shayan.es Open in urlscan Pro
2606:4700:3031::ac43:cd81  Public Scan

Submitted URL: http://shayan.es/
Effective URL: https://shayan.es/
Submission: On February 10 via api from US — Scanned from ES

Form analysis 0 forms found in the DOM

Text Content

Shayan Eskandari PhD Candidate / CTFO Based in Toronto 🇨🇦
 * home /
 * Audits /
 * Press /

 * 
 * 
 * 
 * 
 * 
 * 
 * 
 * 


ABOUT

Shayan is currently completing his doctoral studies with the topic of "New
Technology, Old Crimes" at Concordia University. Previously he worked as the
Chief Technology Officer at Ether Capital (ETHC.NE). He also worked as a
security engineer and smart contract auditor at ConsenSys Diligence. He has
worked in network and information systems security for several years and has
extensive experience as a blockchain engineer in startups, as well as
contributing to open source projects. He has dedicated both his intellectual and
professional pursuits towards Blockchain technology since 2012. Looking at the
technology from an interdisciplinary perspective, Shayan has been working on
multiple academic papers varying from exploring the psychology of Blockchain to
systemizing attacks on smart contracts.

--------------------------------------------------------------------------------

Shortcuts (↪︎ latest activity)

 * Publications
     
   * SoK: Oracles from the Ground Truth to Market Manipulation - 2021
 * Security Audits
   * xTokens - xERC20 - 2023/08
 * Lectures & Talks
   * IranUnchained -- NGO meets DAO - ETHPrague 2023
 * Previous Projects
 * Media Mentions
   * Yahoo! Finance - 2023/02/22
 * Peer Reviews

--------------------------------------------------------------------------------


PUBLICATIONS


SOK: ORACLES FROM THE GROUND TRUTH TO MARKET MANIPULATION

ACM Advances in Financial Technologies

Abstract

One fundamental limitation of blockchain-based smart contracts is that they
execute in a closed environment and only have access to the data and
functionality that is either already on the blockchain or fed into the
blockchain. Thus any interactions with the real world need to be mediated by a
bridge service, which is called an oracle. As decentralized applications mature,
oracles are playing an increasingly prominent role. With their evolution comes
more attacks, necessitating a greater attention to the trust model of using
oracles. In this SoK, we systemize the design alternatives for oracles, showcase
attacks, and discuss attack mitigation strategies.

Paper   Video  


--------------------------------------------------------------------------------


SYSTEMIZING THE CHALLENGES OF AUDITING BLOCKCHAIN-BASED ASSETS

Journal of Information Systems ISYS-19-007

Abstract

Firms transacting using blockchain-based assets and liabilities have begun to
enter capital markets in search for funding. Historically, firms have been able
to raise substantial funding without an audited financial statement, however we
project that in the future, audits will become a common requirement given
increased competition among firms, increased scrutiny from regulators, past
instances of fraud, and firms seeking an IPO. At the time of writing, accounting
firms are hesitant to accept mandates from companies that hold a significant
amount of cryptoassets primarily because the blockchain market introduces novel,
technically sophisticated, and risky propositions that auditors are unequipped
to handle. Through interviews with senior accounting professionals and
structured brainstorming meetings with a multidisciplinary team of accountants
and blockchain experts, we critically analyze the purported roadblocks to
auditing blockchain firms and map them to traditional auditing practices,
demonstrating that providing an audit opinion is challenging but not
insurmountable.

Paper  


--------------------------------------------------------------------------------


THE MIDDLEMAN IS DEAD, LONG LIVE THE MIDDLEMAN: THE “TRUST FACTOR” AND THE
PSYCHO-SOCIAL IMPLICATIONS OF BLOCKCHAIN

Frontiers in Blockchain Journal - Human-Centric Constituents in Times of
Decentralization

Abstract

Blockchain is widely regarded as a breakthrough innovation that may have a
profound impact on the economy and society, of a magnitude comparable to the
effects of the introduction of the Internet itself. In essence, a blockchain is
a decentralized peer-to-peer network with no central authority figure, which
adds information to the distributed database by collectively validating the
accuracy of data. Since each node of the network participates in the review and
confirmation of the new information before being accepted, the need for a
trustworthy intermediary is eliminated. However, as trust plays an essential
role in affecting decisions when transacting with one another, it is important
to understand which implications the decentralized nature of blockchain may have
on individuals' sense of trust. In this contribution, we argue that the adoption
of blockchain is not only a technological, but foremostly a psychological
challenge, which crucially depends on the possibility of creating a trust
management approach that matches the underlying distributed communication
system. We first describe the decentralization technologies and possibilities
they hold for the near future. Next, we discuss the psycho-social implications
of the introduction of decentralized processes of trust, examining some
potential scenarios, and outline a research agenda.

