1

A Flash(bot) in the Pan: Measuring Maximal Extractable Value in Private Pools

Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents

ShorTor: Improving Tor Network Latency via Multi-hop Overlay Routing

Structural Attacks on Local Routing in Payment Channel Networks