shayan.es
Open in
urlscan Pro
2606:4700:3031::ac43:cd81
Public Scan
Submitted URL: http://shayan.es/
Effective URL: https://shayan.es/
Submission: On February 10 via api from US — Scanned from ES
Effective URL: https://shayan.es/
Submission: On February 10 via api from US — Scanned from ES
Form analysis
0 forms found in the DOMText Content
Shayan Eskandari PhD Candidate / CTFO Based in Toronto 🇨🇦 * home / * Audits / * Press / * * * * * * * * ABOUT Shayan is currently completing his doctoral studies with the topic of "New Technology, Old Crimes" at Concordia University. Previously he worked as the Chief Technology Officer at Ether Capital (ETHC.NE). He also worked as a security engineer and smart contract auditor at ConsenSys Diligence. He has worked in network and information systems security for several years and has extensive experience as a blockchain engineer in startups, as well as contributing to open source projects. He has dedicated both his intellectual and professional pursuits towards Blockchain technology since 2012. Looking at the technology from an interdisciplinary perspective, Shayan has been working on multiple academic papers varying from exploring the psychology of Blockchain to systemizing attacks on smart contracts. -------------------------------------------------------------------------------- Shortcuts (↪︎ latest activity) * Publications * SoK: Oracles from the Ground Truth to Market Manipulation - 2021 * Security Audits * xTokens - xERC20 - 2023/08 * Lectures & Talks * IranUnchained -- NGO meets DAO - ETHPrague 2023 * Previous Projects * Media Mentions * Yahoo! Finance - 2023/02/22 * Peer Reviews -------------------------------------------------------------------------------- PUBLICATIONS SOK: ORACLES FROM THE GROUND TRUTH TO MARKET MANIPULATION ACM Advances in Financial Technologies Abstract One fundamental limitation of blockchain-based smart contracts is that they execute in a closed environment and only have access to the data and functionality that is either already on the blockchain or fed into the blockchain. Thus any interactions with the real world need to be mediated by a bridge service, which is called an oracle. As decentralized applications mature, oracles are playing an increasingly prominent role. With their evolution comes more attacks, necessitating a greater attention to the trust model of using oracles. In this SoK, we systemize the design alternatives for oracles, showcase attacks, and discuss attack mitigation strategies. Paper Video -------------------------------------------------------------------------------- SYSTEMIZING THE CHALLENGES OF AUDITING BLOCKCHAIN-BASED ASSETS Journal of Information Systems ISYS-19-007 Abstract Firms transacting using blockchain-based assets and liabilities have begun to enter capital markets in search for funding. Historically, firms have been able to raise substantial funding without an audited financial statement, however we project that in the future, audits will become a common requirement given increased competition among firms, increased scrutiny from regulators, past instances of fraud, and firms seeking an IPO. At the time of writing, accounting firms are hesitant to accept mandates from companies that hold a significant amount of cryptoassets primarily because the blockchain market introduces novel, technically sophisticated, and risky propositions that auditors are unequipped to handle. Through interviews with senior accounting professionals and structured brainstorming meetings with a multidisciplinary team of accountants and blockchain experts, we critically analyze the purported roadblocks to auditing blockchain firms and map them to traditional auditing practices, demonstrating that providing an audit opinion is challenging but not insurmountable. Paper -------------------------------------------------------------------------------- THE MIDDLEMAN IS DEAD, LONG LIVE THE MIDDLEMAN: THE “TRUST FACTOR” AND THE PSYCHO-SOCIAL IMPLICATIONS OF BLOCKCHAIN Frontiers in Blockchain Journal - Human-Centric Constituents in Times of Decentralization Abstract Blockchain is widely regarded as a breakthrough innovation that may have a profound impact on the economy and society, of a magnitude comparable to the effects of the introduction of the Internet itself. In essence, a blockchain is a decentralized peer-to-peer network with no central authority figure, which adds information to the distributed database by collectively validating the accuracy of data. Since each node of the network participates in the review and confirmation of the new information before