default search action
Stefanos Chaliasos
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j4]Thodoris Sotiropoulos, Stefanos Chaliasos, Zhendong Su:
API-Driven Program Synthesis for Testing Static Typing Implementations. Proc. ACM Program. Lang. 8(POPL): 1850-1881 (2024) - 2022
- [j3]Stefanos Chaliasos, Arthur Gervais, Benjamin Livshits:
A study of inline assembly in solidity smart contracts. Proc. ACM Program. Lang. 6(OOPSLA2): 1123-1149 (2022) - 2021
- [j2]Stefanos Chaliasos, Thodoris Sotiropoulos, Georgios-Petros Drosos, Charalambos Mitropoulos, Dimitris Mitropoulos, Diomidis Spinellis:
Well-typed programs can go wrong: a study of typing-related bugs in JVM compilers. Proc. ACM Program. Lang. 5(OOPSLA): 1-30 (2021) - 2020
- [j1]Thodoris Sotiropoulos, Stefanos Chaliasos, Dimitris Mitropoulos, Diomidis Spinellis:
A model for detecting faults in build specifications. Proc. ACM Program. Lang. 4(OOPSLA): 144:1-144:30 (2020)
Conference and Workshop Papers
- 2024
- [c11]Stefanos Chaliasos, Itamar Reif, Adrià Torralba-Agell, Jens Ernstberger, Assimakis Kattis, Benjamin Livshits:
Analyzing and Benchmarking ZK-Rollups. AFT 2024: 6:1-6:24 - [c10]Stefanos Chaliasos, Marcos Antonios Charalambous, Liyi Zhou, Rafaila Galanopoulou, Arthur Gervais, Dimitris Mitropoulos, Benjamin Livshits:
Smart Contract and DeFi Security Tools: Do They Meet the Needs of Practitioners? ICSE 2024: 60:1-60:13 - [c9]Jens Ernstberger, Stefanos Chaliasos, George Kadianakis, Sebastian Steinhorst, Philipp Jovanovic, Arthur Gervais, Benjamin Livshits, Michele Orrù:
zk-Bench: A Toolset for Comparative Evaluation and Performance Benchmarking of SNARKs. SCN (1) 2024: 46-72 - [c8]Stefanos Chaliasos, Jens Ernstberger, David Theodore, David Wong, Mohammad Jahanara, Benjamin Livshits:
SoK: What don't we know? Understanding Security Vulnerabilities in SNARKs. USENIX Security Symposium 2024 - 2023
- [c7]Liyi Zhou, Xihan Xiong, Jens Ernstberger, Stefanos Chaliasos, Zhipeng Wang, Ye Wang, Kaihua Qin, Roger Wattenhofer, Dawn Song, Arthur Gervais:
SoK: Decentralized Finance (DeFi) Attacks. SP 2023: 2444-2461 - [c6]Kaihua Qin, Stefanos Chaliasos, Liyi Zhou, Benjamin Livshits, Dawn Song, Arthur Gervais:
The Blockchain Imitation Game. USENIX Security Symposium 2023: 3961-3978 - [c5]Zhipeng Wang, Stefanos Chaliasos, Kaihua Qin, Liyi Zhou, Lifeng Gao, Pascal Berrang, Benjamin Livshits, Arthur Gervais:
On How Zero-Knowledge Proof Blockchain Mixers Improve, and Worsen User Privacy. WWW 2023: 2022-2032 - 2022
- [c4]Stefanos Chaliasos, Thodoris Sotiropoulos, Diomidis Spinellis, Arthur Gervais, Benjamin Livshits, Dimitris Mitropoulos:
Finding typing compiler bugs. PLDI 2022: 183-198 - 2021
- [c3]Thodoris Sotiropoulos, Stefanos Chaliasos, Vaggelis Atlidakis, Dimitris Mitropoulos, Diomidis Spinellis:
Replication Package for Article: Data-Oriented Differential Testing of Object-Relational Mapping Systems. ICSE (Companion Volume) 2021: 194-195 - [c2]Thodoris Sotiropoulos, Stefanos Chaliasos, Vaggelis Atlidakis, Dimitris Mitropoulos, Diomidis Spinellis:
Data-Oriented Differential Testing of Object-Relational Mapping Systems. ICSE 2021: 1535-1547 - 2019
- [c1]Stefanos Chaliasos, George Metaxopoulos, George Argyros, Dimitris Mitropoulos:
