Technical Sessions

Technical Session 1: DeFi I

Tuesday 12th July, 14:00-15:30

 

  • Daniel Perez and Lewis Gudgeon. Disimilar Redundancy in DeFi

  • Lucy Huo, Ariah Klages-Mundt, Andreea Minca, Frederik Munter and Mads Wind. Decentralised Governance of Stablecoins with Closed Form Evaluation

  • Aaron Green, Christopher Cammilleri, John Erickson, Oshani Seneviratne and Kristin Bennett. DeFi Survival Analysis: Insights into Risks and User Behaviours

Technical Session 2: Game Theory and Mining

Tuesday 12th July, 16:00-17:30

  • Yun Kuen Cheung, Stefanos Leonardos, Shyam Sridhar and Georgios Piliouras. Market Equilibria and Risk Diversification in Blockchain Mining Economies

  • Rami Khalil and Naranker Dulay. Towards Equity in Proof-of-Work Mining Rewards (MARBLE 2022 Best Paper Award)

  • Yun Kuen Cheung, Stefanos Leonardos, Shyam Sridhar and Georgios Piliouras. Griefing Factors and Evolutionary (In-)Stabilities in Blockchain Mining Games

  • Hans Gersbach, Akaki Mamageishvili and Manvir Schneider. On Impact of Vote Delegation

Technical Session 3: DeFi II

Wednesday 13th July, 11:30-13:30 (a), 11:30-12:30 (b)

 

  • Abiola Salau, Ram Dantu, Kirill Morozov, Kritagya Upadhyay and Syed Badruddoja. Multi-tier Reputation for Data Cooperatives

  • Toshiko Matsui and Daniel Perez. Data-driven analysis of central bank digital currency (CBDC) projects drivers

  • Yongge Wang. Prediction Markets, Automated Market Makers and Decentralised Finance (DeFi)

  • Jen Houng Lie, Wing Hong Tony Wong and Alex Yin-Ting Lee. Wombat - An efficient stableswap algorithm

Technical Session 4: Infrastructure and Security

Thursday 14 July, 11:30-13:00

  • David Chaum, Mario Larangeira and Mario Yaksetig. Tweakable Sleeve: A Novel Sleeve Construction based on Tweakable Hash Functions

  • Maxim Jourenko, Mario Larangeira and Keisuke Tanaka. Interhead Hydra: Two Heads are Better than One

  • Behkish Nassirzadeh, Huaiying Sun, Sebastian Banescu and Vijay Ganesh. Gas Gauge: A Security Analysis Tool for Smart Contract Out-of-Gas Vulnerabilities