Andrew Miller’s research while affiliated with University of Illinois Urbana-Champaign and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (40)


Future of Algorithmic Organization: Large-Scale Analysis of Decentralized Autonomous Organizations (DAOs)
  • Preprint

October 2024

·

27 Reads

·

1 Citation

·

Yujin Potter

·

Kornrapat Pongmala

·

[...]

·

Yang Wang

Decentralized Autonomous Organizations (DAOs) resemble early online communities, particularly those centered around open-source projects, and present a potential empirical framework for complex social-computing systems by encoding governance rules within "smart contracts" on the blockchain. A key function of a DAO is collective decision-making, typically carried out through a series of proposals where members vote on organizational events using governance tokens, signifying relative influence within the DAO. In just a few years, the deployment of DAOs surged with a total treasury of $24.5 billion and 11.1M governance token holders collectively managing decisions across over 13,000 DAOs as of 2024. In this study, we examine the operational dynamics of 100 DAOs, like pleasrdao, lexdao, lootdao, optimism collective, uniswap, etc. With large-scale empirical analysis of a diverse set of DAO categories and smart contracts and by leveraging on-chain (e.g., voting results) and off-chain data, we examine factors such as voting power, participation, and DAO characteristics dictating the level of decentralization, thus, the efficiency of management structures. As such, our study highlights that increased grassroots participation correlates with higher decentralization in a DAO, and lower variance in voting power within a DAO correlates with a higher level of decentralization, as consistently measured by Gini metrics. These insights closely align with key topics in political science, such as the allocation of power in decision-making and the effects of various governance models. We conclude by discussing the implications for researchers, and practitioners, emphasizing how these factors can inform the design of democratic governance systems in emerging applications that require active engagement from stakeholders in decision-making.


Figure 2: MEV-Boost design. "Searchers" and "builders" together create transactions bundles from their private and public mempool. Builders submit a complete block to a PBS relay, which then forwards the block header, along with the bid, to the proposing validator. The validator receives the corresponding complete block after it commits to the block, by signing the block header.
Figure 4: PROF allows for multiple sequencers to operate concurrently, and chooses the best PROFenriched block for the validator.
Figure 5: Protected bundles from multiple PROF sequencers can be included in the final PROFenriched block.
Figure 6: PROF-Share design. Steps 1-3 are the same as PROF. Once committed to by the validator, PROF-enriched block B PROF is also released to arbitrageurs, who submit backrunning transactions in a second auction (step 4) and compete on providing PROF users with the most amount of kickback. The winning backrunning transactions are merged into the PROF-Share block B PROF-Share , which is supplied to the validator after the validator commits to it (steps 5-8).
Figure 7: Average User Utility for Demand Ratio of 0.25, 0.50, 0.75, and 1, 2, 4, 8 for 20 to 100 users/block over 1,000 iterations. Error bars indicate the standard deviation. We do not plot the average utility for PROF for higher Demand Ratios, as it becomes negligible in comparison to redistributive mechanisms.

+1

PROF: Protected Order Flow in a Profit-Seeking World
  • Preprint
  • File available

August 2024

·

29 Reads

Users of decentralized finance (DeFi) applications face significant risks from adversarial actions that manipulate the order of transactions to extract value from users. Such actions -- an adversarial form of what is called maximal-extractable value (MEV) -- impact both individual outcomes and the stability of the DeFi ecosystem. MEV exploitation, moreover, is being institutionalized through an architectural paradigm known Proposer-Builder Separation (PBS). This work introduces a system called PROF (PRotected Order Flow) that is designed to limit harmful forms of MEV in existing PBS systems. PROF aims at this goal using two ideas. First, PROF imposes an ordering on a set ("bundle") of privately input transactions and enforces that ordering all the way through to block production -- preventing transaction-order manipulation. Second, PROF creates bundles whose inclusion is profitable to block producers, thereby ensuring that bundles see timely inclusion in blocks. PROF is backward-compatible, meaning that it works with existing and future PBS designs. PROF is also compatible with any desired algorithm for ordering transactions within a PROF bundle (e.g., first-come, first-serve, fee-based, etc.). It executes efficiently, i.e., with low latency, and requires no additional trust assumptions among PBS entities. We quantitatively and qualitatively analyze incentive structure of PROF, and its utility to users compared with existing solutions. We also report on inclusion likelihood of PROF transactions, and concrete latency numbers through our end-to-end implementation.