Paper  


--------------------------------------------------------------------------------


RESOLVING THE MULTIPLE WITHDRAWAL ATTACK ON ERC20 TOKENS

IEEE SECURITY & PRIVACY ON THE BLOCKCHAIN (IEEE S&B 2019)

Abstract

Custom tokens are an integral component of decentralized applications (dapps)
deployed on Ethereum and other blockchain platforms. For Ethereum, the ERC20
standard is a widely used token interface and is interoperable with many
existing dapps, user interface platforms, and popular web applications (e.g.,
exchange services). An ERC20 security issue, known as the "multiple withdrawal
attack", was raised on GitHub and has been open since November 2016. The issue
concerns ERC20's defined method approve() which was envisioned as a way for
token holders to give permission for other users and dapps to withdraw a capped
number of tokens. The security issue arises when a token holder wants to adjust
the amount of approved tokens from N to M (this could be an increase or
decrease). If malicious, a user or dapp who is approved for N tokens can
front-run the adjustment transaction to first withdraw N tokens, then allow the
approval to be confirmed, and withdraw an additional M tokens. In this paper, we
evaluate 10 proposed mitigations for this issues and find that no solution is
fully satisfactory. We then propose 2 new solutions that mitigate the attack,
one of which fully fulfills constraints of the standard, and the second one
shows a general limitation in addressing this issue from ERC20's approve method.

Paper  


--------------------------------------------------------------------------------


SOK: TRANSPARENT DISHONESTY: FRONT-RUNNING ATTACKS ON BLOCKCHAIN.

FC 2019 Financial Cryptography and Data Security, St. Kitts

Abstract

We consider front-running to be a course of action where an entity benefits from
prior access to privileged market information about upcoming transactions and
trades. Front-running has been an issue in financial instrument markets since
the 1970s. With the advent of the blockchain technology, front-running has
resurfaced in new forms we explore here, instigated by blockchains decentralized
and transparent nature. In this paper, we draw from a scattered body of
knowledge and instances of front-running across the top 25 most active decentral
applications (DApps) deployed on Ethereum blockchain. Additionally, we carry out
a detailed analysis of Status.im initial coin offering (ICO) and show evidence
of abnormal miners behavior indicative of front-running token purchases.
Finally, we map the proposed solutions to front-running into useful categories.

GitHub   Paper   Slides   Video  

Press: ConsenSys Diligence  


--------------------------------------------------------------------------------


A FIRST LOOK AT BROWSER-BASED CRYPTOJACKING

IEEE SECURITY & PRIVACY ON THE BLOCKCHAIN (IEEE S&B) 2018 University College
London (UCL), London, UK

Abstract

In this paper, we examine the recent trend towards in-browser mining of
cryptocurrencies; in particular, the mining of Monero through Coinhive and
similar code- bases. In this model, a user visiting a website will download a
JavaScript code that executes client-side in her browser, mines a
cryptocurrency, typically without her consent or knowledge, and pays out the
seigniorage to the website. Websites may consciously employ this as an
alternative or to supplement advertisement revenue, may offer premium content in
exchange for mining, or may be unwittingly serving the code as a result of a
breach (in which case the seigniorage is collected by the attacker). The
cryptocurrency Monero is preferred seemingly for its unfriendliness to
large-scale ASIC mining that would drive browser-based efforts out of the
market, as well as for its purported privacy features. In this paper, we survey
this landscape, conduct some measurements to establish its prevalence and
profitability, outline an ethical framework for considering whether it should be
classified as an attack or business opportunity, and make suggestions for the
detection, mitigation and/or prevention of browser-based mining for non-
consenting users.

