[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3341301.3359627acmconferencesArticle/Chapter ViewAbstractPublication PagessospConference Proceedingsconference-collections
research-article

Teechain: a secure payment network with asynchronous blockchain access

Published: 27 October 2019 Publication History

Abstract

Blockchains such as Bitcoin and Ethereum execute payment transactions securely, but their performance is limited by the need for global consensus. Payment networks overcome this limitation through off-chain transactions. Instead of writing to the blockchain for each transaction, they only settle the final payment balances with the underlying blockchain. When executing off-chain transactions in current payment networks, parties must access the blockchain within bounded time to detect misbehaving parties that deviate from the protocol. This opens a window for attacks in which a malicious party can steal funds by deliberately delaying other parties' blockchain access and prevents parties from using payment networks when disconnected from the blockchain.
We present Teechain, the first layer-two payment network that executes off-chain transactions asynchronously with respect to the underlying blockchain. To prevent parties from misbehaving, Teechain uses treasuries, protected by hardware trusted execution environments (TEEs), to establish off-chain payment channels between parties. Treasuries maintain collateral funds and can exchange transactions efficiently and securely, without interacting with the underlying blockchain. To mitigate against treasury failures and to avoid having to trust all TEEs, Teechain replicates the state of treasuries using committee chains, a new variant of chain replication with threshold secret sharing. Teechain achieves at least a 33X higher transaction throughput than the state-of-the-art Lightning payment network. A 30-machine Teechain deployment can handle over 1 million Bitcoin transactions per second.

