Overview
Decentralized Finance (DeFi) has experienced tremendous growth, transforming from a niche market to a thriving ecosystem that has captured the attention of both crypto enthusiasts and traditional financial institutions. Despite the challenges posed by market volatility and regulatory uncertainties, DeFi has continued to evolve, offering an ever-expanding array of financial services, including decentralized exchanges, yield farming platforms, stablecoins, and innovative derivatives.
As the DeFi landscape has matured, the need for robust security measures has become increasingly apparent. This workshop aims to bring together leading experts from various domains, including cryptography, game theory, economics, and cybersecurity, to collaboratively explore the current state of DeFi security and chart a path forward. By fostering interdisciplinary dialogue and showcasing cutting-edge research, we seek to identify and address the critical challenges facing DeFi, with a particular focus on safeguarding users from malicious actors and promoting the development of secure, resilient, and user-centric DeFi platforms.
In addition to the formal presentations and panel discussions, the workshop will provide ample opportunities for attendees to connect, exchange ideas, and forge new collaborations through virtual networking sessions and interactive breakout rooms. By creating a vibrant and inclusive forum for knowledge sharing and innovation, we aim to accelerate the growth of a secure and trustworthy DeFi ecosystem that can drive the next phase of global financial inclusion and empowerment.
Submission Server
https://defi24.hotcrp.com/Important Dates
Submission deadline: July 15th, 2024 (AoE)- Submission deadline: July 22nd, 2024 (AoE)
- Author notification: August 25th, 2024 (AoE)
- Camera-ready deadline: September 5th, 2024 (AoE)
- Workshop: October 18th, 2024
Topics of Interest
Topics of interest include (but are not limited to):
- Anonymity and privacy-preserving techniques in DeFi
- Applied cryptography in DeFi protocols and applications
- Attacks, attack techniques, and attack case studies in DeFi
- Censorship resistance in DeFi
- Cryptographic protocols for secure DeFi transactions
- DeFi composability and its security and privacy implications
- DeFi fraud detection and financial crime prevention
- DeFi on Layer 2
- DeFi protocol governance and stakeholder voting security
- Economic and game-theoretic analysis of DeFi security and privacy
- Empirical studies and real-world measurements of DeFi security and privacy
- Exchange Security (manipulation resilience, front-running, sandwich)
- Formal analysis, verification, and correctness by design for DeFi smart contracts
- Incentive mechanisms for promoting secure and privacy-preserving behavior in DeFi
- Legal and regulatory issues related to DeFi security and privacy
- Manipulation resilience of Stablecoins
- Metrics for evaluating the security and privacy of DeFi platforms
- Miner/maximal/blockchain extraced/extractable value (MEV/BEV) in DeFi
- Network forensics and monitoring for DeFi security
- Privacy-preserving smart contracts and applications in DeFi
- Quantum-resilient cryptography for DeFi
- Secure cryptoasset custody solutions for DeFi
- Secure hardware and trusted execution environments (TEE) for DeFi applications
- Secure interoperability between DeFi and centralized financial systems
- Security and privacy challenges in decentralized autonomous organizations (DAOs)
- Techniques for achieving privacy in decentralized exchanges and trading platforms
- Transaction graph analysis for DeFi forensics and investigations
- User studies on the usability and adoption of secure and privacy-preserving DeFi solutions
- Zero-knowledge proofs and their applications in DeFi
Submissions Policy
Any link to previously published or concurrently submitted papers by any of the writers must be clearly documented in all submissions, i.e., submissions must be original work. Your submission will be rejected if you fail to define and explain contribution overlaps. It is not allowed to send the same paper to another venue with proceedings or a journal at the same time, as this would result in a desk reject. Please contact the program committee chairs if you have any questions.
Systemization of Knowledge (SoK)
Papers on Systemization of Knowledge are welcome. These aren't surveys of previous academic work, but rather a set of findings that have been presented informally by the open-source community or used in operational projects. SoK submissions should have an “SoK:” prefix in the title.
Anonymous Submission
Papers must be provided in a way that allows for anonymous reviews: no author names or affiliations should appear on the title page, and the submission should not disclose the authors' identities in the document. When referring to your prior work, please pretend that prior work is written by someone else. Then blind the references itself if a third-person reference isn't possible (unusual). This policy is not breached if the paper is released as a technical report or in an online archive. If you have any concerns, please contact the program chairs. Papers that are not anonymized correctly should be rejected without its content being reviewed.
Conflict of Interest
When submitting a research paper, the submission site will inquire about any possible conflicts of interest between the paper's authors and members of the program committee (PC). According to the following definition, it is the sole duty of all authors of a paper to recognize all possible conflict-of-interest PC participants. When one or more of the following criteria apply, a paper author has a conflict of interest with a PC member:
- The PC member is a co-author of the submitted paper.
- The PC member was in the last two years in the same company or university as a co-author of the submitted paper.
- The PC member collaborated with a co-author in the last two years.
- No matter how long ago, the PC member is or was a co-author's primary thesis advisor.
- No matter how long ago, a co-author is or was the PC member's primary thesis advisor.
- The author's PC member is a relative or close personal friend.
Whenever a PC member or co-chair is in conflict with a paper, the PC member or co-chair must not review the paper nor have access to the reviews or discussions. Any other case in which the authors believe they have a dispute or conflict with a PC member, they must proactively explain the reason to the PC chairs, who will mark the conflict if necessary. As of the submission date, papers with incorrect or incomplete conflict of interest details will be automatically refused. When one of the program co-chairs is unable to decide on a paper, the other co-chair would become responsible. When all program co-chairs are in conflict, the paper will be delegated to a neutral committee member. Co-chairs of the program are not permitted to be authors or co-authors on any submission.
Human Subjects and Ethical Considerations
Papers that perform human subject studies, evaluate data extracted from human subjects (even anonymized data), or otherwise place humans in danger or affect their financial condition must:
- If appropriate, state whether the study obtained approval or a waiver from each author's institutional ethics review board (IRB).
- Examine the measures taken to ensure that participants and those who could have been hurt by an experiment were treated ethically and respectfully.
If the submission reveals novel bugs or vulnerabilities (for example, software flaws in a program or design flaws in a hardware system), the authors must explain the steps they have taken or intend to take to fix these flaws in detail (e.g., by disclosing vulnerabilities to the vendors). If the submission includes personally identifiable information (PII) or other forms of confidential data, the same rules apply. If a paper poses serious ethical or legal issues, it may be rejected.
Page Limit and Formatting
We welcome papers of up to 8 pages, excluding references and bibliographies, in the double column ACM CCS format (using the sigconf style). Submissions should be anonymized. Authors of accepted papers must guarantee that one of the authors will register and present the paper at the workshop.