GitHub   Paper   Slides  

Press: Schneier on Security   Cointelegraph   Motherboard Vice   Cointelegraph  
Cryptoinsider   Randed   Bleepingcomputer  


--------------------------------------------------------------------------------


ON THE FEASIBILITY OF DECENTRALIZED DERIVATIVES MARKETS

FC 2017 Financial Cryptography and Data Security, Malta

Abstract

In this paper, we present Velocity, a decentralized market deployed on Ethereum
for trading a custom type of derivative option. To enable the smart contract to
work, we also implement a price fetching tool called PriceGeth. We present this
as a case study, noting challenges in development of the system that might be of
independent interest to whose working on smart contract implementations. We also
apply recent academic results on the security of the Solidity smart contract
language in validating our code’s security. Finally, we discuss more generally
the use of smart contracts in modelling financial derivatives.

GitHub   Paper  

Press: Coindesk   Bitaccess   bitcoin.com  


--------------------------------------------------------------------------------


BUY YOUR COFFEE WITH BITCOIN: REAL-WORLD DEPLOYMENT OF A BITCOIN POINT OF SALE
TERMINAL

Advanced and Trusted Computing (ATC), 2016 Intl IEEE Conferences, Toulouse,
France.

Abstract

In this paper we discuss existing approaches for Bitcoin payments, as suitable
for a small business for small-value transactions. We develop an evaluation
framework utilizing security, usability, deployability criteria,, examine
several existing systems, tools. Following a requirements engineering approach,
we designed, implemented a new Point of Sale (PoS) system that satisfies an
optimal set of criteria within our evaluation framework. Our open source system,
Aunja PoS, has been deployed in a real world cafe since October 2014.

GitHub   Paper  

Press: Cafe Aunja   Cointelegraph  


--------------------------------------------------------------------------------


REAL-WORLD DEPLOYABILITY AND USABILITY OF BITCOIN

Thesis (M.A. Sc.) - Concordia University, 2015

Abstract

We live in an era where Internet is one of the daily needs of human life. People
use Internet banking instead of going to banks, they use email rather than
postal mail.This leads to a robust digital way of living, but this also means
people are trusting middle companies and third parties for their online
services. The need of having a digital form of money that is not being
controlled by one entity is plain to see. Bitcoin is the first and the most
popular decentralized virtual currency. It is based on cryptographic functions
to remove the need of a central bank and regulates the generation of new units.
In this thesis, we would like to look at available tools to facilitate users in
holding and using Bitcoin by a perspective on usability and security, and then
evaluate the possibilities for a small business to accept Bitcoin payments. Our
focus is on the usability of these tools and developing a useful framework for
comparing and evaluating future tools. While many security tools have been
studied from a usability perspective, our work is the first to look at Bitcoin.

Paper  


--------------------------------------------------------------------------------


A FIRST LOOK AT THE USABILITY OF BITCOIN KEY MANAGEMENT

USEC 15 NDSS Workshop on Usable Security (USEC) 2015, San Diego, CA, USA,
February 8, 2015, Internet Society

Abstract

Bitcoin users are directly or indirectly forced to deal with public key
cryptography, which has a number of security and usability challenges that
differ from the password-based authentication underlying most online banking
services. Users must ensure that keys are simultaneously accessible, resistant
to digital theft and resilient to loss. In this paper, we contribute an
evaluation framework for comparing Bitcoin key management approaches, and
conduct a broad usability evaluation of six representative Bitcoin clients. We
find that Bitcoin shares many of the fundamental challenges of key management
known from other domains, but that Bitcoin may present a unique opportunity to
rethink key management for end users.

Paper  

Press: The Morning Paper   VentureSkies   Standford, Bitcoin and Cryptocurrency
Technologies Syllabus   Hackernoon   Blocks and Chains (Book)   ACM Queue
Research for Practice   King Abdullah University, Blockchain Systems and
Cryptocurrencies Syllabus  


--------------------------------------------------------------------------------


MONITORING SYSTEM CALLS FOR ANOMALY DETECTION IN MODERN OPERATING SYSTEMS

Software Reliability Engineering Workshops (ISSREW), 2013 IEEE International
Symposium