being accepted, the need for a trustworthy intermediary is eliminated. However, as trust plays an essential role in affecting decisions when transacting with one another, it is important to understand which implications the decentralized nature of blockchain may have on individuals' sense of trust. In this contribution, we argue that the adoption of blockchain is not only a technological, but foremostly a psychological challenge, which crucially depends on the possibility of creating a trust management approach that matches the underlying distributed communication system. We first describe the decentralization technologies and possibilities they hold for the near future. Next, we discuss the psycho-social implications of the introduction of decentralized processes of trust, examining some potential scenarios, and outline a research agenda. Paper -------------------------------------------------------------------------------- RESOLVING THE MULTIPLE WITHDRAWAL ATTACK ON ERC20 TOKENS IEEE SECURITY & PRIVACY ON THE BLOCKCHAIN (IEEE S&B 2019) Abstract Custom tokens are an integral component of decentralized applications (dapps) deployed on Ethereum and other blockchain platforms. For Ethereum, the ERC20 standard is a widely used token interface and is interoperable with many existing dapps, user interface platforms, and popular web applications (e.g., exchange services). An ERC20 security issue, known as the "multiple withdrawal attack", was raised on GitHub and has been open since November 2016. The issue concerns ERC20's defined method approve() which was envisioned as a way for token holders to give permission for other users and dapps to withdraw a capped number of tokens. The security issue arises when a token holder wants to adjust the amount of approved tokens from N to M (this could be an increase or decrease). If malicious, a user or dapp who is approved for N tokens can front-run the adjustment transaction to first withdraw N tokens, then allow the approval to be confirmed, and withdraw an additional M tokens. In this paper, we evaluate 10 proposed mitigations for this issues and find that no solution is fully satisfactory. We then propose 2 new solutions that mitigate the attack, one of which fully fulfills constraints of the standard, and the second one shows a general limitation in addressing this issue from ERC20's approve method. Paper -------------------------------------------------------------------------------- SOK: TRANSPARENT DISHONESTY: FRONT-RUNNING ATTACKS ON BLOCKCHAIN. FC 2019 Financial Cryptography and Data Security, St. Kitts Abstract We consider front-running to be a course of action where an entity benefits from prior access to privileged market information about upcoming transactions and trades. Front-running has been an issue in financial instrument markets since the 1970s. With the advent of the blockchain technology, front-running has resurfaced in new forms we explore here, instigated by blockchains decentralized and transparent nature. In this paper, we draw from a scattered body of knowledge and instances of front-running across the top 25 most active decentral applications (DApps) deployed on Ethereum blockchain. Additionally, we carry out a detailed analysis of Status.im initial coin offering (ICO) and show evidence of abnormal miners behavior indicative of front-running token purchases. Finally, we map the proposed solutions to front-running into useful categories. GitHub Paper Slides Video Press: ConsenSys Diligence -------------------------------------------------------------------------------- A FIRST LOOK AT BROWSER-BASED CRYPTOJACKING IEEE SECURITY & PRIVACY ON THE BLOCKCHAIN (IEEE S&B) 2018 University College London (UCL), London, UK Abstract In this paper, we examine the recent trend towards in-browser mining of cryptocurrencies; in particular, the mining of Monero through Coinhive and similar code- bases. In this model, a user visiting a website will download a JavaScript code that executes client-side in her browser, mines a cryptocurrency, typically without her consent or knowledge, and pays out the seigniorage to the website. Websites may consciously employ this as an alternative or to supplement advertisement revenue, may offer premium content in exchange for mining, or may be unwittingly serving the code as a result of a breach (in which case the seigniorage is collected by the attacker). The cryptocurrency Monero is preferred seemingly for its unfriendliness to large-scale ASIC mining that would drive browser-based efforts out of the market, as well as for its purported privacy