Skip to main content

Showing 1–10 of 10 results for author: Felten, E W

.
  1. arXiv:2502.20334  [pdf, ps, other

    cs.GT

    Economic Censorship Games in Fraud Proofs

    Authors: Ben Berger, Edward W. Felten, Akaki Mamageishvili, Benny Sudakov

    Abstract: Optimistic rollups rely on fraud proofs -- interactive protocols executed on Ethereum to resolve conflicting claims about the rollup's state -- to scale Ethereum securely. To mitigate against potential censorship of protocol moves, fraud proofs grant participants a significant time window, known as the challenge period, to ensure their moves are processed on chain. Major optimistic rollups today… ▽ More

    Submitted 27 February, 2025; originally announced February 2025.

  2. arXiv:2501.17805  [pdf

    cs.CY cs.AI cs.LG

    International AI Safety Report

    Authors: Yoshua Bengio, Sören Mindermann, Daniel Privitera, Tamay Besiroglu, Rishi Bommasani, Stephen Casper, Yejin Choi, Philip Fox, Ben Garfinkel, Danielle Goldfarb, Hoda Heidari, Anson Ho, Sayash Kapoor, Leila Khalatbari, Shayne Longpre, Sam Manning, Vasilios Mavroudis, Mantas Mazeika, Julian Michael, Jessica Newman, Kwan Yee Ng, Chinasa T. Okolo, Deborah Raji, Girish Sastry, Elizabeth Seger , et al. (71 additional authors not shown)

    Abstract: The first International AI Safety Report comprehensively synthesizes the current evidence on the capabilities, risks, and safety of advanced AI systems. The report was mandated by the nations attending the AI Safety Summit in Bletchley, UK. Thirty nations, the UN, the OECD, and the EU each nominated a representative to the report's Expert Advisory Panel. A total of 100 AI experts contributed, repr… ▽ More

    Submitted 29 January, 2025; originally announced January 2025.

  3. arXiv:2410.10797  [pdf, other

    cs.DC

    MEV Capture Through Time-Advantaged Arbitrage

    Authors: Robin Fritsch, Maria Inês Silva, Akaki Mamageishvili, Benjamin Livshits, Edward W. Felten

    Abstract: As blockchains begin processing significant economic activity, the ability to include and order transactions inevitably becomes highly valuable, a concept known as Maximal Extractable Value (MEV). This makes effective mechanisms for transaction inclusion and ordering, and thereby the extraction of MEV, a key aspect of blockchain design. Beyond traditional approaches such as ordering in a first-com… ▽ More

    Submitted 23 April, 2025; v1 submitted 14 October, 2024; originally announced October 2024.

  4. arXiv:2404.10491  [pdf, other

    cs.CR cs.DC

    BoLD: Fast and Cheap Dispute Resolution

    Authors: Mario M. Alvarez, Henry Arneson, Ben Berger, Lee Bousfield, Chris Buckland, Yafah Edelman, Edward W. Felten, Daniel Goldman, Raul Jordan, Mahimna Kelkar, Akaki Mamageishvili, Harry Ng, Aman Sanghi, Victor Shoup, Terence Tsao

    Abstract: BoLD is a new dispute resolution protocol that is designed to replace the originally deployed Arbitrum dispute resolution protocol. Unlike that protocol, BoLD is resistant to delay attacks. It achieves this resistance without a significant increase in onchain computation costs and with reduced staking costs.

    Submitted 16 April, 2024; originally announced April 2024.

  5. arXiv:2310.01155  [pdf, ps, other

    cs.GT econ.TH

    EIP-4844 Economics and Rollup Strategies

    Authors: Davide Crapis, Edward W. Felten, Akaki Mamageishvili

    Abstract: We study the economics of the Ethereum improvement proposal 4844 and its effect on rollups' data posting strategies. Rollups' cost consists of two parts: data posting and delay. In the new proposal, the data posting cost corresponds to a blob posting cost and is fixed in each block, no matter how much of the blob is utilized by the rollup. The tradeoff is clear: the rollup prefers to post a full b… ▽ More

    Submitted 2 October, 2023; originally announced October 2023.

  6. arXiv:2308.02880  [pdf, ps, other

    cs.GT cs.CR

    Incentive Schemes for Rollup Validators

    Authors: Akaki Mamageishvili, Edward W. Felten

    Abstract: We design and analyze attention games that incentivize validators to check computation results. We show that no pure strategy Nash equilibrium of the game without outside parties exists by a simple argument. We then proceed to calculate the security of the system in the mixed Nash equilibrium, as a function of the number of validators and their stake sizes. Our results provide lower and upper boun… ▽ More

    Submitted 5 August, 2023; originally announced August 2023.

  7. arXiv:2306.02179  [pdf, other

    cs.GT cs.CR econ.TH

    Buying Time: Latency Racing vs. Bidding in Transaction Ordering

    Authors: Akaki Mamageishvili, Mahimna Kelkar, Jan Christoph Schlegel, Edward W. Felten

    Abstract: We design TimeBoost: a practical transaction ordering policy for rollup sequencers that takes into account both transaction timestamps and bids; it works by creating a score from timestamps and bids, and orders transactions based on this score. TimeBoost is transaction-data-independent (i.e., can work with encrypted transactions) and supports low transaction finalization times similar to a first… ▽ More

    Submitted 16 August, 2023; v1 submitted 3 June, 2023; originally announced June 2023.

  8. arXiv:2212.10337  [pdf, other

    cs.CR econ.TH

    Efficient Rollup Batch Posting Strategy on Base Layer

    Authors: Akaki Mamageishvili, Edward W. Felten

    Abstract: We design efficient and robust algorithms for the batch posting of rollup chain calldata on the base layer chain, using tools from operations research. We relate the costs of posting and delaying, by converting them to the same units and adding them up. The algorithm that keeps the average and maximum queued number of batches tolerable enough improves the posting costs of the trivial algorithm, wh… ▽ More

    Submitted 24 February, 2023; v1 submitted 20 December, 2022; originally announced December 2022.

    Comments: 13 pages, 2 figures, forthcoming at WTSC

  9. arXiv:2205.03009  [pdf, other

    cs.CR cs.CY

    Watching the watchers: bias and vulnerability in remote proctoring software

    Authors: Ben Burgess, Avi Ginsberg, Edward W. Felten, Shaanan Cohney

    Abstract: Educators are rapidly switching to remote proctoring and examination software for their testing needs, both due to the COVID-19 pandemic and the expanding virtualization of the education sector. State boards are increasingly utilizing these software for high stakes legal and medical licensing exams. Three key concerns arise with the use of these complex software: exam integrity, exam procedural fa… ▽ More

    Submitted 6 May, 2022; originally announced May 2022.

    Comments: To appear in USENIX Security Symposium 2022

  10. A Cryptographic Escrow for Treaty Declarations and Step-by-Step Verification

    Authors: Sébastien Philippe, Alexander Glaser, Edward W. Felten

    Abstract: The verification of arms-control and disarmament agreements requires states to provide declarations, including information on sensitive military sites and assets. There are important cases, however, where negotiations of these agreements are impeded because states are reluctant to provide any such data, because of concerns about prematurely handing over militarily significant information. To addre… ▽ More

    Submitted 11 September, 2018; originally announced September 2018.

    Comments: 14 pages, 4 figures

    Journal ref: Science & Global Security, pp.1-12 (2019)