Download




Figure 11: Average profits that an attacker can receive for a number the rounds of bisection sort executed across all transactions from the Trader Joe USCD to e-WAVAX pool 5 day historical dataset
Snip-20 Token Statistics as of February 2023
SGXonerate:Finding (and Partially Fixing) Privacy Flaws in TEE-based Smart Contract Platforms Without Breaking the TEE

January 2024

·

89 Reads

·

7 Citations

Proceedings on Privacy Enhancing Technologies

TEE-based smart contracts are an emerging blockchain architecture, offering fully programmable privacy with better performance than alternatives like secure multiparty computation. They can also support compatibility with existing smart contract languages, such that existing (plaintext) applications can be readily ported, picking up privacy enhancements automatically. While previous analysis of TEE-based smart contracts have focused on failures of TEE itself, we asked whether other aspects might be understudied. We focused on state consistency, a concern area highlighted by Li et al., as well as new concerns including access pattern leakage and software upgrade mechanisms. We carried out a code review of a cohort of four TEE-based smart contract platforms. These include Secret Network, the first to market with in-use applications, as well as Oasis, Phala, and Obscuro, which have at least released public test networks. The first and most broadly applicable result is that access pattern leakage occurs when handling persistent contract storage. On Secret Network, its fine-grained access pattern is catastrophic for the transaction privacy of SNIP-20 tokens. If ERC-20 tokens were naively ported to Oasis they would be similarly vulnerable; the others in the cohort leak coarse-grained information at approximately the page level (4 kilobytes). Improving and characterizing this will require adopting techniques from ORAMs or encrypted databases. Second, the importance of state consistency has been underappreciated, in part because exploiting such vulnerabilities is thought to be impractical. We show they are fully practical by building a proof-of-concept tool that breaks all advertised privacy properties of SNIP-20 tokens, able to query the balance of individual accounts and the token amount of each transfer. We additionally demonstrate MEV attacks against the Sienna Swap application. As a final consequence of lacking state consistency, the developers have inadvertently introduced a decryption backdoor through their software upgrade process. We have helped the Secret developers mitigate this through a coordinated vulnerability disclosure, after which their state consistency should be roughly on par with the rest.


A Mixed-Methods Study of Security Practices of Smart Contract Developers

August 2023

·

146 Reads

·

23 Citations

Smart contracts are self-executing programs that run on blockchains (e.g., Ethereum). While security is a key concern for smart contracts, it is unclear how smart contract developers approach security. To help fill this research gap, we conducted a mixed-methods study of smart contract developers including interviews and a code review task with 29 developers and an online survey with 171 valid respondents. Our findings show various smart contract security perceptions and practices, including the usage of different tools and resources. Overall, the majority of our participants did not consider security as a priority in their smart contract development. In addition, these security vulnerability identification rates in our code review tasks were alarmingly low (often lower than 50%) across different vulnerabilities and regardless of our participants’ years of experience in smart contract development. We discuss how future education and tools could better support developers in ensuring smart contract security.



Unpacking How Decentralized Autonomous Organizations (DAOs) Work in Practice

April 2023

·

77 Reads

Decentralized Autonomous Organizations (DAOs) have emerged as a novel way to coordinate a group of (pseudonymous) entities towards a shared vision (e.g., promoting sustainability), utilizing self-executing smart contracts on blockchains to support decentralized governance and decision-making. In just a few years, over 4,000 DAOs have been launched in various domains, such as investment, education, health, and research. Despite such rapid growth and diversity, it is unclear how these DAOs actually work in practice and to what extent they are effective in achieving their goals. Given this, we aim to unpack how (well) DAOs work in practice. We conducted an in-depth analysis of a diverse set of 10 DAOs of various categories and smart contracts, leveraging on-chain (e.g., voting results) and off-chain data (e.g., community discussions) as well as our interviews with DAO organizers/members. Specifically, we defined metrics to characterize key aspects of DAOs, such as the degrees of decentralization and autonomy. We observed CompoundDAO, AssangeDAO, Bankless, and Krausehouse having poor decentralization in voting, while decentralization has improved over time for one-person-one-vote DAOs (e.g., Proof of Humanity). Moreover, the degree of autonomy varies among DAOs, with some (e.g., Compound and Krausehouse) relying more on third parties than others. Lastly, we offer a set of design implications for future DAO systems based on our findings.



Citations (34)


... The essence is to guarantee that the hardware is reliable, with correct and trusted instructions executed when receiving those from higher levels. Subsequently, the trusted execution environment (TEE) should be designed to be resistant to modification Van Schaik et al. (2024). As mentioned in Sect. ...

