Calculated based on number of publications stored in Pure and citations from Scopus
20052024

Research activity per year

Search results

  • 2024

    Speculative Denial-of-Service Attacks in Ethereum

    Yaish, A., Qin, K., Zhou, L., Zohar, A. & Gervais, A., 2024, Proceedings of the 33rd USENIX Security Symposium. USENIX Association, p. 3531-3548 18 p. (Proceedings of the 33rd USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2023

    Correct Cryptocurrency ASIC Pricing: Are Miners Overpaying?

    Yaish, A. & Zohar, A., 1 Oct 2023, 5th Conference on Advances in Financial Technologies, AFT 2023. Bonneau, J. & Weinberg, S. M. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 2:1-2:25 25 p. 2. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 282).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • The Vulnerable Nature of Decentralized Governance in DeFi

    Dotan, M., Yaish, A., Yin, H. C., Tsytkin, E. & Zohar, A., 30 Nov 2023, DeFi 2023 - Proceedings of the 2023 Workshop on Decentralized Finance and Security. Association for Computing Machinery, Inc, p. 25-31 7 p. (DeFi 2023 - Proceedings of the 2023 Workshop on Decentralized Finance and Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    6 Scopus citations
  • Uncle Maker: (Time)Stamping Out The Competition in Ethereum

    Yaish, A., Stern, G. & Zohar, A., 15 Nov 2023, CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 135-149 15 p. (CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    6 Scopus citations
  • 2022

    Blockchain Stretching & Squeezing: Manipulating Time for Your Best Interest

    Yaish, A., Tochner, S. & Zohar, A., 12 Jul 2022, EC 2022 - Proceedings of the 23rd ACM Conference on Economics and Computation. Association for Computing Machinery, Inc, p. 65-88 24 p. (EC 2022 - Proceedings of the 23rd ACM Conference on Economics and Computation).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    17 Scopus citations
  • How to Charge Lightning: The Economics of Bitcoin Transaction Channels

    Branzei, S., Segal-Halevi, E. & Zohar, A., 2022, 2022 58th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2022. Institute of Electrical and Electronics Engineers Inc., p. 1-8 8 p. (2022 58th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2022).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    3 Scopus citations
  • Redesigning Bitcoin's Fee Market

    Lavi, R., Sattath, O. & Zohar, A., Mar 2022, In: ACM Transactions on Economics and Computation. 10, 1, p. 5:1-5:31 31 p., 5.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    16 Scopus citations
  • Sliding Window Challenge Process for Congestion Detection

    Lotem, A., Azouvi, S., McCorry, P. & Zohar, A., 2022, Financial Cryptography and Data Security - 26th International Conference, FC 2022, Revised Selected Papers. Eyal, I. & Garay, J. (eds.). Springer Science and Business Media Deutschland GmbH, p. 512-530 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13411 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Twilight: A Differentially Private Payment Channel Network

    Dotan, M., Tochner, S., Zohar, A. & Gilad, Y., 2022, Proceedings of the 31st USENIX Security Symposium, Security 2022. USENIX Association, p. 555-570 16 p. (Proceedings of the 31st USENIX Security Symposium, Security 2022).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • Virtual ASICs: Generalized Proof-of-Stake Mining in Cryptocurrencies

    Ganesh, C., Orlandi, C., Tschudi, D. & Zohar, A., 2022, Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2021 International Workshops, DPM 2021 and CBT 2021, Revised Selected Papers. Garcia-Alfaro, J., Muñoz-Tapia, J. L., Navarro-Arribas, G. & Soriano, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 173-191 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13140 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2021

    Congestion Attacks in Payment Channel Networks

    Mizrahi, A. & Zohar, A., 2021, Financial Cryptography and Data Security - 25th International Conference, FC 2021, Revised Selected Papers. Borisov, N. & Diaz, C. (eds.). Springer Science and Business Media Deutschland GmbH, p. 170-188 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12675 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    31 Scopus citations
  • PHANTOM GHOSTDAG: A scalable generalization of Nakamoto consensus: September 2, 2021

    Sompolinsky, Y., Wyborski, S. & Zohar, A., 26 Sep 2021, AFT 2021 - Proceedings of the 2021 3rd ACM Conference on Advances in Financial Technologies. Association for Computing Machinery, Inc, p. 57-70 14 p. (AFT 2021 - Proceedings of the 2021 3rd ACM Conference on Advances in Financial Technologies).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    33 Scopus citations
  • Survey on Blockchain Networking: Context, State-of-the-Art, Challenges

    Dotan, M., Pignolet, Y. A., Schmid, S., Tochner, S. & Zohar, A., 25 May 2021, In: ACM Computing Surveys. 54, 5, p. 1-34 34 p., 107.

