-
Secure and Transparent Audit Logs with BlockAudit
Audit logs serve as a critical component in enterprise business systems ...
read it
-
Exploring the Attack Surface of Blockchain: A Systematic Overview
In this paper, we systematically explore the attack surface of the Block...
read it
-
Exploring Spatial, Temporal, and Logical Attacks on the Bitcoin Network
In this paper, we explore the partitioning attacks on the Bitcoin networ...
read it
-
Towards Blockchain-Driven, Secure and Transparent Audit Logs
Audit logs serve as a critical component in the enterprise business syst...
read it
-
Countering Selfish Mining in Blockchains
Selfish mining is a well known vulnerability in blockchains exploited by...
read it
-
End-to-End Analysis of In-Browser Cryptojacking
In-browser cryptojacking involves hijacking the CPU power of a website's...
read it

Muhammad Saad
is this you? claim profile