Abstract

Host-based intrusion detection systems monitor systems in operation for
significant deviations from normal (and healthy) behaviour. Many approaches have
been proposed in the literature. Most of them, however, do not consider even the
basic attack prevention mechanisms that are activated by default on today's many
operating systems. Examples of such mechanisms include Address Space Layout
Randomization and Data Execution Prevention. With such security methods in
place, attackers are forced to perform additional actions to circumvent them. In
this research, we conjecture that some of these actions may require the use of
additional system calls. If so, one can trace such attacks to discover attack
patterns that can later be used to enhance the detection power of anomaly
detection systems. The purpose of this short paper is to motivate the need to
investigate the impact of attack on system calls while trying to overcome these
prevention mechanisms.

GitHub   Paper  



--------------------------------------------------------------------------------


PREVIOUS PROJECTS


LEGIONS - ETHEREUM/EVM NODE SECURITY TOOLKIT

Legions is a handy toolkit for (security) researchers poking around EVM
(Ethereum Virtual Machine) nodes and smart contracts, now with a slick
command-line interface, with auto complete commands and history.

GitHub Homepage


--------------------------------------------------------------------------------


CATENA BLOCKCHAIN SUITE

The Catena Blockchain Suite is an industry first product to quickly enable
publishing of complex datasets onto public or private blockchains. Utilising
smart contracts and hardware security modules, Catena enables a new level of
data consistency and integrity. Government of Canada, piloted by National
Research Council (NRC) is using the Catena Blockchain Suite on the Ethereum
blockchain, to publish funding and grant information in real time.

GitHub Homepage
Press: National Research Council Canada   GlobalNews   Newswire   ETHNews  
TrustNodes  


--------------------------------------------------------------------------------


LIBSUBMARINE - DEFEAT FRONT-RUNNING ON ETHEREUM

LibSubmarine is an open-source smart contract library that makes it easy to
protect your contract against front-runners by temporarily hiding transactions
on-chain.

GitHub Homepage
Press: Ethereum Foundation - DevCon4   Hackernoon   Ethereum Foundation -
DevCon4  


--------------------------------------------------------------------------------


BITACCESS ENTERPRISE WALLET

Bitaccess offers Bitcoin ATM and online software solutions to purchase and sell
Bitcoin and Ethereum. I joined Bitaccess in 2015 to redesign and develop a new
enterprise cloud wallet for better scalability of the BTM network and easier
integration of the wallets in the software solutions.

GitHub Homepage
Press: Enterprise Wallet   TechCrunch   Bitcoin.com   CoinDesk  


--------------------------------------------------------------------------------


VELOCITY TECHNOLOGY

Velocity is a decentralized options platform that allows users to enter into a
collar option using a smart contract on the ethereum blockchain. Velocity
platform includes smart contracts responsible for the trades and, PriceGeth, an
oracle to publish price pairs on Ethereum blockchain at every blocktime.

GitHub
Press: Steemit   ETHNews   IBSIntelligence   siliconANGLE   BlockTribune  


--------------------------------------------------------------------------------


KEYSTAMP, AN OPEN-SOURCE PROOF-OF-COMPLIANCE STANDARD ON THE BLOCKCHAIN

Ontario Securities Commission Hackathon 1st Prize Winner. Integrating applied
cryptography and blockchain technologies in existing corporate processes and
commercial relationships, such as compliance policy implementation and audit.

GitHub Homepage
Press: Betakit   TimelyDisclosure   Ontario Securities Commission   Keystamp
Pitch in RegHackTo  


--------------------------------------------------------------------------------


SHIR YA KHAT

Farsi (Persian) educational podcast on Blockchain technologies and
cryptocurrencies

Homepage
Press: CoinIran  



--------------------------------------------------------------------------------


LECTURES AND PANELS


IRANUNCHAINED -- NGO MEETS DAO

ETHPrague - 2023


Woman, Life, Freedom. A cultural revolution is underway in Iran. We look at how
Ethereum and web3 tools can help (and are already helping) Iranians fighting for
freedom against censorship, surveillance, and oppression. We will also discuss
how sanctions over-compliance prevents legal aid from reaching Iran and present
our newly formed IranUnchained NGO (built on Moloch v3) as a potential solution.