features. In this paper, we survey this landscape, conduct some measurements to establish its prevalence and profitability, outline an ethical framework for considering whether it should be classified as an attack or business opportunity, and make suggestions for the detection, mitigation and/or prevention of browser-based mining for non- consenting users. GitHub Paper Slides Press: Schneier on Security Cointelegraph Motherboard Vice Cointelegraph Cryptoinsider Randed Bleepingcomputer -------------------------------------------------------------------------------- ON THE FEASIBILITY OF DECENTRALIZED DERIVATIVES MARKETS FC 2017 Financial Cryptography and Data Security, Malta Abstract In this paper, we present Velocity, a decentralized market deployed on Ethereum for trading a custom type of derivative option. To enable the smart contract to work, we also implement a price fetching tool called PriceGeth. We present this as a case study, noting challenges in development of the system that might be of independent interest to whose working on smart contract implementations. We also apply recent academic results on the security of the Solidity smart contract language in validating our code’s security. Finally, we discuss more generally the use of smart contracts in modelling financial derivatives. GitHub Paper Press: Coindesk Bitaccess bitcoin.com -------------------------------------------------------------------------------- BUY YOUR COFFEE WITH BITCOIN: REAL-WORLD DEPLOYMENT OF A BITCOIN POINT OF SALE TERMINAL Advanced and Trusted Computing (ATC), 2016 Intl IEEE Conferences, Toulouse, France. Abstract In this paper we discuss existing approaches for Bitcoin payments, as suitable for a small business for small-value transactions. We develop an evaluation framework utilizing security, usability, deployability criteria,, examine several existing systems, tools. Following a requirements engineering approach, we designed, implemented a new Point of Sale (PoS) system that satisfies an optimal set of criteria within our evaluation framework. Our open source system, Aunja PoS, has been deployed in a real world cafe since October 2014. GitHub Paper Press: Cafe Aunja Cointelegraph -------------------------------------------------------------------------------- REAL-WORLD DEPLOYABILITY AND USABILITY OF BITCOIN Thesis (M.A. Sc.) - Concordia University, 2015 Abstract We live in an era where Internet is one of the daily needs of human life. People use Internet banking instead of going to banks, they use email rather than postal mail.This leads to a robust digital way of living, but this also means people are trusting middle companies and third parties for their online services. The need of having a digital form of money that is not being controlled by one entity is plain to see. Bitcoin is the first and the most popular decentralized virtual currency. It is based on cryptographic functions to remove the need of a central bank and regulates the generation of new units. In this thesis, we would like to look at available tools to facilitate users in holding and using Bitcoin by a perspective on usability and security, and then evaluate the possibilities for a small business to accept Bitcoin payments. Our focus is on the usability of these tools and developing a useful framework for comparing and evaluating future tools. While many security tools have been studied from a usability perspective, our work is the first to look at Bitcoin. Paper -------------------------------------------------------------------------------- A FIRST LOOK AT THE USABILITY OF BITCOIN KEY MANAGEMENT USEC 15 NDSS Workshop on Usable Security (USEC) 2015, San Diego, CA, USA, February 8, 2015, Internet Society Abstract Bitcoin users are directly or indirectly forced to deal with public key cryptography, which has a number of security and usability challenges that differ from the password-based authentication underlying most online banking services. Users must ensure that keys are simultaneously accessible, resistant to digital theft and resilient to loss. In this paper, we contribute an evaluation framework for comparing Bitcoin key management approaches, and conduct a broad usability evaluation of six representative Bitcoin clients. We find that Bitcoin shares many of the fundamental challenges of key management known from other domains, but that Bitcoin may present a unique opportunity to rethink key management for end users. Paper Press: The Morning Paper VentureSkies Standford, Bitcoin and Cryptocurrency Technologies Syllabus Hackernoon Blocks and Chains (Book) ACM Queue Research for