Native client: A sandbox for portable, untrusted x86 native code B Yee, D Sehr, G Dardyk, JB Chen, R Muth, T Ormandy, S Okasaka, ... Communications of the ACM 53 (1), 91-99, 2010 | 1071 | 2010 |
{zkLedger}:{Privacy-Preserving} auditing for distributed ledgers N Narula, W Vasquez, M Virza 15th USENIX symposium on networked systems design and implementation (NSDI ¡¦, 2018 | 246 | 2018 |
The impact of blockchain technology on finance: A catalyst for change M Casey, J Crane, G Gensler, S Johnson, N Narula ICMB, International Center for Monetary and Banking Studies, 2018 | 198 | 2018 |
Going from bad to worse: from internet voting to blockchain voting S Park, M Specter, N Narula, RL Rivest Journal of Cybersecurity 7 (1), tyaa025, 2021 | 181 | 2021 |
Phase Reconciliation for Contended {In-Memory} Transactions N Narula, C Cutler, E Kohler, R Morris 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI ¡¦, 2014 | 130 | 2014 |
The blockchain will do to the financial system what the internet did to media J Ito, N Narula, R Ali Harvard Business Review 9 (March), 2017 | 114 | 2017 |
Intrusion recovery for database-backed web applications R Chandra, T Kim, M Shah, N Narula, N Zeldovich Proceedings of the Twenty-Third ACM Symposium on Operating Systems ¡¦, 2011 | 72 | 2011 |
Privacy-preserving browser-side scripting with BFlow A Yip, N Narula, M Krohn, R Morris Proceedings of the 4th ACM European conference on Computer systems, 233-246, 2009 | 70 | 2009 |
Cryptanalysis of curl-p and other attacks on the iota cryptocurrency E Heilman, N Narula, G Tanzer, J Lovejoy, M Colavita, M Virza, T Dryja Cryptology ePrint Archive, 2019 | 52 | 2019 |
A high performance payment processing system designed for central bank digital currencies J Lovejoy, C Fields, M Virza, T Frederick, D Urness, K Karwaski, ... Cryptology ePrint Archive, 2022 | 38 | 2022 |
Iota vulnerability report: Cryptanalysis of the curl hash function enabling practical signature forgery attacks on the iota cryptocurrency E Heilman, N Narula, T Dryja, M Virza URL: https://github. com/mit-dci/tangled-curl/blob/master/vuln-iota. md, 2017 | 37 | 2017 |
Double-spend counterattacks: Threat of retaliation in proof-of-work systems DJ Moroz, DJ Aronoff, N Narula, DC Parkes arXiv preprint arXiv:2002.10736, 2020 | 34 | 2020 |
Defending Internet freedom through decentralization: back to the future C Barabas, N Narula, E Zuckerman The Center for Civic Media & The Digital Currency Initiative MIT Media Lab ¡¦, 2017 | 28 | 2017 |
Hypercriticality MY Vardi Communications of the ACM 53 (7), 5-5, 2010 | 25* | 2010 |
Responsible vulnerability disclosure in cryptocurrencies R Böhme, L Eckey, T Moore, N Narula, T Ruffing, A Zohar Communications of the ACM 63 (10), 62-71, 2020 | 24 | 2020 |
Redesigning digital money: What can we learn from a decade of cryptocurrencies R Ali, N Narula Digital Currency Iniative (DCI). MIT Media Lab, 2020 | 24 | 2020 |
Read/write based fast-path transformation for FCFS mutual exclusion P Jayanti, S Petrovic, N Narula International Conference on Current Trends in Theory and Practice of ¡¦, 2005 | 17 | 2005 |
Hamilton: A {high-performance} transaction processor for central bank digital currencies J Lovejoy, M Virza, C Fields, K Karwaski, A Brownworth, N Narula 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI ¡¦, 2023 | 16 | 2023 |
CBDC: Expanding financial inclusion or deepening the divide N Narula, L Swartz, J Frizzo-Barker Maiden Labs, supported by MIT Digital Currency Initiative, 2023 | 15* | 2023 |
Exploring practical vulnerabilities of machine learning-based wireless systems Z Liu, C Xu, Y Xie, E Sie, F Yang, K Karwaski, G Singh, ZL Li, Y Zhou, ... 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI ¡¦, 2023 | 15 | 2023 |