Now showing items 1-4 of 4

    • Challenges in Decentralized Name Management: The Case of ENS 

      Xia, P; Wang, H; Yu, Z; Liu, X; Luo, X; Xu, G; Tyson, G; 22nd ACM Internet Measurement Conference (2022-10-25)
      DNS has often been criticized for inherent design flaws, which make the system vulnerable to attack. Further, domain names are not fully controlled by users, meaning that they can easily be taken down by authorities and ...
    • Tracking Counterfeit Cryptocurrency End-to-end 

      Gao, B; Wang, H; Xia, P; Wu, S; Zhou, Y; Luo, X; Tyson, G (Association for Computing Machinery, 2020-11-30)
      The production of counterfeit money has a long history. It refers to the creation of imitation currency that is produced without the legal sanction of government. With the growth of the cryptocurrency ecosystem, there is ...
    • Tracking Counterfeit Cryptocurrency End-to-end 

      Gao, B; Wang, H; Xia, P; Wu, S; Zhou, Y; Luo, X; Tyson, G (Association for Computing Machinery (ACM), 2021-06-22)
    • Tracking Counterfeit Cryptocurrency End-To-end 

      Gao, B; Wang, H; Xia, P; Wu, S; Zhou, Y; Luo, X; Tyson, G (2021-06-01)
      With the growth of the cryptocurrency ecosystem, there is expanding evidence that counterfeit cryptocurrency has also appeared. In this paper, we empirically explore the presence of counterfeit cryptocurrencies on Ethereum ...