    Research output: Contribution to journalReview articlepeer-review

    55 Scopus citations
  • 2020

    Flood & Loot: A Systemic Attack on the Lightning Network

    Harris, J. & Zohar, A., 21 Oct 2020, AFT 2020 - Proceedings of the 2nd ACM Conference on Advances in Financial Technologies. Association for Computing Machinery, Inc, p. 202-213 12 p. (AFT 2020 - Proceedings of the 2nd ACM Conference on Advances in Financial Technologies).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    37 Scopus citations
  • How to Pick Your Friends A Game Theoretic Approach to P2P Overlay Construction

    Tochner, S. & Zohar, A., 21 Oct 2020, AFT 2020 - Proceedings of the 2nd ACM Conference on Advances in Financial Technologies. Association for Computing Machinery, Inc, p. 37-45 9 p. (AFT 2020 - Proceedings of the 2nd ACM Conference on Advances in Financial Technologies).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Reasoning about the future in blockchain databases

    Cohen, S., Rosenthal, A. & Zohar, A., Apr 2020, Proceedings - 2020 IEEE 36th International Conference on Data Engineering, ICDE 2020. IEEE Computer Society, p. 1930-1933 4 p. 9101185. (Proceedings - International Conference on Data Engineering; vol. 2020-April).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • Responsible vulnerability disclosure in cryptocurrencies

    Böhme, R., Eckey, L., Moore, T., Narula, N., Ruffing, T. & Zohar, A., 23 Sep 2020, In: Communications of the ACM. 63, 10, p. 62-71 10 p.

    Research output: Contribution to journalReview articlepeer-review

    Open Access
    12 Scopus citations
  • Route Hijacking and DoS in Off-Chain Networks

    Tochner, S., Zohar, A. & Schmid, S., 21 Oct 2020, AFT 2020 - Proceedings of the 2nd ACM Conference on Advances in Financial Technologies. Association for Computing Machinery, Inc, p. 228-240 13 p. (AFT 2020 - Proceedings of the 2nd ACM Conference on Advances in Financial Technologies).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    25 Scopus citations
  • SOK: Cryptocurrency networking context, state-of-the-art, challenges

    Dotan, M., Pignolet, Y. A., Schmid, S., Tochner, S. & Zohar, A., 25 Aug 2020, Proceedings of the 15th International Conference on Availability, Reliability and Security, ARES 2020. Association for Computing Machinery, (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    11 Scopus citations
  • 2019

    Financial Cryptography and Data Security: FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Curaçao, March 2, 2018, Revised Selected Papers

    Bracciali, A. (Editor), Clark, J. (Editor), Eyal, I. (Editor), Pintore, F. (Editor), Sala, M. (Editor), Teague, V. (Editor) & Zohar, A. (Editor), 2019, 1st ed. 2019 ed. Berlin, Heidelberg: Springer Berlin Heidelberg; Imprint: Springer. 382 p. (Security and Cryptology; vol. 10958)

    Research output: Book/ReportBook

  • Redesigning Bitcoin's fee market

    Lavi, R., Sattath, O. & Zohar, A., 13 May 2019, The Web Conference 2019 - Proceedings of the World Wide Web Conference, WWW 2019. Association for Computing Machinery, Inc, p. 2950-2956 7 p. (The Web Conference 2019 - Proceedings of the World Wide Web Conference, WWW 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    33 Scopus citations
  • 2018

    Avoiding Deadlocks in Payment Channel Networks

    Werman, S. & Zohar, A., 2018, Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2018 International Workshops, DPM 2018 and CBT 2018, Proceedings. Garcia-Alfaro, J., Herrera-Joancomartí, J., Livraga, G. & Rios, R. (eds.). Springer Science and Business Media Deutschland GmbH, p. 175-187 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11025 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    15 Scopus citations
  • Bitcoin’s underlying incentives

    Sompolinsky, Y. & Zohar, A., Mar 2018, In: Communications of the ACM. 61, 3, p. 46-53 8 p.

