch. · 2017 Cite

Solidus: Confidential Distributed Ledger Transactions via PVORM

Journal Article IACR Cryptol. ePrint Arch. · 2017 Cite

Tesseract: Real-Time Cryptocurrency Exchange using Trusted Hardware

Journal Article IACR Cryptol. ePrint Arch. · 2017 Cite

Stealing Machine Learning Models via Prediction APIs

Conference 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016 · 2016 Cite

Town Crier: An Authenticated Data Feed for Smart Contracts

Conference Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016 · 2016 Full text Cite

Town Crier: An Authenticated Data Feed for Smart Contracts

Journal Article IACR Cryptol. ePrint Arch. · 2016 Cite

PlateClick: Bootstrapping Food Preferences Through an Adaptive Visual Interface

Conference Proceedings of the 24th ACM International Conference on Information and Knowledge Management, CIKM 2015, Melbourne, VIC, Australia, October 19 - 23, 2015 · 2015 Full text Cite