References

[1]
Syed Taha Ali, Dylan Clarke, and Patrick McCorry. 2017. The Nuts and Bolts of Micropayments: a Survey. Preprint arXiv:1710.02964.
[2]
Amazon. 2019. https://www.amazon.com/.
[3]
Ittai Anati, Shay Gueron, Simon Johnson, and Vincent Scarlata. 2013. Innovative Technology for CPU Based Attestation and Sealing. In Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, HASP, Vol. 13.
[4]
Elli Androulaki, Artem Barger, Vita Bortnikov, Christian Cachin, Konstantinos Christidis, Angelo De Caro, David Enyeart, Christopher Ferris, Gennady Laventman, Yacov Manevich, Srinivasan Muralidharan, Chet Murthy, Binh Nguyen, Manish Sethi, Gari Singh, Keith Smith, Alessandro Sorniotti, Chrysoula Stathakopoulou, Marko Vukolić, Sharon Weed Cocco, and Jason Yellick. 2018. Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains. In EuroSys.
[5]
ARM Ltd. 2017. TrustZone. https://www.arm.com/products/security-on-arm/trustzone. Accessed May 2017.
[6]
Iddo Bentov, Yan Ji, Fan Zhang, Yunqi Li, Xueyuan Zhao, Lorenz Breidenbach, Philip Daian, and Ari Juels. 2017. Tesseract: Real-Time Cryptocurrency Exchange using Trusted Hardware. IACR Cryptology ePrint Archive 2017, 1153.
[7]
Iddo Bentov, Charles Lee, Alex Mizrahi, and Meni Rosenfeld. 2014. Proof of Activity: Extending Bitcoin's Proof of Work via Proof of Stake. ePrint Archive, Report 2014/452. http://eprint.iacr.org/2014/452.
[8]
blockchain.info. 2018. Average Confirmation Time. https://blockchain.info/charts/avg-confirmation-time?timespan=all&daysAverageString=7. Accessed May 2018.
[9]
Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig Mjølsnes, Frank Muller, Torben Pedersen, Birgit Pfitzmann, Peter De Rooij, Berry Schoenmakers, et al. 1994. The ESPRIT project CAFE---High security digital payment systems. In European Symposium on Research in Computer Security. Springer, 217--230.
[10]
Marcus Brandenburger, Christian Cachin, Matthias Lorenz, and Rüdiger Kapitza. 2017. Rollback and forking detection for trusted execution environments using lightweight collective memory. In 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 157--168.
[11]
Ferdinand Brasser, Urs Müller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, and Ahmad-Reza Sadeghi. 2017. Software grand exposure: SGX cache attacks are practical. arXiv:1702.07521, 33.
[12]
Conrad Burchert, Christian Decker, and Roger Wattenhofer. 2017. Scalable Funding of Bitcoin Micropayment Channel Networks. In International Symposium on Stabilization, Safety, and Security of Distributed Systems. Springer, 361--377.
[13]
Ran Canetti. 2001. Universally composable security: A new paradigm for cryptographic protocols. In Foundations of Computer Science, 2001. Proceedings. 42nd IEEE Symposium on. IEEE, 136--145.
[14]
Miguel Castro, Barbara Liskov, et al. 1999. Practical Byzantine Fault Tolerance. In OSDI, Vol. 99. 173--186.
[15]
Raymond Cheng, Fan Zhang, Jernej Kos, Warren He, Nicholas Hynes, Noah Johnson, Ari Juels, Andrew Miller, and Dawn Song. 2018. Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contract Execution. Preprint arXiv:1804.05141.
[16]
Eric K Clemons, David C Croson, and Bruce W Weber. 1996. Reengineering money: the Mondex stored value card and beyond. International Journal of Electronic Commerce 1, 2, 5--31.
[17]
Victor Costan, Ilia Lebedev, and Srinivas Devadas. 2016. Sanctum: Minimal hardware extensions for strong software isolation. In 25th USENIX Security Symposium (USENIX Security 16). 857--874.
[18]
Christian Decker and Roger Wattenhofer. 2015. A Fast and Scalable Payment Network with Bitcoin Duplex Micropayment Channels. In Stabilization, Safety, and Security of Distributed Systems - 17th International Symposium.
[19]
John R Douceur. 2002. The sybil attack. In International workshop on peer-to-peer systems. Springer, 251--260.
[20]
Tadge Dryja. 2015. Scalability of lightning with different bips and some back-of-the-envelope calculations. http://diyhpl.us/wiki/transcripts/scalingbitcoin/hong-kong/overview-of-bips-necessary-for-lightning/.
[21]
Thaddeus Dryja. 2016. Unlinkable outsourced channel monitoring. https://youtu.be/Gzg_u9gHc5Q?t=2875.
[22]
DwarfPool. 2016. Why DwarfPool mines mostly empty blocks and only few ones with transactions. https://www.reddit.com/r/ethereum/comments/57c1yn/why_dwarfpool_mines_mostly_empty_blocks_and_only/. Accessed Feb 2018.