    Research output: Contribution to journalArticlepeer-review

    34 Scopus citations
  • 2017

    Bitcoin's underlying incentives: The unseen economic forces that govern the Bitcoin protocol

    Sompolinsky, Y. & Zohar, A., 1 Sep 2017, In: Queue. 15, 5

    Research output: Contribution to journalArticlepeer-review

    3 Scopus citations
  • Hijacking Bitcoin: Routing Attacks on Cryptocurrencies

    Apostolaki, M., Zohar, A. & Vanbever, L., 23 Jun 2017, 2017 IEEE Symposium on Security and Privacy, SP 2017 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 375-392 18 p. 7958588. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    352 Scopus citations
  • Memory-based mechanisms for economic agents

    Dollberg, G. & Zohar, A., 2017, 16th International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2017. Durfee, E., Winikoff, M., Larson, K. & Das, S. (eds.). International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), p. 1523-1525 3 p. (Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Optimal selfish mining strategies in bitcoin

    Sapirshtein, A., Sompolinsky, Y. & Zohar, A., 2017, Financial Cryptography and Data Security - 20th International Conference, FC 2016, Revised Selected Papers. Preneel, B. & Grossklags, J. (eds.). Springer Verlag, p. 515-532 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9603 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    356 Scopus citations
  • Recent trends in decentralized cryptocurrencies

    Zohar, A., 19 Jun 2017, STOC 2017 - Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing. McKenzie, P., King, V. & Hatami, H. (eds.). Association for Computing Machinery, p. 1 1 p. (Proceedings of the Annual ACM Symposium on Theory of Computing; vol. Part F128415).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Securing and scaling cryptocurrencies

    Zohar, A., 2017, 26th International Joint Conference on Artificial Intelligence, IJCAI 2017. Sierra, C. (ed.). International Joint Conferences on Artificial Intelligence, p. 5161-5165 5 p. (IJCAI International Joint Conference on Artificial Intelligence; vol. 0).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    9 Scopus citations
  • 2016

    An axiomatic approach to routing

    Lev, O., Tennenholtz, M. & Zohar, A., 23 Jun 2016, In: Electronic Proceedings in Theoretical Computer Science, EPTCS. 215, p. 194-206 13 p.

    Research output: Contribution to journalConference articlepeer-review

    Open Access
  • Online pricing with strategic and patient buyers

    Feldman, M., Koren, T., Livni, R., Mansour, Y. & Zohar, A., 2016, In: Advances in Neural Information Processing Systems. p. 3871-3879 9 p.

    Research output: Contribution to journalConference articlepeer-review

    17 Scopus citations
  • The axiomatic approach and the internet

    Tennenholtz, M. & Zohar, A., 1 Jan 2016, Handbook of Computational Social Choice. Cambridge University Press, p. 427-452 26 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    4 Scopus citations
  • 2015

    An axiomatic approach to link prediction

    Cohen, S. & Zohar, A., 1 Jun 2015, Proceedings of the 29th AAAI Conference on Artificial Intelligence, AAAI 2015 and the 27th Innovative Applications of Artificial Intelligence Conference, IAAI 2015. AI Access Foundation, p. 58-64 7 p. (Proceedings of the National Conference on Artificial Intelligence; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • Bitcoin: Under the hood

    Zohar, A., 1 Sep 2015, In: Communications of the ACM. 58, 9, p. 104-113 10 p.

    Research output: Contribution to journalReview articlepeer-review

    170 Scopus citations
  • Bitcoin mining pools: A cooperative game theoretic analysis

    Lewenberg, Y., Bachrach, Y., Sompolinsky, Y., Zohar, A. & Rosenschein, J. S., 2015, AAMAS 2015 - Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems. Elkind, E., Weiss, G., Yolum, P. & Bordini, R. H. (eds.). International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), p. 919-927 9 p. (Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    195 Scopus citations
  • Eclipse attacks on Bitcoin’s peer-to-peer network

    Heilman, E., Kendler, A., Zohar, A. & Goldberg, S., 2015, Proceedings of the 24th USENIX Security Symposium. USENIX Association, p. 129-144 16 p. (Proceedings of the 24th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    659 Scopus citations
  • Inclusive block chain protocols

    Lewenberg, Y., Sompolinsky, Y. & Zohar, A., 2015, Financial Cryptography and Data Security - 19th International Conference, FC 2015, Revised Selected Papers. Okamoto, T. & Bohme, R. (eds.). Springer Verlag, p. 528-547 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8975).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    236 Scopus citations
  • Secure high-rate transaction processing in bitcoin

