Alberto Sonnino, Michał Król, Argyrios Tasiopoulos and Ioannis Psaras

Recent developments in blockchains and edge computing allow deployment of decentralized shared economy platforms with utility token support, where tokens (in the form of altcoins) secure and reward useful work. However, the majority of the systems being developed, does not provide mechanisms to pair those who offer services (workers) and those who request them (clients), or rely on manual and insecure resolution. AStERISK bridges this gap allowing to perform sealed-bid auctions on blockchains, automatically determine the most optimal price for services, and assign clients to the most suitable workers. AStERISK allows workers to specify a minimal price for their work, and hide submitted bids as well the identity of the bidders without relying on any centralized party at any point. We provide a smart contract implementation of AStERISK and show how to deploy it within the Filecoin network, and perform an initial benchmark on Chainspace, an efficient, new smart contract platform.

View More Papers

coucouArray ( [post_type] => ndss-paper [post_status] => publish [posts_per_page] => 4 [orderby] => rand [tax_query] => Array ( [0] => Array ( [taxonomy] => category [field] => id [terms] => Array ( [0] => 38 ) ) ) [post__not_in] => Array ( [0] => 4776 ) )

Designing a Secure IoT System Architecture from a Virtual...

Vida Ahmadi Mehri, Dragos Ilie and Kurt Tutschku

Read More

Defending Against Consumer Drone Privacy Attacks: A Blueprint for...

Lanier Watkins, Shane Sartalamacchia, Richard Bradt, Karan Dhareshwar, Harsimar Bagga (Johns Hopkins University, USA); William H. Robinson (Vanderbilt University, USA); Aviel Rubin (Johns Hopkins University, USA)

Read More

ADROIT: Detecting Spatio-Temporal Correlated Attack-Stages in IoT Networks

Dinil Mon Divakaran (Trustwave, Singapore); Rhishi Pratap Singh, Kushan Sudheera Kalupahana Liyanage, Mohan Gurusamy (National University of Singapore, Singapore); Vinay Sachidananda (Trustwave, Singapore)

Read More

Enabling Decentralised Identifiers and Verifiable Credentials for Constrained IoT...

Dmitrij Lagutin, Yki Kortesniemi, Nikos Fotiou and Vasilios A. Siris

Read More

Privacy Starts with UI: Privacy Patterns and Designer Perspectives in UI/UX Practice

Anxhela Maloku (Technical University of Munich), Alexandra Klymenko (Technical University of Munich), Stephen Meisenbacher (Technical University of Munich), Florian Matthes (Technical University of Munich)

Vision: Profiling Human Attackers: Personality and Behavioral Patterns in Deceptive Multi-Stage CTF Challenges

Khalid Alasiri (School of Computing and Augmented Intelligence Arizona State University), Rakibul Hasan (School of Computing and Augmented Intelligence Arizona State University)

From Underground to Mainstream Marketplaces: Measuring AI-Enabled NSFW Deepfakes on Fiverr

Mohamed Moustafa Dawoud (University of California, Santa Cruz), Alejandro Cuevas (Princeton University), Ram Sundara Raman (University of California, Santa Cruz)