Practice King Abdullah University, Blockchain Systems and Cryptocurrencies Syllabus -------------------------------------------------------------------------------- MONITORING SYSTEM CALLS FOR ANOMALY DETECTION IN MODERN OPERATING SYSTEMS Software Reliability Engineering Workshops (ISSREW), 2013 IEEE International Symposium Abstract Host-based intrusion detection systems monitor systems in operation for significant deviations from normal (and healthy) behaviour. Many approaches have been proposed in the literature. Most of them, however, do not consider even the basic attack prevention mechanisms that are activated by default on today's many operating systems. Examples of such mechanisms include Address Space Layout Randomization and Data Execution Prevention. With such security methods in place, attackers are forced to perform additional actions to circumvent them. In this research, we conjecture that some of these actions may require the use of additional system calls. If so, one can trace such attacks to discover attack patterns that can later be used to enhance the detection power of anomaly detection systems. The purpose of this short paper is to motivate the need to investigate the impact of attack on system calls while trying to overcome these prevention mechanisms. GitHub Paper -------------------------------------------------------------------------------- PREVIOUS PROJECTS LEGIONS - ETHEREUM/EVM NODE SECURITY TOOLKIT Legions is a handy toolkit for (security) researchers poking around EVM (Ethereum Virtual Machine) nodes and smart contracts, now with a slick command-line interface, with auto complete commands and history. GitHub Homepage -------------------------------------------------------------------------------- CATENA BLOCKCHAIN SUITE The Catena Blockchain Suite is an industry first product to quickly enable publishing of complex datasets onto public or private blockchains. Utilising smart contracts and hardware security modules, Catena enables a new level of data consistency and integrity. Government of Canada, piloted by National Research Council (NRC) is using the Catena Blockchain Suite on the Ethereum blockchain, to publish funding and grant information in real time. GitHub Homepage Press: National Research Council Canada GlobalNews Newswire ETHNews TrustNodes -------------------------------------------------------------------------------- LIBSUBMARINE - DEFEAT FRONT-RUNNING ON ETHEREUM LibSubmarine is an open-source smart contract library that makes it easy to protect your contract against front-runners by temporarily hiding transactions on-chain. GitHub Homepage Press: Ethereum Foundation - DevCon4 Hackernoon Ethereum Foundation - DevCon4 -------------------------------------------------------------------------------- BITACCESS ENTERPRISE WALLET Bitaccess offers Bitcoin ATM and online software solutions to purchase and sell Bitcoin and Ethereum. I joined Bitaccess in 2015 to redesign and develop a new enterprise cloud wallet for better scalability of the BTM network and easier integration of the wallets in the software solutions. GitHub Homepage Press: Enterprise Wallet TechCrunch Bitcoin.com CoinDesk -------------------------------------------------------------------------------- VELOCITY TECHNOLOGY Velocity is a decentralized options platform that allows users to enter into a collar option using a smart contract on the ethereum blockchain. Velocity platform includes smart contracts responsible for the trades and, PriceGeth, an oracle to publish price pairs on Ethereum blockchain at every blocktime. GitHub Press: Steemit ETHNews IBSIntelligence siliconANGLE BlockTribune -------------------------------------------------------------------------------- KEYSTAMP, AN OPEN-SOURCE PROOF-OF-COMPLIANCE STANDARD ON THE BLOCKCHAIN Ontario Securities Commission Hackathon 1st Prize Winner. Integrating applied cryptography and blockchain technologies in existing corporate processes and commercial relationships, such as compliance policy implementation and audit. GitHub Homepage Press: Betakit TimelyDisclosure Ontario Securities Commission Keystamp Pitch in RegHackTo -------------------------------------------------------------------------------- SHIR YA KHAT Farsi (Persian) educational podcast on Blockchain technologies and cryptocurrencies Homepage Press: CoinIran -------------------------------------------------------------------------------- LECTURES AND PANELS IRANUNCHAINED -- NGO MEETS DAO ETHPrague - 2023 Woman, Life, Freedom. A cultural revolution is underway in Iran. We look at how Ethereum and web3 tools can help (and are already helping) Iranians fighting for freedom against censorship, surveillance, and oppression. We will also discuss how sanctions over-compliance prevents legal aid from reaching Iran and present our newly formed IranUnchained NGO (built on Moloch v3) as a potential solution. Website Video -------------------------------------------------------------------------------- IN REAL LIFE: WEB3 AND SANCTIONS Autonomous Ecologies - 2023 When we discuss Web3 and public goods, we don't consider geographical borders or language as a pressing issue, however, IRL many of the activists in the community have been banned from using what we take for granted as public good or protocols in web3, just because of the country they were born in or the language they speak. We want to shed some light on these incidents and raise awareness. Website Video -------------------------------------------------------------------------------- DON'T TRUST, VERIFY WHAT'S AT STAKE EthDenver - 2023 Transparency has never been more important to those of us who have been in the space for a while and others who are just getting started. As the first public company to stake a large sum of ether (36,000 ETH), we learned firsthand about the lack of sufficient data pipelines that made it difficult to meet certain auditing requirements. That's when we decided to build our staking dashboard — a custom solution that allows us to track our staking rewards, gives us direct insight into our validators performance and aggregates data into one easy-to-use platform saving us both time and money. Website Video -------------------------------------------------------------------------------- TERMINOLOGIES AND REGULATIONS IN WEB3 Researching Web3 Workshop - 2022 Shayan Eskandari of Ether Capital and Concordia University defines relevant terms and discusses regulatory effects on web3 at the 2022 Researching Web3 Workshop, sponsored by Smart Contract Research Forum. Shayan chats about cold storage as an example of how ambiguous definitions can have tangible regulatory impacts on blockchain technologies. Website Video -------------------------------------------------------------------------------- ORACLES FROM THE GROUND TRUTH TO MARKET MANIPULATION Liquidity2020 - 2020 Website Video -------------------------------------------------------------------------------- EXPERT PANEL: EMERGING CHALLENGES AND OPPORTUNITIES IN FINTECH Association of Certified Fraud Examiners (ACFE) Montreal Chapter - 2020 Website -------------------------------------------------------------------------------- HOW BITCOIN MOVES VALUE IN & OUT OF CLOSED ECONOMIES DeFi Discussions - Dystopia Labs - 2020 Website Video -------------------------------------------------------------------------------- BLOCKCHAIN THROUGH PHILOSOPHY Shir Ya Khat Podcast - 2020 The latest episode of Shir Ya Khat looks at the Blockchain technology with a radical philosophical narrative and discuss the changes it can bring in the way we exist in the coming years. Website Video -------------------------------------------------------------------------------- TRANSPARENT DISHONESTY: BLOCKCHAIN FRONT-RUNNING TAXONOMY Stanford Blockchain Conference, Palo Alto, USA - 2020 Website Video -------------------------------------------------------------------------------- BREAKING SMART CONTRACTS DevCon V, Osaka, Japan - 2019 Website Video -------------------------------------------------------------------------------- TRANSPARENT DISHONESTY: BLOCKCHAIN FRONT-RUNNING TAXONOMY DevCon V, Osaka, Japan - 2019 Website Video -------------------------------------------------------------------------------- SECURITY BY DESIGN AND SMART CONTRACT AUDITS Blockchain Training Conference, Denver, USA - 2019 This session will cover why smart contracts are the new paradigm of software development. The idea of a serverless application running in a public ledger with open interface is new to most developers and hence common practices in traditional programming could easily result in security vulnerabilities in decentralized applications. The second half of the session will focus on smart contract code auditing and hands on code review on real smart contracts. Website Slides Video -------------------------------------------------------------------------------- SMASHING SMART CONTRACTS: DETECTING AND EXPLOITING VULNERABILITIES IN EVM BYTECODE Blockchain Village @ DEFCON 27, Las Vegas, USA - 2019 Hacking & exploitation Solidity/EVM smart contracts, and practicing them on CaptureTheEther and OpenZeppelin Ethernaut challanges. Website GitHub -------------------------------------------------------------------------------- DEMOCRATIC IMPROVEMENT PROPOSALS FOR DECENTRALIZATION PROJECTS IETF 105 Montreal - 2019 Blockchain and DLT based systems are waiting in the wings to join the potpourri of core technology that makes up our future digital lives. Both core internet infrastructure technology and many DLT solutions have one thing in common: They are developed with a diverse open source developer community and carry significant security risk. To manage software change related risks both Bitcoin and Ethereum have derived their own process of managing change proposals. For Ethereum changes are discussed and agreed upon in the Ethereum Improvement Proposal (EIP) process. However given the non-hierarchy management model, there have been many approaches and obstacles to make this process as close to a democratic procedure as possible. It is working, but far from perfect and there are many good approaches and lessons learnt. EIP requires input from experts at IETF to shape up and standardize. Website Slides Video -------------------------------------------------------------------------------- BREAKING SMART CONTRACTS NorthSec, Montreal, Canada - 2019 Some of the most financially devastating hacks in recent years have happened on the blockchain. This Ethereum focused workshop, will teach you the fundamentals of writing and breaking smart contracts. Website -------------------------------------------------------------------------------- THE THING FROM THE FUTURE: A REVERSE ARCHEOLOGY GAME Consensus, New York, USA - 2019 The Thing From The Future is an award-winning imagination game that challenges players to collaboratively and competitively describe objects from a range of alternative futures. Participate in this Reverse Archeology game. Website -------------------------------------------------------------------------------- SOCIAL INNOVATION: INTERNATIONAL DEVELOPMENT AND BLOCKCHAIN McGill University, Montreal, Canada - 2019 Panel: Blockchain technology has shaken the Financial and Technological worlds with its unprecedented ability to decentralize governance, provide secure data storage and allow Participants to interact in a fresh way over the internet. Website -------------------------------------------------------------------------------- SOK: TRANSPARENT DISHONESTY: FRONT-RUNNING ATTACKS ON BLOCKCHAIN. Financial Cryptography, St. Kitts - 2019 3rd Workshop of Trusted Smart contract - FC 2019 Financial Cryptography and Data Security - Paper Presentation Website Slides -------------------------------------------------------------------------------- BLOCKCHAIN MYOPIA, A THING FROM THE FUTURE DevCon4, Prague, Czech Republic - 2018 An experimental session that involved an award-winning imagination game called 'The thing from the Future' that challenges players to collaboratively and competitively describe objects from a range of alternative futures. We discussed topics that range from the technological utopian visions conceptualized by the flag bearers of Blockchain/Unicorn-land to the technological dystopian hypotheticals of unstoppable dark markets. Website -------------------------------------------------------------------------------- CRYPTOJACKING, VICTIMLESS CRIME OR A NEW ONLINE ECONOMY? Blockchain Technology Symposium - from Hype to Reality, UofT, Canada - 2018 Cryptojacking is the invisible use of one’s resources to mine cryptocurrency for someone else’s profit. Even though these attacks rose by 8500 percent in the final quarter of 2017, it seems that this phenomena is neither well-studied or well-known. In the follow up of the published paper, we invite the community from crypto-communities to ethicists to start the conversation on the policies and regulation for this new online monetization architecture. Website Video -------------------------------------------------------------------------------- COCKTAIL BLOCKCHAIN Blockhouse, Montreal, Canada. - 2018 Panel organized by National Bank of Canada, Catallaxy and Ivado. Discussion regarding the use of blockchain now and in the future in the real world and how organizations such as banks can use Blockchain technology and smart contracts to facilitate trust and security within their infrastructure. Website -------------------------------------------------------------------------------- SECREV - THE SECURITY REVOLUTION FROM MONTREAL Montreal, Canada. - 2018 The Cybersecurity Revolution is an event conceived to openly encourage sharing and interaction among the wider cybersecurity research community. It is an event focused around research, education, science and