<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Shayan Eskandari</title>
    <description>Personal portfolio of Shayan Eskandari - Security Research, Blockchain Innovation, and Human-Centered Technologist</description>
    <link>https://shayan.es/</link>
    <atom:link href="https://shayan.es/feed.xml" rel="self" type="application/rss+xml"/>
    <pubDate>Fri, 20 Feb 2026 18:21:15 +0000</pubDate>
    <lastBuildDate>Fri, 20 Feb 2026 18:21:15 +0000</lastBuildDate>
    <generator>Jekyll v3.10.0</generator>
    <language>en-US</language>
    <managingEditor>Shayan Eskandari</managingEditor>
    <webMaster>Shayan Eskandari</webMaster>
    
    <!-- Blog Posts -->
    
      <item>
        <title>Publications</title>
        <description>Details of the Peer reviewed Publications</description>
        <content:encoded><![CDATA[<h1 id="publications">Publications</h1>

<h3 id="a-first-look-at-browser-based-cryptojacking">A first look at browser-based Cryptojacking</h3>

<p><em>IEEE SECURITY &amp; PRIVACY ON THE BLOCKCHAIN (IEEE S&amp;B) 2018 University College London (UCL), London, UK</em></p>

<blockquote>
  <p>In this paper, we examine the recent trend towards in-browser mining of cryptocurrencies; in particular, the mining of Monero through Coinhive and similar code- bases. In this model, a user visiting a website will download a JavaScript code that executes client-side in her browser, mines a cryptocurrency, typically without her consent or knowledge, and pays out the seigniorage to the website. Websites may consciously employ this as an alternative or to supplement advertisement revenue, may offer premium content in exchange for mining, or may be unwittingly serving the code as a result of a breach (in which case the seigniorage is collected by the attacker). The cryptocurrency Monero is preferred seemingly for its unfriendliness to large-scale ASIC mining that would drive browser-based efforts out of the market, as well as for its purported privacy features. In this paper, we survey this landscape, conduct some measurements to establish its prevalence and profitability, outline an ethical framework for considering whether it should be classified as an attack or business opportunity, and make suggestions for the detection, mitigation and/or prevention of browser-based mining for non- consenting users.</p>
</blockquote>

<p><a href="https://github.com/shayanb/cryptojacking-first-paper">GitHub</a>   <a href="https://arxiv.org/abs/1803.02887">Paper</a>   <a href="https://github.com/shayanb/cryptojacking-first-paper/blob/master/Presentation/Cryptojacking_IEEESB2018.pdf">Slides</a>  <br />
<strong>Press:</strong> <a href="https://www.schneier.com/blog/archives/2018/03/hijacking_compu.html">Schneier on Security</a>   <a href="https://cointelegraph.com/news/the-ethics-of-cryptojacking-rampant-malware-or-ad-free-internet">Cointelegraph</a>   <a href="https://motherboard.vice.com/en_us/article/ywqy9w/coinhive-monero-mining-cryptojacking-research?utm_source=mbtwitter">Motherboard Vice</a>   <a href="https://cointelegraph.com/news/attack-or-business-opportunity-academics-question-ethics-of-coinhive-cryptojacking">Cointelegraph</a>   <a href="https://cryptoinsider.21mil.com/evolution-of-cryptojacking/">Cryptoinsider</a>  </p>

<hr />

<h3 id="on-the-feasibility-of-decentralized-derivatives-markets">On the feasibility of decentralized derivatives markets</h3>

<p><em>FC 2017 Financial Cryptography and Data Security</em></p>

<blockquote>
  <p>In this paper, we present Velocity, a decentralized market deployed on Ethereum for trading a custom type of derivative option. To enable the smart contract to work, we also implement a price fetching tool called PriceGeth. We present this as a case study, noting challenges in development of the system that might be of independent interest to whose working on smart contract implementations. We also apply recent academic results on the security of the Solidity smart contract language in validating our code’s security. Finally, we discuss more generally the use of smart contracts in modelling financial derivatives.</p>
</blockquote>

<p><a href="https://github.com/VelocityMarket/Options-Contract">GitHub</a>   <a href="https://link.springer.com/chapter/10.1007/978-3-319-70278-0_35">Paper</a>  <br />
<strong>Press:</strong> <a href="https://www.coindesk.com/press-releases/worlds-first-peer-reviewed-smart-contract-paper/">Coindesk</a>   <a href="http://blog.bitaccess.ca/workshop-on-trusted-smart-contracts/">Bitaccess</a>   <a href="https://news.bitcoin.com/worlds-first-peer-reviewed-smart-contract-paper/">bitcoin.com</a>  </p>

