Kai Li

Orcid: 0000-0002-6040-0220

Affiliations:
  • San Diego State University, CA, USA
  • Syracuse University, Department of EECS, NY, USA (former)


According to our database1, Kai Li authored at least 22 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Understanding Ethereum Mempool Security under Asymmetric DoS by Symbolized Stateful Fuzzing.
Proceedings of the 33rd USENIX Security Symposium, 2024

Characterizing Ethereum Address Poisoning Attack.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Towards Understanding and Characterizing the Arbitrage Bot Scam In the Wild.
Proc. ACM Meas. Anal. Comput. Syst., December, 2023

Towards Saving Blockchain Fees via Secure and Cost-Effective Batching of Smart-Contract Invocations.
IEEE Trans. Software Eng., April, 2023

Understanding Ethereum Mempool Security under Asymmetric DoS by Symbolic Fuzzing.
CoRR, 2023

Understanding and Characterizing Cryptocurrency Free Giveaway and Arbitrage Bot Scams In the Wild.
CoRR, 2023

Understanding the Security Risks of Decentralized Exchanges by Uncovering Unfair Trades in the Wild.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

Understanding the Cryptocurrency Free Giveaway Scam Disseminated on Twitter Lists.
Proceedings of the IEEE International Conference on Blockchain, 2023

2022
Efficiently Hardening SGX Enclaves against Memory Access Pattern Attacks via Dynamic Program Partitioning.
CoRR, 2022

2021
iBatch: Saving Ethereum Fees via Secure and Cost-Effective Batching of Smart-Contract Invocations.
CoRR, 2021

iBatch: saving Ethereum fees via secure and cost-effective batching of smart-contract invocations.
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021

As Strong As Its Weakest Link: How to Break Blockchain DApps at RPC Service.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Authenticated key-value stores with hardware enclaves.
Proceedings of the Middleware '21: Proceedings of the 22nd International Middleware Conference: Industrial Track, Virtual Event / Québec City, Canada, December 6, 2021

TopoShot: uncovering Ethereum's network topology leveraging replacement transactions.
Proceedings of the IMC '21: ACM Internet Measurement Conference, 2021

DETER: Denial of Ethereum Txpool sERvices.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Scalable Log Auditing on Private Blockchains via Lightweight Log-Fork Prevention.
Proceedings of the 4th Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers, 2020

Cost-Effective Data Feeds to Blockchains via Workload-Adaptive Data Replication.
Proceedings of the Middleware '20: 21st International Middleware Conference, 2020

2019
Privacy-Preserving Multi-Party Directory Services.
EAI Endorsed Trans. Security Safety, 2019

GRuB: Gas-Efficient Blockchain Storage via Workload-Adaptive Data Replication.
CoRR, 2019

Authenticated LSM Trees with Minimal Trust.
Proceedings of the Security and Privacy in Communication Networks, 2019

Secure Consistency Verification for Untrusted Cloud Storage by Public Blockchains.
Proceedings of the Security and Privacy in Communication Networks, 2019

2018
ChainFS: Blockchain-Secured Cloud Storage.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018


  Loading...