[23]
Joan G Dyer, Mark Lindemann, Ronald Perez, Reiner Sailer, Leendert Van Doorn, and Sean W Smith. 2001. Building the IBM 4758 secure coprocessor. Computer 34, 10, 57--66.
[24]
Stefan Dziembowski, Sebastian Faust, and Kristina Hostáková. 2018. General state channel networks. In Proceedings of 2018 SIGSAC Conference on Computer and Communications Security. ACM, 949--966.
[25]
Ebay. 2019. https://www.ebay.com/.
[26]
Ittay Eyal, Adem Efe Gencer, Emin Gün Sirer, and Robbert Van Renesse. 2016. Bitcoin-NG: A Scalable Blockchain Protocol. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2016).
[27]
Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, and Nickolai Zeldovich. 2017. Algorand: Scaling byzantine agreements for cryptocurrencies. In Proceedings of the 26th Symposium on Operating Systems Principles. ACM, 51--68.
[28]
Gideon Greenspan. 2015. MultiChain private blockchain---White paper. http://www.multichain.com/download/MultiChain-White-Paper.pdf.
[29]
Lewis Gudgeon, Pedro Moreno-Sanchez, Stefanie Roos, Patrick McCorry, and Arthur Gervais. 2019. SoK: Off The Chain Transactions. ePrint Archive, Report 2019/360. https://eprint.iacr.org/2019/360.
[30]
Mike Hearn and Jeremy Spilman. 2015. Rapidly-adjusted micropayments to a pre-determined party. https://en.bitcoin.it/wiki/Contract.
[31]
Ethan Heilman, Alison Kendler, Aviv Zohar, and Sharon Goldberg. 2015. Eclipse Attacks on Bitcoin's Peer-to-Peer Network. In 24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12--14, 2015. 129--144. https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/heilman
[32]
Hex-Five Security. 2018. Multizone: The first Trusted Execution Environment for RISC-V. https://hex-five.com/.
[33]
Intel. 2015. Product Change Notification. https://qdms.intel.com/dm/i.aspx/5A160770-FC47-47A0-BF8A-062540456F0A/PCN114074-00.pdf. Accessed May 2018.
[34]
Intel. 2017. Intel SGX SDK for Linux. https://download.01.org/intel-sgx/linux-1.8/docs/Intel_SGX_SDK_Developer_Reference_Linux_1.8_Open_Source.pdf. Accessed May 2017.
[35]
Intel Corp. 2014. Software Guard Extensions Programming Reference, Ref. 329298-002US. https://software.intel.com/sites/default/files/managed/48/88/329298-002.pdf. https://software.intel.com/sites/default/files/managed/48/88/329298-002.pdf
[36]
Intel Inc. 2016. Intel Software Guard Extensions Remote Attestation End-to-End Example. https://software.intel.com/en-us/articles/intel-software-guard-extensions-remote-attestation-end-to-end-example. Accessed May 2017.
[37]
Intel Inc. 2017. sgx_create_monotonic_counter. https://software.intel.com/en-us/node/709160. Accessed May 2017.
[38]
Johnson, Simon et al. 2016. Intel® Software Guard Extensions: EPID Provisioning and Attestation Services. https://software.intel.com/en-us/blogs/2016/03/09/intel-sgx-epid-provisioning-and-attestation-services.
[39]
Jordan Pearson. 2015. WikiLeaks Is Now a Target In the Massive Spam Attack on Bitcoin. https://motherboard.vice.com/en_us/article/ezvw7z/wikileaks-is-now-a-target-in-the-massive-spam-attack-on-bitcoin. Accessed Feb 2018.
[40]
Joseph Young. 2017. Analyst: Suspicious Bitcoin Mempool Activity, Transaction Fees Spike to 16. https://cointelegraph.com/news/analyst-suspicious-bitcoin-mempool-activity-transaction-fees-spike-to-16. Accessed Feb 2018.
[41]
JP Buntinx. 2017. F2Pool Allegedly Prevented Users From Investing in Status ICO. https://themerkle.com/f2pool-allegedly-prevented-users-from-investing-in-status-ico/. Accessed Feb 2018.
[42]
David Kaplan, Jeremy Powell, and Tom Woller. 2016. AMD Memory Encryption. White paper.
[43]
Keystone Project. 2018. Keystone: Open-source Secure Hardware Enclave. https://keystone-enclave.org/.
[44]
Rami Khalil and Arthur Gervais. 2017. Revive: Rebalancing Off-Blockchain Payment Networks. Gas 200, 400.
[45]
Eleftherios Kokoris Kogias, Philipp Jovanovic, Nicolas Gailly, Ismail Khoffi, Linus Gasser, and Bryan Ford. 2016. Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing. In 25th USENIX Security Symposium (USENIX Security 16).
[46]
Eleftherios Kokoris-Kogias, Philipp Jovanovic, Linus Gasser, Nicolas Gailly, Ewa Syta, and Bryan Ford. 2018. Omniledger: A secure, scale-out, decentralized ledger via sharding. In 2018 IEEE Symposium on Security and Privacy (SP). IEEE, 583--598.