Website   Video  


--------------------------------------------------------------------------------


IN REAL LIFE: WEB3 AND SANCTIONS

Autonomous Ecologies - 2023


When we discuss Web3 and public goods, we don't consider geographical borders or
language as a pressing issue, however, IRL many of the activists in the
community have been banned from using what we take for granted as public good or
protocols in web3, just because of the country they were born in or the language
they speak. We want to shed some light on these incidents and raise awareness.

Website   Video  


--------------------------------------------------------------------------------


DON'T TRUST, VERIFY WHAT'S AT STAKE

EthDenver - 2023


Transparency has never been more important to those of us who have been in the
space for a while and others who are just getting started. As the first public
company to stake a large sum of ether (36,000 ETH), we learned firsthand about
the lack of sufficient data pipelines that made it difficult to meet certain
auditing requirements. That's when we decided to build our staking dashboard — a
custom solution that allows us to track our staking rewards, gives us direct
insight into our validators performance and aggregates data into one easy-to-use
platform saving us both time and money.

Website   Video  


--------------------------------------------------------------------------------


TERMINOLOGIES AND REGULATIONS IN WEB3

Researching Web3 Workshop - 2022


Shayan Eskandari of Ether Capital and Concordia University defines relevant
terms and discusses regulatory effects on web3 at the 2022 Researching Web3
Workshop, sponsored by Smart Contract Research Forum. Shayan chats about cold
storage as an example of how ambiguous definitions can have tangible regulatory
impacts on blockchain technologies.

Website   Video  


--------------------------------------------------------------------------------


ORACLES FROM THE GROUND TRUTH TO MARKET MANIPULATION

Liquidity2020 - 2020




Website   Video  


--------------------------------------------------------------------------------


EXPERT PANEL: EMERGING CHALLENGES AND OPPORTUNITIES IN FINTECH

Association of Certified Fraud Examiners (ACFE) Montreal Chapter - 2020




Website  


--------------------------------------------------------------------------------


HOW BITCOIN MOVES VALUE IN & OUT OF CLOSED ECONOMIES

DeFi Discussions - Dystopia Labs - 2020




Website   Video  


--------------------------------------------------------------------------------


BLOCKCHAIN THROUGH PHILOSOPHY

Shir Ya Khat Podcast - 2020


The latest episode of Shir Ya Khat looks at the Blockchain technology with a
radical philosophical narrative and discuss the changes it can bring in the way
we exist in the coming years.

Website   Video  


--------------------------------------------------------------------------------


TRANSPARENT DISHONESTY: BLOCKCHAIN FRONT-RUNNING TAXONOMY

Stanford Blockchain Conference, Palo Alto, USA - 2020




Website   Video  


--------------------------------------------------------------------------------


BREAKING SMART CONTRACTS

DevCon V, Osaka, Japan - 2019




Website   Video  


--------------------------------------------------------------------------------


TRANSPARENT DISHONESTY: BLOCKCHAIN FRONT-RUNNING TAXONOMY

DevCon V, Osaka, Japan - 2019




Website   Video  


--------------------------------------------------------------------------------


SECURITY BY DESIGN AND SMART CONTRACT AUDITS

Blockchain Training Conference, Denver, USA - 2019


This session will cover why smart contracts are the new paradigm of software
development. The idea of a serverless application running in a public ledger
with open interface is new to most developers and hence common practices in
traditional programming could easily result in security vulnerabilities in
decentralized applications. The second half of the session will focus on smart
contract code auditing and hands on code review on real smart contracts.

Website   Slides   Video  


--------------------------------------------------------------------------------


SMASHING SMART CONTRACTS: DETECTING AND EXPLOITING VULNERABILITIES IN EVM
BYTECODE

Blockchain Village @ DEFCON 27, Las Vegas, USA - 2019


Hacking & exploitation Solidity/EVM smart contracts, and practicing them on
CaptureTheEther and OpenZeppelin Ethernaut challanges.