    Sompolinsky, Y. & Zohar, A., 2015, Financial Cryptography and Data Security - 19th International Conference, FC 2015, Revised Selected Papers. Okamoto, T. & Bohme, R. (eds.). Springer Verlag, p. 507-527 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8975).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    501 Scopus citations
  • 2012

    Economics of BitTorrent communities

    Kash, I. A., Lai, J. K., Zhang, H. & Zohar, A., 2012, WWW'12 - Proceedings of the 21st Annual Conference on World Wide Web. p. 221-230 10 p. (WWW'12 - Proceedings of the 21st Annual Conference on World Wide Web).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    16 Scopus citations
  • On bitcoin and red balloons

    Babaioff, M., Dobzinski, S., Oren, S. & Zohar, A., 2012, EC '12 - Proceedings of the 13th ACM Conference on Electronic Commerce. p. 56-73 18 p. (Proceedings of the ACM Conference on Electronic Commerce).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    163 Scopus citations
  • 2011

    Best-response auctions

    Nisan, N., Schapira, M., Valiant, G. & Zohar, A., 2011, EC'11 - Proceedings of the 12th ACM Conference on Electronic Commerce. p. 351-359 9 p. (Proceedings of the ACM Conference on Electronic Commerce).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    18 Scopus citations
  • Best-Response Mechanisms

    Nisan, N., Schapira, M., Valiant, G. & Zohar, A., 2011, Innovations in Computer Science - ICS 2011: Tsinghua University, Beijing, China, January 7-9, 2011. Tsinghua University Press, p. 155-165 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Exploiting problem symmetries in state-based planners

    Pochter, N., Zohar, A. & Rosenschein, J. S., 2011, AAAI-11 / IAAI-11 - Proceedings of the 25th AAAI Conference on Artificial Intelligence and the 23rd Innovative Applications of Artificial Intelligence Conference. p. 1004-1009 6 p. (Proceedings of the National Conference on Artificial Intelligence; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    37 Scopus citations
  • Incentive-compatible distributed greedy protocols

    Nisan, N., Schapira, M., Valiant, G. & Zohar, A., 2011, PODC'11 - Proceedings of the 2011 ACM Symposium Principles of Distributed Computing. p. 335-336 2 p. (Proceedings of the Annual ACM Symposium on Principles of Distributed Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Interdomain routing and games

    Levin, H., Schapira, M. & Zohar, A., 2011, In: SIAM Journal on Computing. 40, 6, p. 1892-1912 21 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    8 Scopus citations
  • Mechanisms for multi-level marketing

    Emek, Y., Karidi, R., Tennenholtz, M. & Zohar, A., 2011, EC'11 - Proceedings of the 12th ACM Conference on Electronic Commerce. p. 209-218 10 p. (Proceedings of the ACM Conference on Electronic Commerce).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    66 Scopus citations
  • When is it best to best-respond?

    Nisan, N., Schapira, M., Valiant, G. & Zohar, A., Jun 2011, In: ACM SIGecom Exchanges. 10, 2, p. 16-18 3 p., 2.

    Research output: Contribution to journalArticlepeer-review

  • 2010

    Competing Schedulers

    Ashlagi, I., Tennenholtz, M. & Zohar, A., 15 Jul 2010, Proceedings of the 24th AAAI Conference on Artificial Intelligence, AAAI 2010. AAAI Press, p. 691-696 6 p. (Proceedings of the 24th AAAI Conference on Artificial Intelligence, AAAI 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Incentive compatibility and dynamics of congestion control

    Godfrey, P. B., Schapira, M., Zohar, A. & Shenker, S., 2010, SIGMETRICS'10 - Proceedings of the 2010 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems. 1 SPEC. ISSUE ed. p. 95-106 12 p. (Performance Evaluation Review; vol. 38, no. 1 SPEC. ISSUE).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    13 Scopus citations
  • Search space reduction using swamp hierarchies

    Pochter, N., Zohar, A., Rosenschein, J. S. & Felner, A., 2010, AAAI-10 / IAAI-10 - Proceedings of the 24th AAAI Conference on Artificial Intelligence and the 22nd Innovative Applications of Artificial Intelligence Conference. AI Access Foundation, p. 155-160 6 p. (Proceedings of the National Conference on Artificial Intelligence; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    14 Scopus citations
Your message has successfully been sent.
Your message was not sent due to an error.