[47]
Hugo Krawczyk. 2003. SIGMA: The 'SIGn-and-MAc' approach to authenticated Diffie-Hellman and its use in the IKE protocols. In Annual International Cryptology Conference. Springer, 400--425.
[48]
Leslie Lamport et al. 2001. Paxos made simple. ACM Sigact News. Dec 2001 32, 4, 18--25.
[49]
Yoad Lewenberg, Yonatan Sompolinsky, and Aviv Zohar. 2015. Inclusive Block Chain Protocols. In Financial Cryptography. Puerto Rico.
[50]
Lightning Network community. 2017. Lightning Network Daemon. https://github.com/lightningnetwork/lnd. Accessed May 2017.
[51]
Linaro. 2014. Open Portable Trusted Execution Environment. https://www.op-tee.org/.
[52]
Joshua Lind, Ittay Eyal, Peter Pietzuch, and Emin Gün Sirer. 2016. Teechan: Payment channels using trusted execution environments. Preprint arXiv:1612.07766.
[53]
Joshua Lind, Oded Naor, Florian Kelbert, Ittay Eyal, Emin Gün Sirer, and Peter Pietzuch. 2019. Teechain Technical Report. https://arxiv.org/abs/1707.05454.
[54]
Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, and Srivatsan Ravi. 2017. Concurrency and privacy with payment-channel networks.
[55]
Yuval Marcus, Ethan Heilman, and Sharon Goldberg. 2018. Low-Resource Eclipse Attacks on Ethereum's Peer-to-Peer Network. IACR Cryptology ePrint Archive 2018, 236.
[56]
Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David Sommer, Arthur Gervais, Ari Juels, and Srdjan Capkun. 2017. ROTE: Rollback Protection for Trusted Execution. Cryptology ePrint Archive, Report 2017/048. http://eprint.iacr.org/2017/048.
[57]
David Mazieres. 2015. The Stellar Consensus Protocol: A Federated Model for Internet-level Consensus. https://www.stellar.org/papers/stellar-consensus-protocol.pdf.
[58]
Patrick McCorry, Surya Bakshi, Iddo Bentov, Andrew Miller, and Sarah Meiklejohn. 2018. Pisa: Arbitration Outsourcing for State Channels. IACR Cryptology ePrint Archive 2018, 582.
[59]
Patrick McCorry, Chris Buckland, Surya Bakshi, Karl Wüst, and Andrew Miller. 2018. You sank my battleship! A case study to evaluate state channels as a scaling solution for cryptocurrencies.
[60]
Andrew Miller, Iddo Bentov, Ranjit Kumaresan, and Patrick McCorry. 2017. Sprites: Payment channels that go faster than lightning. CoRR abs/1702.05812.
[61]
Andrew Miller, Yu Xia, Kyle Croman, Elaine Shi, and Dawn Song. 2016. The Honey Badger of BFT Protocols. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security.
[62]
Ahmad Moghimi, Gorka Irazoqui, and Thomas Eisenbarth. 2017. CacheZoom: How SGX amplifies the power of cache attacks. In International Conference on Cryptographic Hardware and Embedded Systems. Springer, 69--90.
[63]
Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. http://www.bitcoin.org/bitcoin.pdf.
[64]
Open Enclave SDK Community. 2018. Open Enclave SDK. https://openenclave.io/sdk/.
[65]
Dan O'Keeffe, Divya Muthukumaran, Pierre-Louis Aublin, Florian Kelbert, Christian Priebe, Josh Lind, Huanzhou Zhu, and Peter Pietzuch. 2018. Spectre attack against SGX enclave.
[66]
Rafael Pass, Lior Seeman, and Abhi Shelat. 2017. Analysis of the blockchain protocol in asynchronous networks. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 643--673.
[67]
Rafael Pass and Elaine Shi. 2016. Hybrid Consensus: Efficient Consensus in the Permissionless Model. ePrint Archive, Report 2016/917.
[68]
Rafael Pass and Elaine Shi. 2018. Thunderella: Blockchains with optimistic instant confirmation. In International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 3--33.
[69]
Rafael Pass, Elaine Shi, and Florian Tramer. 2017. Formal abstractions for attested execution secure processors. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 260--289.
[70]
Joseph Poon and Vitalik Buterin. 2017. Plasma: Scalable autonomous smart contracts.
[71]
Joseph Poon and Thaddeus Dryja. 2016. The Bitcoin Lightning Network: Scalable off-chain instant payments. Technical Report (draft 0.5.9.1). https://lightning.network. Accessed May 2017.
[72]
Eli Ben Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, EranTromer, and Madars Virza. 2014. Zerocash: Decentralized anonymous payments from bitcoin. In Security and Privacy (SP), 2014 IEEE Symposium on. IEEE, 459--474.