Website   GitHub  


--------------------------------------------------------------------------------


DEMOCRATIC IMPROVEMENT PROPOSALS FOR DECENTRALIZATION PROJECTS

IETF 105 Montreal - 2019


Blockchain and DLT based systems are waiting in the wings to join the potpourri
of core technology that makes up our future digital lives. Both core internet
infrastructure technology and many DLT solutions have one thing in common: They
are developed with a diverse open source developer community and carry
significant security risk. To manage software change related risks both Bitcoin
and Ethereum have derived their own process of managing change proposals. For
Ethereum changes are discussed and agreed upon in the Ethereum Improvement
Proposal (EIP) process. However given the non-hierarchy management model, there
have been many approaches and obstacles to make this process as close to a
democratic procedure as possible. It is working, but far from perfect and there
are many good approaches and lessons learnt. EIP requires input from experts at
IETF to shape up and standardize.

Website   Slides   Video  


--------------------------------------------------------------------------------


BREAKING SMART CONTRACTS

NorthSec, Montreal, Canada - 2019


Some of the most financially devastating hacks in recent years have happened on
the blockchain. This Ethereum focused workshop, will teach you the fundamentals
of writing and breaking smart contracts.

Website  


--------------------------------------------------------------------------------


THE THING FROM THE FUTURE: A REVERSE ARCHEOLOGY GAME

Consensus, New York, USA - 2019


The Thing From The Future is an award-winning imagination game that challenges
players to collaboratively and competitively describe objects from a range of
alternative futures. Participate in this Reverse Archeology game.

Website  


--------------------------------------------------------------------------------


SOCIAL INNOVATION: INTERNATIONAL DEVELOPMENT AND BLOCKCHAIN

McGill University, Montreal, Canada - 2019


Panel: Blockchain technology has shaken the Financial and Technological worlds
with its unprecedented ability to decentralize governance, provide secure data
storage and allow Participants to interact in a fresh way over the internet.

Website  


--------------------------------------------------------------------------------


SOK: TRANSPARENT DISHONESTY: FRONT-RUNNING ATTACKS ON BLOCKCHAIN.

Financial Cryptography, St. Kitts - 2019


3rd Workshop of Trusted Smart contract - FC 2019 Financial Cryptography and Data
Security - Paper Presentation

Website   Slides  


--------------------------------------------------------------------------------


BLOCKCHAIN MYOPIA, A THING FROM THE FUTURE

DevCon4, Prague, Czech Republic - 2018


An experimental session that involved an award-winning imagination game called
'The thing from the Future' that challenges players to collaboratively and
competitively describe objects from a range of alternative futures. We discussed
topics that range from the technological utopian visions conceptualized by the
flag bearers of Blockchain/Unicorn-land to the technological dystopian
hypotheticals of unstoppable dark markets.

Website  


--------------------------------------------------------------------------------


CRYPTOJACKING, VICTIMLESS CRIME OR A NEW ONLINE ECONOMY?

Blockchain Technology Symposium - from Hype to Reality, UofT, Canada - 2018


Cryptojacking is the invisible use of one’s resources to mine cryptocurrency for
someone else’s profit. Even though these attacks rose by 8500 percent in the
final quarter of 2017, it seems that this phenomena is neither well-studied or
well-known. In the follow up of the published paper, we invite the community
from crypto-communities to ethicists to start the conversation on the policies
and regulation for this new online monetization architecture.

Website   Video  


--------------------------------------------------------------------------------


COCKTAIL BLOCKCHAIN

Blockhouse, Montreal, Canada. - 2018


Panel organized by National Bank of Canada, Catallaxy and Ivado.
Discussion regarding the use of blockchain now and in the future in the real
world and how organizations such as banks can use Blockchain technology and
smart contracts to facilitate trust and security within their infrastructure.

Website  


--------------------------------------------------------------------------------


SECREV - THE SECURITY REVOLUTION FROM MONTREAL

Montreal, Canada. - 2018


The Cybersecurity Revolution is an event conceived to openly encourage sharing
and interaction among the wider cybersecurity research community. It is an event
focused around research, education, science and learning and not the furthering
of commercial interests. On this talk I presented my work on the first look at
browser-based Cryptojacking.

Website   Paper   Slides   Video  


--------------------------------------------------------------------------------


2ND ANNUAL BLOCKCHAIN BOOTCAMP

Blockhouse (Catallaxy), Montreal, Canada. - 2018


This blockchain bootcamp is an introductory level workshop that will teach the
attendees the main building blocks of blockchain, with hands on experience with
timestamping and associated use cases.

