scispace - formally typeset
M

Muoi Tran

Researcher at National University of Singapore

Publications -  10
Citations -  165

Muoi Tran is an academic researcher from National University of Singapore. The author has contributed to research in topics: Verifiable secret sharing & Routing protocol. The author has an hindex of 6, co-authored 10 publications receiving 119 citations.

Papers
More filters
Proceedings ArticleDOI

A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network

TL;DR: The EREBUS attack as discussed by the authors makes the adversary AS a natural man-in-the-middle network of all the peer connections of one or more targeted Bitcoin nodes by patiently influencing the targeted nodes' peering decision.
Proceedings ArticleDOI

On the Feasibility of Rerouting-Based DDoS Defenses

TL;DR: An in-depth analysis of the (in)feasibility of the RAC defense points out that its rerouting approach, though intriguing, cannot possibly solve the challenging flooding problem and agrees with the conclusion of the major literature about end-to-end guarantees.
Proceedings ArticleDOI

Obscuro: A Bitcoin Mixer using Trusted Execution Environments

TL;DR: Oblscuro as mentioned in this paper is a highly efficient and secure Bitcoin mixer that utilizes trusted execution environments (TEEs) to ensure the correct mixing operations and the protection of sensitive data (i.e., private keys and mixing logs).
Journal Article

Obscuro: A Bitcoin Mixer using Trusted Execution Environments.

TL;DR: Oblscuro as discussed by the authors is a highly efficient and secure Bitcoin mixer that utilizes trusted execution environments (TEEs) to ensure the correct mixing operations and the protection of sensitive data (i.e., private keys and mixing logs).
Proceedings ArticleDOI

Practical Verifiable In-network Filtering for DDoS Defense

TL;DR: In this article, the authors proposed a verifiable in-network filtering system, called VIF, that exploits emerging hardware-based trusted execution environments (TEEs) and offers filtering verifiability to DDoS victims and neighboring networks.