[73]
SECBIT. 2018. How the winner got Fomo3D prize --- A Detailed Explanation. https://medium.com/coinmonks/how-the-winner-got-fomo3d-prize-a-detailed-explanation-b30a69b7813f. Accessed Sep 2018.
[74]
István András Seres, László Gulyás, Dániel A Nagy, and Péter Burcsi. 2019. Topological Analysis of Bitcoin's Lightning Network. Preprint arXiv:1901.04972.
[75]
Alex Shamis, Amaury Chamayou, Christine Avanessians, Christoph M. Wintersteiger, Edward Ashton, Felix Schuster, Cédric Fournet, Julien Maffre, Kartik Nayak, Mark Russinovich, Matthew Kerner, Miguel Castro, Thomas Moscibroda, Olga Vrousgou, Roy Schwartz, Sid Krishna, Sylvan Clebsch, and Olya Ohrimenko. 2019. CCF: A Framework for Building Confidential Verifiable Replicated Services. Technical Report MSR-TR-2019-16. Microsoft. https://www.microsoft.com/en-us/research/publication/ccf-a-framework-for-building-confidential-verifiable-replicated-services/
[76]
Yonatan Sompolinsky and Aviv Zohar. 2015. Accelerating Bitcoin's Transaction Processing. Fast Money Grows on Trees, Not Chains. In Financial Cryptography. Puerto Rico.
[77]
Susan Stepney, David Cooper, and Jim Woodcock. 2000. An electronic purse: Specification, refinement and proof. Oxford University.
[78]
Raoul Strackx and Frank Piessens. 2016. Ariadne: A Minimal Approach to State Continuity. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX, 875--892. https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/strackx
[79]
superfreek. 2017. BTC Spam attack. 200,000 unconfirmed transactions halts bitcoin. https://steemit.com/cryptocurrency/@superfreek/btc-spam-attack-200-000-unconfirmed-transactions-halts-bitcoin. Accessed Feb 2018.
[80]
NickSzabo. 1997. The idea of smart contracts. Nick Szabo's Papers and Concise Tutorials 6.
[81]
Team Rocket. 2018. Snowflake to Avalanche: A Novel Metastable Consensus Protocol Family for Cryptocurrencies. https://ipfs.io/ipfs/QmUy4jh5mGNZvLkjies1RWM4YuvJh5-o2FYopNPVYwrRVGV.
[82]
The Bitcoin Community. 2013. libsecp256k1. https://github.com/bitcoin-core/secp256k1.
[83]
The Bitcoin Community. 2016. Bitcoin Core version 0.13.1 released. https://bitcoin.org/en/release/v0.13.1. Accessed May 2017.
[84]
The Bitcoin community. 2017. M-of-N Multisig, Multisig Output. https://bitcoin.org/en/glossary/multisig. Accessed May 2017.
[85]
The Ethereum community. 2017. Ethereum White Paper. https://github.com/ethereum/wiki/wiki/White-Paper. Accessed May 2017.
[86]
The Linux-SGX community. 2016. Intel(R) Software Guard Extensions for Linux OS. https://github.com/intel/linux-sgx.
[87]
The Raiden Network community. 2017. The Raiden Network. https://raiden.network/. Accessed October 2017.
[88]
Florian Tramer, Fan Zhang, Huang Lin, Jean-Pierre Hubaux, Ari Juels, and Elaine Shi. 2016. Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge. Cryptology ePrint Archive, Report 2016/635. http://eprint.iacr.org/2016/635.
[89]
Muoi Tran, Loi Luu, Min Suk Kang, Iddo Bentov, and Prateek Saxena. 2017. Obscuro: A Bitcoin Mixer using Trusted Execution Environments. IACR Cryptology ePrint Archive 2017, 974.
[90]
Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F Wenisch, Yuval Yarom, and Raoul Strackx. 2018. FORESHADOW: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. In 27th USENIX Security Symposium (USENIX Security 18).
[91]
Robbert Van Renesse and Fred B Schneider. 2004. Chain Replication for Supporting High Throughput and Availability. In 6th Symposium on Operating Systems Design and Implementation, Vol. 4. 91--104.
[92]
Marko Vukolić. 2015. The quest for scalable blockchain fabric: Proof-of-Work vs. BFT replication. In International Workshop on Open Problems in Network Security. Springer, 112--125.
[93]
Gavin Wood. 2016. Ethereum: A Secure Decentralised Generalised Transaction Ledger (EIP-150). http://gavwood.com/Paper.pdf.
[94]
Fan Zhang, Ethan Cecchetti, Kyle Croman, Ari Juels, and Elaine Shi. 2016. Town crier: An authenticated data feed for smart contracts. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 270--282.
[95]
Fan Zhang, Philip Daian, Gabriel Kaptchuk, Iddo Bentov, Ian Miers, and Ari Juels. 2017. Paralysis Proofs: Secure Dynamic Access Structures for Cryptocurrencies and More.

