Skip to main content

Showing 1–10 of 10 results for author: Chaliasos, S

Searching in archive cs. Search in all archives.
.
  1. Towards Fuzzing Zero-Knowledge Proof Circuits (Short Paper)

    Authors: Stefanos Chaliasos, Imam Al-Fath, Alastair Donaldson

    Abstract: Zero-knowledge proofs (ZKPs) have evolved from a theoretical cryptographic concept into a powerful tool for implementing privacy-preserving and verifiable applications without requiring trust assumptions. Despite significant progress in the field, implementing and using ZKPs via \emph{ZKP circuits} remains challenging, leading to numerous bugs that affect ZKP circuits in practice, and \emph{fuzzin… ▽ More

    Submitted 30 April, 2025; v1 submitted 21 April, 2025; originally announced April 2025.

    Comments: 7 pages

  2. arXiv:2410.13277  [pdf, ps, other

    cs.CR

    Pricing Factors and TFMs for Scalability-Focused ZK-Rollups

    Authors: Stefanos Chaliasos, Nicolas Mohnblatt, Assimakis Kattis, Benjamin Livshits

    Abstract: ZK-Rollups have emerged as a leading solution for blockchain scalability, leveraging succinct proofs primarily based on ZKP protocols. This paper explores the design of transaction fee mechanisms (TFMs) for ZK-Rollups, focusing on how key components like sequencing, data availability~(DA), and ZK proving interact to influence cost structures. We outline the properties that a suitable TFM should po… ▽ More

    Submitted 17 October, 2024; originally announced October 2024.

  3. arXiv:2406.16219  [pdf, other

    cs.CR

    Towards a Formal Foundation for Blockchain Rollups

    Authors: Stefanos Chaliasos, Denis Firsov, Benjamin Livshits

    Abstract: Blockchains like Bitcoin and Ethereum have revolutionized digital transactions, yet scalability issues persist. Layer 2 solutions, such as validity proof Rollups (ZK-Rollups), aim to address these challenges by processing transactions off-chain and validating them on the main chain. However, concerns remain about security and censorship resistance, particularly regarding centralized control in Lay… ▽ More

    Submitted 11 March, 2025; v1 submitted 23 June, 2024; originally announced June 2024.

  4. arXiv:2402.15293  [pdf, other

    cs.CR

    SoK: What don't we know? Understanding Security Vulnerabilities in SNARKs

    Authors: Stefanos Chaliasos, Jens Ernstberger, David Theodore, David Wong, Mohammad Jahanara, Benjamin Livshits

    Abstract: Zero-knowledge proofs (ZKPs) have evolved from being a theoretical concept providing privacy and verifiability to having practical, real-world implementations, with SNARKs (Succinct Non-Interactive Argument of Knowledge) emerging as one of the most significant innovations. Prior work has mainly focused on designing more efficient SNARK systems and providing security proofs for them. Many think of… ▽ More

    Submitted 11 July, 2024; v1 submitted 23 February, 2024; originally announced February 2024.

  5. arXiv:2311.04527  [pdf, other

    cs.PL cs.SE

    Extended Paper: API-driven Program Synthesis for Testing Static Typing Implementations

    Authors: Thodoris Sotiropoulos, Stefanos Chaliasos, Zhendong Su

    Abstract: We introduce a novel approach for testing static typing implementations based on the concept of API-driven program synthesis. The idea is to synthesize type-intensive but small and well-typed programs by leveraging and combining application programming interfaces (APIs) derived from existing software libraries. Our primary insight is backed up by real-world evidence: a significant number of compil… ▽ More

    Submitted 8 November, 2023; originally announced November 2023.

  6. Smart Contract and DeFi Security Tools: Do They Meet the Needs of Practitioners?

    Authors: Stefanos Chaliasos, Marcos Antonios Charalambous, Liyi Zhou, Rafaila Galanopoulou, Arthur Gervais, Dimitris Mitropoulos, Ben Livshits

    Abstract: The growth of the decentralized finance (DeFi) ecosystem built on blockchain technology and smart contracts has led to an increased demand for secure and reliable smart contract development. However, attacks targeting smart contracts are increasing, causing an estimated \… ▽ More

    Submitted 22 January, 2024; v1 submitted 6 April, 2023; originally announced April 2023.

  7. The Blockchain Imitation Game

    Authors: Kaihua Qin, Stefanos Chaliasos, Liyi Zhou, Benjamin Livshits, Dawn Song, Arthur Gervais

    Abstract: The use of blockchains for automated and adversarial trading has become commonplace. However, due to the transparent nature of blockchains, an adversary is able to observe any pending, not-yet-mined transactions, along with their execution logic. This transparency further enables a new type of adversary, which copies and front-runs profitable pending transactions in real-time, yielding significant… ▽ More

    Submitted 31 March, 2023; originally announced March 2023.

  8. arXiv:2208.13035  [pdf, other

    cs.CR

    SoK: Decentralized Finance (DeFi) Attacks

    Authors: Liyi Zhou, Xihan Xiong, Jens Ernstberger, Stefanos Chaliasos, Zhipeng Wang, Ye Wang, Kaihua Qin, Roger Wattenhofer, Dawn Song, Arthur Gervais

    Abstract: Within just four years, the blockchain-based Decentralized Finance (DeFi) ecosystem has accumulated a peak total value locked (TVL) of more than 253 billion USD. This surge in DeFi's popularity has, unfortunately, been accompanied by many impactful incidents. According to our data, users, liquidity providers, speculators, and protocol operators suffered a total loss of at least 3.24 billion USD fr… ▽ More

    Submitted 7 April, 2023; v1 submitted 27 August, 2022; originally announced August 2022.

  9. arXiv:2201.09035  [pdf, other

    cs.CR

    On How Zero-Knowledge Proof Blockchain Mixers Improve, and Worsen User Privacy

    Authors: Zhipeng Wang, Stefanos Chaliasos, Kaihua Qin, Liyi Zhou, Lifeng Gao, Pascal Berrang, Ben Livshits, Arthur Gervais

    Abstract: Zero-knowledge proof (ZKP) mixers are one of the most widely-used blockchain privacy solutions, operating on top of smart contract-enabled blockchains. We find that ZKP mixers are tightly intertwined with the growing number of Decentralized Finance (DeFi) attacks and Blockchain Extractable Value (BEV) extractions. Through coin flow tracing, we discover that 205 blockchain attackers and 2,595 BEV e… ▽ More

    Submitted 6 March, 2023; v1 submitted 22 January, 2022; originally announced January 2022.

  10. Identifying Bugs in Make and JVM-Oriented Builds

    Authors: Thodoris Sotiropoulos, Stefanos Chaliasos, Dimitris Mitropoulos, Diomidis Spinellis

    Abstract: Incremental and parallel builds are crucial features of modern build systems. Parallelism enables fast builds by running independent tasks simultaneously, while incrementality saves time and computing resources by processing the build operations that were affected by a particular code change. Writing build definitions that lead to error-free incremental and parallel builds is a challenging task. T… ▽ More

    Submitted 14 May, 2020; originally announced May 2020.