Reference:

Feasibility discussion of quantum cryptography for Internet of Things security: a literature review
SoK: SGX.Fail: How Stuff Gets eXposed
  • Citing Conference Paper
  • May 2024

... We generate M using a Pareto distribution to better model empirical observations that each individual voter may only have time to thoroughly evaluate a small subset of total projects, as well as herding and other naturally occurring centralizing vectors for preference distribution [18]. The shape parameter α = 2.5 models moderate preference concentration while maintaining finite variance in the distribution, allowing for moderately heavy tails while also accounting for preference concentration to better match empirical observations for RetroPGF rounds. ...

Unpacking How Decentralized Autonomous Organizations (DAOs) Work in Practice
  • Citing Conference Paper
  • May 2024

... Additionally, ZKP-based systems rely on trust in a single entity to generate and verify the proofs without tampering [4]. This centralisation of trust introduces a potential vulnerability, as a compromised proof generator could invalidate the entire process, undermining the privacy guarantees [15]. Furthermore, many of these solutions require a complete setup restart whenever computational changes are needed, reducing system flexibility and increasing costs [21]. ...

Ratel: MPC-extensions for Smart Contracts
  • Citing Conference Paper
  • July 2024

... This attestation result ensures the integrity of the enclave and its execution, providing proof that the specified code is running securely within the SGX environment. [14], [85], [124]. ...

SGXonerate:Finding (and Partially Fixing) Privacy Flaws in TEE-based Smart Contract Platforms Without Breaking the TEE

Proceedings on Privacy Enhancing Technologies

... The proposed framework uses XAI with a BiLSTM model to identify vulnerabilities effectively while providing transparent solutions that serve as important improvements over current methods [1], [5]. This framework surpasses current tools in accuracy and gives developers insight through explanations, thus enabling better detection and mitigation of re-entrance vulnerabilities as it creates a more secure blockchain environment [14], [30]. AI power enables XAI clarity and trustworthiness, leading to safe, decentralized applications and continued adoption of blockchain technology across different markets. ...

A Mixed-Methods Study of Security Practices of Smart Contract Developers

... The introduction of the European Digital Identity Wallet (EUDIW) represents a significant opportunity for improving digital identity management (Degen & Teubner, 2024). This initiative aims to give EU citizens a unified, secure, and convenient method to access both public and private online services, improving the efficiency and security of digital interactions and focusing on user needs in the near future (Bochnia et al., 2023), while at the same time leveling the playing field and ensuring "sovereignty" in its single digital market (Ernstberger et al., 2023;Codagnone & Weigl, 2023;Rieger et al., 2022). ...

SoK: Data Sovereignty
  • Citing Conference Paper
  • July 2023

... These designs require setup of the participants with secret-shares of the signing key by a trusted party; while this requirement can be alleviated using a distributed key-generation protocol (e.g., [34], [45]), such protocols add costs and complexity. So, more recent designs avoid using threshold signing altogether (e.g., [49], [3], [17], [31], [21], [4], [16], [7]). Though even a trusted beacon might be reasonable to support collaboration among a group of sites as we propose, we are agnostic to the particular implementation used. ...

Practical Asynchronous Distributed Key Generation
  • Citing Conference Paper
  • May 2022

... A study found that while developers care a great deal about code security, there are no effective ways to prove the correctness, reliability, and security of code [28]. In 2021, digital assets built on a smart contracts with a value equivalent to USD 680 million were cracked or stolen due to safety weaknesses [29]. The importance of smart contract security cannot be exaggerated, particularly now that smart contracts are acquiring more attention. ...

Exploring Security Practices of Smart Contract Developers

... Due to the reliance on digital signatures, Breeze is provably secure only in the computational model. Meanwhile, to support batching, we use Bulletproofs [41] for batch verification inspired by hbACSS [37]. Compared to known works that also adopt Bulletproofs for building batched VSS [37], we optimize the computational cost by a factor of B for batch verification. ...

hbACSS: How to Robustly Share Many Secrets
  • Citing Conference Paper
  • January 2022

... To further mitigate risks from these attacks, additional defenses should be enforced at the service provider level. These include implementing multi-factor authentication [41], monitoring usage patterns to detect suspicious activities [42], and using device attestation techniques to ensure that credentials are presented only from authorized devices [43]. ...

CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability
  • Citing Conference Paper
  • May 2021