Cited By

View all
  • (2024)Blockchain integration in healthcare: a comprehensive investigation of use cases, performance issues, and mitigation strategiesFrontiers in Digital Health10.3389/fdgth.2024.13598586Online publication date: 26-Apr-2024
  • (2024)Secure Communication in Dolphin: Integrating Trusted Execution Environments for Enhanced Caller PrivacyProceedings of the 23rd Workshop on Privacy in the Electronic Society10.1145/3689943.3695042(47-58)Online publication date: 20-Nov-2024
  • (2024)Data Deduplication Based on Content Locality of Transactions to Enhance Blockchain ScalabilityACM Transactions on Architecture and Code Optimization10.1145/368054721:4(1-24)Online publication date: 25-Jul-2024
  • Show More Cited By

Index Terms

  1. Teechain: a secure payment network with asynchronous blockchain access

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SOSP '19: Proceedings of the 27th ACM Symposium on Operating Systems Principles
    October 2019
    615 pages
    ISBN:9781450368735
    DOI:10.1145/3341301
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    In-Cooperation

    • USENIX Assoc: USENIX Assoc

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 27 October 2019

    Permissions

    Request permissions for this article.

    Check for updates

    Badges

    Qualifiers

    • Research-article

    Funding Sources

    • Mel Berlin Cyber-Security Scholarship
    • Israel Science Foundation
    • US-Israel Binational Science Foundation (BSF)
    • Engima MPC Inc
    • US National Science Foundation (NSF)
    • Israel Cyber Bureau
    • European Union

    Conference

    SOSP '19
    Sponsor:
    SOSP '19: ACM SIGOPS 27th Symposium on Operating Systems Principles
    October 27 - 30, 2019
    Ontario, Huntsville, Canada

    Acceptance Rates

    Overall Acceptance Rate 174 of 961 submissions, 18%

    Upcoming Conference

    SOSP '25
    ACM SIGOPS 31st Symposium on Operating Systems Principles
    October 13 - 16, 2025
    Seoul , Republic of Korea

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)146
    • Downloads (Last 6 weeks)18
    Reflects downloads up to 13 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Blockchain integration in healthcare: a comprehensive investigation of use cases, performance issues, and mitigation strategiesFrontiers in Digital Health10.3389/fdgth.2024.13598586Online publication date: 26-Apr-2024
    • (2024)Secure Communication in Dolphin: Integrating Trusted Execution Environments for Enhanced Caller PrivacyProceedings of the 23rd Workshop on Privacy in the Electronic Society10.1145/3689943.3695042(47-58)Online publication date: 20-Nov-2024
    • (2024)Data Deduplication Based on Content Locality of Transactions to Enhance Blockchain ScalabilityACM Transactions on Architecture and Code Optimization10.1145/368054721:4(1-24)Online publication date: 25-Jul-2024
    • (2024)Unstoppable Wallets: Chain-assisted Threshold ECDSA and its ApplicationsProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3637657(1844-1860)Online publication date: 1-Jul-2024
    • (2024)FSPDE: A Full Stack Plausibly Deniable Encryption System for Mobile DevicesProceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy10.1145/3626232.3653262(265-276)Online publication date: 19-Jun-2024
    • (2024)RAC-Chain: An Asynchronous Consensus-based Cross-chain Approach to Scalable Blockchain for MetaverseACM Transactions on Multimedia Computing, Communications, and Applications10.1145/358601120:7(1-24)Online publication date: 27-Mar-2024
    • (2024)A Monitoring-Free Bitcoin Payment Channel Scheme With Support for Real-Time SettlementIEEE Transactions on Services Computing10.1109/TSC.2024.339039617:5(1924-1937)Online publication date: Sep-2024
    • (2024)Toward Aggregated Payment Channel NetworksIEEE/ACM Transactions on Networking10.1109/TNET.2024.342300032:5(4333-4348)Online publication date: Oct-2024
    • (2024)Ensuring State Continuity for Confidential Computing: A Blockchain-Based ApproachIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2024.338197321:6(5635-5649)Online publication date: Nov-2024
    • (2024)monoCash: A Channel-Free Payment Network Via Trusted Monotonic CountersIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2024.3354927(1-14)Online publication date: 2024
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media