BiographyTim Roughgarden is a Professor of Computer Science at Columbia University. Prior to joining Columbia, he spent 15 years on the computer science faculty at Stanford, following a PhD at Cornell and a postdoc at UC Berkeley. His research interests include the many connections between computer science and economics, as well as the design, analysis, applications, and limitations of algorithms. For his research, he has been awarded the ACM Grace Murray Hopper Award, the Presidential Early Career Award for Scientists and Engineers (PECASE), the Kalai Prize in Computer Science and Game Theory, the Social Choice and Welfare Prize, the Mathematical Programming Society's Tucker Prize, and the EATCS-SIGACT Gödel Prize. He was an invited speaker at the 2006 International Congress of Mathematicians, the Shapley Lecturer at the 2008 World Congress of the Game Theory Society, and a Guggenheim Fellow in 2017. His books include Twenty Lectures on Algorithmic Game Theory (2016) and the Algorithms Illuminated book series (2017-2019).
|13:00–13:10||Opening and Welcome|
|13:10–14:00||Keynote: A Theory of DeFi?|
|Better Keep Cash in Your Boots - Hardware Wallets Are the New Single Point of Failure
Authors: Adrian Dabrowski (University of California, Irvine), Katharina Pfeffer (SBA Research), Markus Reichel (Vienna University of Technology), Alexandra Mai (SBA Research), Edgar R. Weippl (University of Vienna), Michael Franz (University of California, Irvine)
|A Note on Optimal Fees for Constant Function Market Makers
Author: Robin Fritsch (ETH Zürich)
|Concentrated Liquidity in Automated Market Makers
Author: Robin Fritsch (ETH Zürich)
|Analyzing Target-Based Cryptocurrency Pump and Dump Schemes
Authors: JT Hamrick (The University of Tulsa), Farhang Rouhi (University of New Mexico), Arghya Mukherjee (The University of Tulsa), Marie Vasek (University College London), Tyler Moore (The University of Tulsa), Neil Gandal (Tel Aviv University)
|17:00–17:45||Panel - DeFi Security||
Moderator: Roger Wattenhofer
Panelist: Andrea Baronchelli, Travin Keith, Benjamin Livshits, Patrick McCorry
Trusted intermediaries have dominated economic interactions for centuries. With the advent of decentralized ledgers, such as Bitcoin and Ethereum, people can now trade and interact without trusting centralized custodians. Recently, Decentralized Finance (DeFi) grew to a USD +$100 Billion economy covering exchanges, borrowing/lending, margin trading, derivatives, and more.
The security properties of DeFi have to date not received much scrutinity or attention. Yet, as was shown by recent work, transaction bribing attacks and Miner Extractable Value (MEV) destabilize the blockchain's consensus security, and appears as a nearly inevitable by-product of DeFi. As such, the blockchain application layer design and utilization is critical to the security of the blockchain network. Moreover, network layer overheads, due to competitive DeFi trading, may further destabilize the blockchain's consensus and occupy unnecessary chainspace, rendering transaction fees excessive, as we have witnessed on permissionless blockchains.
The purpose of this workshop is to unite researchers with deep knowledge in the many subfields of DeFi (network, consensus, game theory, programming language, economics and security), to jointly revisit their security and privacy properties. The primary aim of the workshop is to elaborate on how we can protect DeFi users from malicious trading entities and what kind of attacks those could mount. The workshop, therefore, aims to solicit novel works that refine the fundamental tensions between security, privacy, usability, economic efficiency and performance of DeFi. Second, the workshop aims to provide an academic forum for scholars to exchange, through breaks in virtual social places as well as to participate in an open panel discussion by the end of the workshop.
Topics of interest include (but are not limited to):
Any link to previously published or concurrently submitted papers by any of the writers must be clearly documented in all submissions, i.e., submissions must be original work. Your submission will be rejected if you fail to define and explain contribution overlaps. It is not allowed to send the same paper to another venue with proceedings or a journal at the same time, as this would result in a desk reject. Please contact the program committee chairs if you have any questions.
Papers on Systemization of Knowledge (SoK) are welcome. These aren't surveys of previous academic work, but rather a set of findings that have been presented informally by the open-source community or used in operational projects. SoK submissions should have an “SoK:” prefix in the title.
Papers must be provided in a way that allows for anonymous reviews: no author names or affiliations should appear on the title page, and the submission should not disclose the authors' identities in the document. When referring to your prior work, please pretend that prior work is written by someone else. Then blind the references itself if a third-person reference isn't possible (unusual). This policy is not breached if the paper is released as a technical report or in an online archive. If you have any concerns, please contact the program chairs. Papers that are not anonymized correctly should be rejected without its content being reviewed.
When submitting a research paper, the submission site will inquire about any possible conflicts of interest between the paper's authors and members of the program committee (PC). According to the following definition, it is the sole duty of all authors of a paper to recognize all possible conflict-of-interest PC participants. When one or more of the following criteria apply, a paper author has a conflict of interest with a PC member:
Whenever a PC member or co-chair is in conflict with a paper, the PC member or co-chair must not review the paper nor have access to the reviews or discussions. Any other case in which the authors believe they have a dispute or conflict with a PC member, they must proactively explain the reason to the PC chairs, who will mark the conflict if necessary. As of the submission date, papers with incorrect or incomplete conflict of interest details will be automatically refused. When one of the program co-chairs is unable to decide on a paper, the other co-chair would become responsible. When all program co-chairs are in conflict, the paper will be delegated to a neutral committee member. Co-chairs of the program are not permitted to be authors or co-authors on any submission.
Papers that perform human subject studies, evaluate data extracted from human subjects (even anonymized data), or otherwise place humans in danger or affect their financial condition must:
If the submission reveals novel bugs or vulnerabilities (for example, software flaws in a program or design flaws in a hardware system), the authors must explain the steps they have taken or intend to take to fix these flaws in detail (e.g., by disclosing vulnerabilities to the vendors). If the submission includes personally identifiable information (PII) or other forms of confidential data, the same rules apply. If a paper poses serious ethical or legal issues, it may be rejected.
We welcome papers of up to 6 pages, excluding references and bibliographies, in the double column ACM CCS format. Submissions will be judged based on the quality per page. Only PDF files will be accepted. Submissions should be anonymized. Authors of accepted papers must guarantee that one of the authors will register and present the paper at the workshop.
Papers must be submitted at https://defi21.hotcrp.com/.