learning and not the furthering of commercial interests. On this talk I presented my work on the first look at browser-based Cryptojacking. Website Paper Slides Video -------------------------------------------------------------------------------- 2ND ANNUAL BLOCKCHAIN BOOTCAMP Blockhouse (Catallaxy), Montreal, Canada. - 2018 This blockchain bootcamp is an introductory level workshop that will teach the attendees the main building blocks of blockchain, with hands on experience with timestamping and associated use cases. Website -------------------------------------------------------------------------------- A FIRST LOOK AT BROWSER-BASED CRYPTOJACKING IEEE SECURITY & PRIVACY ON THE BLOCKCHAIN (IEEE S&B) 2018 University College London (UCL), London, UK - 2018 Security & Privacy on the Blockchain (affiliated with Euro S&P) - Paper Presentation GitHub Paper Slides -------------------------------------------------------------------------------- BLOCKCHAIN FUNDAMENTALS Concordia University, Montreal, Canada - 2018 Covering all of the basic fundamentals of blockchain and societal impact of this innovative technology. Website Slides -------------------------------------------------------------------------------- WTH IS BITCOIN? Technologies, World and Societies Class, School of Sociological and Anthropological Studies, University of Ottawa, Canada - 2018 A through historical view of where Bitcoin and Blockchain technology came from and how it evolved to be what we know now. Slides -------------------------------------------------------------------------------- BOOTSTRAP ETHEREUM DEVELOPMENT ETHWaterloo, Waterloo, Canada - 2017 A walkthrough on Ethereum development stack, describing how EVM and Full nodes function, Requirements for interprise high scale setup and how to deploy smart contracts on Ethereum hacker-style and fast Website Slides -------------------------------------------------------------------------------- ON THE FEASIBILITY OF DECENTRALIZED DERIVATIVES MARKETS Financial Cryptography 17, Malta - 2017 1st Workshop on Trusted Smart Contracts In Association with Financial Cryptography 2017 - Paper presentation Website Slides -------------------------------------------------------------------------------- BUY YOUR COFFEE WITH BITCOIN, REAL-WORLD DEPLOYMENT OF A BITCOIN POINT OF SALE TERMINAL Advanced and Trusted Computing 15, Toulouse, France - 2016 Advanced and Trusted Computing (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld), 2016 Intl IEEE Conferences - Paper presentation Website Slides -------------------------------------------------------------------------------- A FIRST LOOK AT THE USABILITY OF BITCOIN KEY MANAGEMENT Network and Distributed System Security (NDSS), San Diego, United States - 2015 USEC 15 NDSS Workshop on Usable Security (USEC) - Paper presentation and discussion Website Slides -------------------------------------------------------------------------------- INTRODUCTION TO BITCOIN Shahid Beheshti University, Tehran, Iran - 2015 The first workshop on Bitcoin and Blockchain technology in Iran. This workshop organized by SBU Computer Science Scientific Association was designed to introduce and discuss research possibilities regarding Blockchain technology for graduate students and other interested parties. Video -------------------------------------------------------------------------------- SKILLS WORK 2023 - Co-founder @ IranUnchained DAO/NGO 2021 - 2023 Chief Technology Officer @ Ether Capital 2020 - CEP Committee Chair @ CryptoCurrency Certification Consortium (C4) 2018 - 2021 Security Engineer & Auditor @ ConsenSys Diligence 2015 - 2018 Blockchain Engineer @ Bitaccess 2008 - 2012 Co-founder, CTO @ i-Phone.ir EDUCATION 2017 - PhD Concordia University 2012 - 2015 MASc Concordia University 2005 - 2010 BA Shahid Beheshti University PEER REVIEW August 2021 IEEE International Symposium on Technology and Society (ISTAS21) December 2020 SpringerOpen Financial Innovation (FIN) February 2020 IWBOSE 3rd International Workshop on Emerging Trends in Software Engineering for Blockchain February 2020 Financial Cryptography and Data Security 2020 August 2019 IEEE Technology and Engineering Management Society February 2019 IWBOSE 2nd International Workshop on Blockchain Oriented Software Engineering February 2019 Financial Cryptography and Data Security 2019 May 2018 Symposium on Electronic Crime Research April 2018 IEEE SECURITY & PRIVACY ON THE BLOCKCHAIN March 2018 1st International Workshop on Blockchain Oriented Software Engineering CVE 2018 CVE-2018-1000023 NIST NVD © 2023 Shayan Eskandari made with Hosted on