Skip to main content

Showing 1–6 of 6 results for author: Franzoni, F

Searching in archive cs. Search in all archives.
.
  1. arXiv:2208.07665  [pdf, other

    cs.DC

    QPQ 1DLT: A system for the rapid deployment of secure and efficient EVM-based blockchains

    Authors: Simone Bottoni, Anwitaman Datta, Federico Franzoni, Emanuele Ragnoli, Roberto Ripamonti, Christian Rondanini, Gokhan Sagirlar, Alberto Trombetta

    Abstract: Limited scalability and transaction costs are, among others, some of the critical issues that hamper a wider adoption of distributed ledger technologies (DLT). That is particularly true for the Ethereum blockchain, which, so far, has been the ecosystem with the highest adoption rate. Quite a few solutions, especially on the Ethereum side of things, have been attempted in the last few years. Most o… ▽ More

    Submitted 16 August, 2022; originally announced August 2022.

  2. arXiv:2109.00376  [pdf, other

    cs.CR cs.NI

    Clover: an Anonymous Transaction Relay Protocol for the Bitcoin P2P Network

    Authors: Federico Franzoni, Vanesa Daza

    Abstract: The Bitcoin P2P network currently represents a reference benchmark for modern cryptocurrencies. Its underlying protocol defines how transactions and blocks are distributed through all participating nodes. To protect user privacy, the identity of the node originating a message is kept hidden. However, an adversary observing the whole network can analyze the spread pattern of a transaction to trace… ▽ More

    Submitted 1 September, 2021; originally announced September 2021.

    Comments: 20 pages, 3 figures, Accepted to Peer to Peer Network and Applications journal (special issue on Blockchain)

  3. arXiv:2107.12912  [pdf, other

    cs.CR cs.NI

    AToM: Active Topology Monitoring for the Bitcoin Peer-to-Peer Network

    Authors: Federico Franzoni, Xavier Salleras, Vanesa Daza

    Abstract: Over the past decade, the Bitcoin P2P network protocol has become a reference model for all modern cryptocurrencies. While nodes in this network are known, the connections among them are kept hidden, as it is commonly believed that this helps protect from deanonymization and low-level attacks. However, adversaries can bypass this limitation by inferring connections through side channels. At the sa… ▽ More

    Submitted 27 July, 2021; originally announced July 2021.

    Comments: 27 pages, 4 figures, Accepted to Peer to Peer Network and Applications journal (special issue on Blockchain)

  4. arXiv:2010.15070  [pdf, other

    cs.NI cs.CR

    Improving Bitcoin Transaction Propagation by Leveraging Unreachable Nodes

    Authors: Federico Franzoni, Vanesa Daza

    Abstract: The Bitcoin P2P network is at the core of all communications between clients. The reachable part of this network has been explored and analyzed by numerous studies. Unreachable nodes, however, are, in most part, overlooked. Nonetheless, they are a relevant part of the network and play an essential role in the propagation of messages. In this paper, we focus on transaction propagation and show that… ▽ More

    Submitted 28 October, 2020; originally announced October 2020.

    Comments: 16 pages, 1 figure, Published in "IEEE Blockchain 2020" conference

  5. arXiv:2006.06036  [pdf, ps, other

    cs.CR

    Leveraging Bitcoin Testnet for Bidirectional Botnet Command and Control Systems

    Authors: Federico Franzoni, Ivan Abellan, Vanesa Daza

    Abstract: Over the past twenty years, the number of devices connected to the Internet grew exponentially. Botnets benefited from this rise to increase their size and the magnitude of their attacks. However, they still have a weak point in their Command & Control (C&C) system, which is often based on centralized services or require a complex infrastructure to keep operating without being taken down by author… ▽ More

    Submitted 10 June, 2020; originally announced June 2020.

    Comments: 19 pages, 0 figures, Conference: Financial Cryptography and Data Security 2020

  6. HyBIS: Windows Guest Protection through Advanced Memory Introspection

    Authors: Roberto di Pietro, Federico Franzoni, Flavio Lombardi

    Abstract: Effectively protecting the Windows OS is a challenging task, since most implementation details are not publicly known. Windows has always been the main target of malwares that have exploited numerous bugs and vulnerabilities. Recent trusted boot and additional integrity checks have rendered the Windows OS less vulnerable to kernel-level rootkits. Nevertheless, guest Windows Virtual Machines are be… ▽ More

    Submitted 21 January, 2016; originally announced January 2016.