Mime Artist: Bypassing Whitelisting for the Web with JavaScript Mimicry Attacks. ESORICS (2) 2019: 565-585
Data and Artifacts
- 2021
- [d1]Stefanos Chaliasos, Thodoris Sotiropoulos, Georgios-Petros Drosos, Charalambos Mitropoulos, Dimitris Mitropoulos, Diomidis Spinellis:
Artifact: Well-Typed Programs Can Go Wrong: A Study of Typing-Related Bugs in JVM Compilers. Zenodo, 2021
Informal and Other Publications
- 2024
- [i13]Stefanos Chaliasos, Jens Ernstberger, David Theodore, David Wong, Mohammad Jahanara, Benjamin Livshits:
SoK: What don't we know? Understanding Security Vulnerabilities in SNARKs. CoRR abs/2402.15293 (2024) - [i12]Stefanos Chaliasos, Denis Firsov, Benjamin Livshits:
Towards a Formal Foundation for Blockchain Rollups. CoRR abs/2406.16219 (2024) - [i11]Jens Ernstberger, Stefanos Chaliasos, Liyi Zhou, Philipp Jovanovic, Arthur Gervais:
Do You Need a Zero Knowledge Proof? IACR Cryptol. ePrint Arch. 2024: 50 (2024) - [i10]Stefanos Chaliasos, Itamar Reif, Adrià Torralba-Agell, Jens Ernstberger, Assimakis Kattis, Benjamin Livshits:
Analyzing and Benchmarking ZK-Rollups. IACR Cryptol. ePrint Arch. 2024: 889 (2024) - 2023
- [i9]Kaihua Qin, Stefanos Chaliasos, Liyi Zhou, Benjamin Livshits, Dawn Song, Arthur Gervais:
The Blockchain Imitation Game. CoRR abs/2303.17877 (2023) - [i8]Stefanos Chaliasos, Marcos Antonios Charalambous, Liyi Zhou, Rafaila Galanopoulou, Arthur Gervais, Dimitris Mitropoulos, Ben Livshits:
Smart Contract and DeFi Security: Insights from Tool Evaluations and Practitioner Surveys. CoRR abs/2304.02981 (2023) - [i7]Thodoris Sotiropoulos, Stefanos Chaliasos, Zhendong Su:
Extended Paper: API-driven Program Synthesis for Testing Static Typing Implementations. CoRR abs/2311.04527 (2023) - [i6]Zhipeng Wang, Stefanos Chaliasos, Kaihua Qin, Liyi Zhou, Lifeng Gao, Pascal Berrang, Benjamin Livshits, Arthur Gervais:
On How Zero-Knowledge Proof Blockchain Mixers Improve, and Worsen User Privacy. IACR Cryptol. ePrint Arch. 2023: 341 (2023) - [i5]Jens Ernstberger, Stefanos Chaliasos, George Kadianakis, Sebastian Steinhorst, Philipp Jovanovic, Arthur Gervais, Benjamin Livshits, Michele Orrù:
zk-Bench: A Toolset for Comparative Evaluation and Performance Benchmarking of SNARKs. IACR Cryptol. ePrint Arch. 2023: 1503 (2023) - 2022
- [i4]Zhipeng Wang, Stefanos Chaliasos, Kaihua Qin, Liyi Zhou, Lifeng Gao, Pascal Berrang, Ben Livshits, Arthur Gervais:
On How Zero-Knowledge Proof Blockchain Mixers Improve, and Worsen User Privacy. CoRR abs/2201.09035 (2022) - [i3]Liyi Zhou, Xihan Xiong, Jens Ernstberger, Stefanos Chaliasos, Zhipeng Wang, Ye Wang, Kaihua Qin, Roger Wattenhofer, Dawn Song, Arthur Gervais:
SoK: Decentralized Finance (DeFi) Incidents. CoRR abs/2208.13035 (2022) - [i2]Liyi Zhou, Xihan Xiong, Jens Ernstberger, Stefanos Chaliasos, Zhipeng Wang, Ye Wang, Kaihua Qin, Roger Wattenhofer, Dawn Song, Arthur Gervais:
SoK: Decentralized Finance (DeFi) Attacks. IACR Cryptol. ePrint Arch. 2022: 1773 (2022) - 2020
- [i1]Thodoris Sotiropoulos, Stefanos Chaliasos, Dimitris Mitropoulos, Diomidis Spinellis:
Identifying Bugs in Make and JVM-Oriented Builds. CoRR abs/2005.06881 (2020)
Coauthor Index
aka: Ben Livshits
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-20 00:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint