| Flash boys 2.0: Frontrunning in decentralized exchanges, miner extractable value, and consensus instability P Daian, S Goldfeder, T Kell, Y Li, X Zhao, I Bentov, L Breidenbach, ... 2020 IEEE symposium on security and privacy (SP), 910-927, 2020 | 758 | 2020 |
| Kevm: A complete formal semantics of the ethereum virtual machine E Hildenbrandt, M Saxena, N Rodrigues, X Zhu, P Daian, D Guth, ... 2018 IEEE 31st Computer Security Foundations Symposium (CSF), 204-217, 2018 | 602 | 2018 |
| Flash boys 2.0: Frontrunning, transaction reordering, and consensus instability in decentralized exchanges P Daian, S Goldfeder, T Kell, Y Li, X Zhao, I Bentov, L Breidenbach, ... arXiv preprint arXiv:1904.05234, 2019 | 381 | 2019 |
| Snow white: Robustly reconfigurable consensus and applications to provably secure proof of stake P Daian, R Pass, E Shi International conference on financial cryptography and data security, 23-41, 2019 | 355 | 2019 |
| Tesseract: Real-time cryptocurrency exchange using trusted hardware I Bentov, Y Ji, F Zhang, L Breidenbach, P Daian, A Juels Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 293 | 2019 |
| A formal verification tool for Ethereum VM bytecode D Park, Y Zhang, M Saxena, P Daian, G Roşu Proceedings of the 2018 26th ACM joint meeting on european software …, 2018 | 151 | 2018 |
| Enter the hydra: Towards principled bug bounties and {Exploit-Resistant} smart contracts L Breidenbach, P Daian, F Tramèr, A Juels 27th USENIX Security Symposium (USENIX Security 18), 1335-1352, 2018 | 147 | 2018 |
| Real-time cryptocurrency exchange using trusted hardware I Bentov, A Juels, F Zhang, P Daian, L Breidenbach US Patent 11,244,309, 2022 | 128 | 2022 |
| SquirRL: Automating attack analysis on blockchain incentive mechanisms with deep reinforcement learning C Hou, M Zhou, Y Ji, P Daian, F Tramer, G Fanti, A Juels arXiv preprint arXiv:1912.01798, 2019 | 117 | 2019 |
| Analysis of the DAO exploit P Daian Hacking, Distributed 6, 2016 | 110 | 2016 |
| Clockwork finance: Automated analysis of economic security in smart contracts K Babel, P Daian, M Kelkar, A Juels 2023 IEEE Symposium on Security and Privacy (SP), 2499-2516, 2023 | 109 | 2023 |
| Kevm: A complete semantics of the ethereum virtual machine E Hildenbrandt, M Saxena, X Zhu, N Rodrigues, P Daian, D Guth, G Roşu | 107 | 2017 |
| Snow white: Provably secure proofs of stake P Daian, R Pass, E Shi Cryptology ePrint Archive, Report 2016/919, 2016 | 75 | 2016 |
| An in-depth look at the parity multisig bug L Breidenbach, P Daian, A Juels, EG Sirer Hacking, Distributed, July, 2017 | 68 | 2017 |
| Unity is strength: A formalization of cross-domain maximal extractable value A Obadia, A Salles, L Sankar, T Chitra, V Chellani, P Daian arXiv preprint arXiv:2112.01472, 2021 | 48 | 2021 |
| Flash boys 2.0: Frontrunning, transaction reordering, and consensus instability in decentralized exchanges (2019) P Daian, S Goldfeder, T Kell, Y Li, X Zhao, I Bentov, L Breidenbach, ... arXiv preprint arXiv:1904.05234, 1904 | 44 | 1904 |
| On-chain vote buying and the rise of dark DAOs P Daian, T Kell, I Miers, A Juels Hacking, Distributed, 2018 | 43 | 2018 |
| Rv-android: Efficient parametric android runtime verification, a brief tutorial P Daian, Y Falcone, P Meredith, TF Şerbănuţă, S Shiriashi, A Iwai, ... Runtime Verification: 6th International Conference, RV 2015, Vienna, Austria …, 2015 | 28 | 2015 |
| PieceWork: Generalized Outsourcing Control for Proofs of Work P Daian, EG Sirer, I Eyal, A Juels BITCOIN'17, 2017 | 27* | 2017 |
| Complete knowledge: Preventing encumbrance of cryptographic secrets M Kelkar, K Babel, P Daian, J Austgen, V Buterin, A Juels Proceedings of the 2024 on ACM SIGSAC Conference on Computer and …, 2024 | 20 | 2024 |