Christof Ferreira Torres

Orcid: 0000-0001-6992-703X

Affiliations:
  • ETH Zurich, Switzerland
  • University of Luxembourg, Luxembourg (PhD 2022)


According to our database1, Christof Ferreira Torres authored at least 30 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Rolling in the Shadows: Analyzing the Extraction of MEV Across Layer-2 Rollups.
CoRR, 2024

Analyzing the Impact of Copying-and-Pasting Vulnerable Solidity Code Snippets from Question-and-Answer Websites.
Proceedings of the 2024 ACM on Internet Measurement Conference, 2024

Revisiting Rollbacks on Smart Contracts in TEE-protected Private Blockchains.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024

2023
Is Your Wallet Snitching On You? An Analysis on the Privacy Implications of Web3.
Proceedings of the 32nd USENIX Security Symposium, 2023

Ethereum's Proposer-Builder Separation: Promises and Realities.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

A Ripple for Change: Analysis of Frontrunning in the XRP Ledger.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

Timely Identification of Victim Addresses in DeFi Attacks.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

2022
From Smart to Secure Contracts: Automated Security Assessment and Improvement of Ethereum Smart Contracts.
PhD thesis, 2022

Elysium: Context-Aware Bytecode-Level Patching to Automatically Heal Vulnerable Smart Contracts.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

A flash(bot) in the pan: measuring maximal extractable value in private pools.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

2021
The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts.
IACR Cryptol. ePrint Arch., 2021

Elysium: Automagically Healing Vulnerable Smart Contracts Using Context-Aware Patching.
CoRR, 2021

Frontrunner Jones and the Raiders of the Dark Forest: An Empirical Study of Frontrunning on the Ethereum Blockchain.
Proceedings of the 30th USENIX Security Symposium, 2021

High-Frequency Trading on Decentralized On-Chain Exchanges.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

ConFuzzius: A Data Dependency-Aware Hybrid Fuzzer for Smart Contracts.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

2020
Towards Smart Hybrid Fuzzing for Smart Contracts.
CoRR, 2020

Towards Usable Protection Against Honeypots.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2020

A Data Science Approach for Detecting Honeypots in Ethereum.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2020

ÆGIS: Shielding Vulnerable Smart Contracts Against Attacks.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
A Data Science Approach for Honeypot Detection in Ethereum.
CoRR, 2019

The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts.
CoRR, 2019

The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts.
Proceedings of the 28th USENIX Security Symposium, 2019

Sluggish Mining: Profiting from the Verifier's Dilemma.
Proceedings of the Financial Cryptography and Data Security, 2019

Whispering Botnet Command and Control Instructions.
Proceedings of the Crypto Valley Conference on Blockchain Technology, 2019

ÆGIS: Smart Shielding of Smart Contracts.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Investigating Fingerprinters and Fingerprinting-Alike Behaviour of Android Applications.
Proceedings of the Computer Security, 2018

Osiris: Hunting for Integer Bugs in Ethereum Smart Contracts.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2016
Tackling the IFP Problem with the Preference-Based Genetic Algorithm.
Proceedings of the 2016 on Genetic and Evolutionary Computation Conference, Denver, CO, USA, July 20, 2016

The Fréchet/Manhattan Distance and the Trajectory Anonymisation Problem.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

2015
FP-Block: Usable Web Privacy by Controlling Browser Fingerprinting.
Proceedings of the Computer Security - ESORICS 2015, 2015


  Loading...