Website  


--------------------------------------------------------------------------------


A FIRST LOOK AT BROWSER-BASED CRYPTOJACKING

IEEE SECURITY & PRIVACY ON THE BLOCKCHAIN (IEEE S&B) 2018 University College
London (UCL), London, UK - 2018


Security & Privacy on the Blockchain (affiliated with Euro S&P) - Paper
Presentation

GitHub   Paper   Slides  


--------------------------------------------------------------------------------


BLOCKCHAIN FUNDAMENTALS

Concordia University, Montreal, Canada - 2018


Covering all of the basic fundamentals of blockchain and societal impact of this
innovative technology.

Website   Slides  


--------------------------------------------------------------------------------


WTH IS BITCOIN?

Technologies, World and Societies Class, School of Sociological and
Anthropological Studies, University of Ottawa, Canada - 2018


A through historical view of where Bitcoin and Blockchain technology came from
and how it evolved to be what we know now.

Slides  


--------------------------------------------------------------------------------


BOOTSTRAP ETHEREUM DEVELOPMENT

ETHWaterloo, Waterloo, Canada - 2017


A walkthrough on Ethereum development stack, describing how EVM and Full nodes
function, Requirements for interprise high scale setup and how to deploy smart
contracts on Ethereum hacker-style and fast

Website   Slides  


--------------------------------------------------------------------------------


ON THE FEASIBILITY OF DECENTRALIZED DERIVATIVES MARKETS

Financial Cryptography 17, Malta - 2017


1st Workshop on Trusted Smart Contracts In Association with Financial
Cryptography 2017 - Paper presentation

Website   Slides  


--------------------------------------------------------------------------------


BUY YOUR COFFEE WITH BITCOIN, REAL-WORLD DEPLOYMENT OF A BITCOIN POINT OF SALE
TERMINAL

Advanced and Trusted Computing 15, Toulouse, France - 2016


Advanced and Trusted Computing (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld), 2016
Intl IEEE Conferences - Paper presentation

Website   Slides  


--------------------------------------------------------------------------------


A FIRST LOOK AT THE USABILITY OF BITCOIN KEY MANAGEMENT

Network and Distributed System Security (NDSS), San Diego, United States - 2015


USEC 15 NDSS Workshop on Usable Security (USEC) - Paper presentation and
discussion

Website   Slides  


--------------------------------------------------------------------------------


INTRODUCTION TO BITCOIN

Shahid Beheshti University, Tehran, Iran - 2015


The first workshop on Bitcoin and Blockchain technology in Iran. This workshop
organized by SBU Computer Science Scientific Association was designed to
introduce and discuss research possibilities regarding Blockchain technology for
graduate students and other interested parties.

Video  



--------------------------------------------------------------------------------


SKILLS


WORK

2023 - Co-founder @ IranUnchained DAO/NGO
2021 - 2023 Chief Technology Officer @ Ether Capital
2020 - CEP Committee Chair @ CryptoCurrency Certification Consortium (C4)
2018 - 2021 Security Engineer & Auditor @ ConsenSys Diligence
2015 - 2018 Blockchain Engineer @ Bitaccess
2008 - 2012 Co-founder, CTO @ i-Phone.ir


EDUCATION

2017 - PhD Concordia University
2012 - 2015 MASc Concordia University
2005 - 2010 BA Shahid Beheshti University


PEER REVIEW

August 2021 IEEE International Symposium on Technology and Society (ISTAS21)
December 2020 SpringerOpen Financial Innovation (FIN)
February 2020 IWBOSE 3rd International Workshop on Emerging Trends in Software
Engineering for Blockchain
February 2020 Financial Cryptography and Data Security 2020
August 2019 IEEE Technology and Engineering Management Society
February 2019 IWBOSE 2nd International Workshop on Blockchain Oriented Software
Engineering
February 2019 Financial Cryptography and Data Security 2019
May 2018 Symposium on Electronic Crime Research
April 2018 IEEE SECURITY & PRIVACY ON THE BLOCKCHAIN
March 2018 1st International Workshop on Blockchain Oriented Software
Engineering


CVE

2018 CVE-2018-1000023 NIST NVD
© 2023 Shayan Eskandari made with Hosted on