<hr />

<h3 id="buy-your-coffee-with-bitcoin-real-world-deployment-of-a-bitcoin-point-of-sale-terminal">Buy your coffee with bitcoin, Real-world deployment of a bitcoin point of sale terminal</h3>

<p><em>Advanced and Trusted Computing (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld), 2016 Intl IEEE Conferences, Toulouse, France.</em></p>

<blockquote>
  <p>In this paper we discuss existing approaches for Bitcoin payments, as suitable for a small business for small-value transactions. We develop an evaluation framework utilizing security, usability, deployability criteria,, examine several existing systems, tools. Following a requirements engineering approach, we designed, implemented a new Point of Sale (PoS) system that satisfies an optimal set of criteria within our evaluation framework. Our open source system, Aunja PoS, has been deployed in a real world cafe since October 2014.</p>
</blockquote>

<p><a href="https://github.com/shayanb/Bitcoin-PoS-PHP">GitHub</a>   <a href="https://ieeexplore.ieee.org/abstract/document/7816869/">Paper</a>  </p>

<hr />

<h3 id="real-world-deployability-and-usability-of-bitcoin">Real-world Deployability and Usability of Bitcoin</h3>

<p><em>Thesis (M.A. Sc.) - Concordia University, 2015</em></p>

<blockquote>
  <p>We live in an era where Internet is one of the daily needs of human life. People use Internet banking instead of going to banks, they use email rather than postal mail.This leads to a robust digital way of living, but this also means people are trusting middle companies and third parties for their online services. The need of having a digital form of money that is not being controlled by one entity is plain to see. Bitcoin is the first and the most popular decentralized virtual currency. It is based on cryptographic functions to remove the need of a central bank and regulates the generation of new units. In this thesis, we would like to look at available tools to facilitate users in holding and using Bitcoin by a perspective on usability and security, and then evaluate the possibilities for a small business to accept Bitcoin payments. Our focus is on the usability of these tools and developing a useful framework for comparing and eval- uating future tools. While many security tools have been studied from a usability perspective, our work is the first to look at Bitcoin.</p>
</blockquote>

<p><a href="https://spectrum.library.concordia.ca/980859/">Paper</a>  </p>

<hr />

<h3 id="a-first-look-at-the-usability-of-bitcoin-key-management">A first look at the usability of bitcoin key management</h3>

<p><em>USEC 15 NDSS Workshop on Usable Security (USEC) 2015, San Diego, CA, USA, February 8, 2015, Internet Society</em></p>

<blockquote>
  <p>Bitcoin users are directly or indirectly forced to deal with public key cryptography, which has a number of security and usability challenges that differ from the password-based authentication underlying most online banking services. Users must ensure that keys are simultaneously accessible, resistant to digital theft and resilient to loss. In this paper, we contribute an evaluation framework for comparing Bitcoin key management approaches, and conduct a broad usability evaluation of six representative Bitcoin clients. We find that Bitcoin shares many of the fundamental challenges of key management known from other domains, but that Bitcoin may present a unique opportunity to rethink key management for end users.</p>
</blockquote>

<p><a href="http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/05_3_3.pdf">Paper</a>  <br />
<strong>Press:</strong> <a href="https://blog.acolyer.org/2017/02/22/a-first-look-at-the-usabilty-of-bitcoin-key-management/">The Morning Paper</a>   <a href="http://www.ventureskies.com/blog/key-management-options-for-the-protection-of-bitcoins">VentureSkies</a>   <a href="https://crypto.stanford.edu/cs251_fall15/syllabus.html">Standford Bitcoin and Cryptocurrency Technologies Syllabus</a>  </p>

<hr />

<h3 id="monitoring-system-calls-for-anomaly-detection-in-modern-operating-systems">Monitoring system calls for anomaly detection in modern operating systems</h3>

<p><em>Software Reliability Engineering Workshops (ISSREW), 2013 IEEE International Symposium</em></p>

<blockquote>
  <p>Host-based intrusion detection systems monitor systems in operation for significant deviations from normal (and healthy) behaviour. Many approaches have been proposed in the literature. Most of them, however, do not consider even the basic attack prevention mechanisms that are activated by default on today’s many operating systems. Examples of such mechanisms include Address Space Layout Randomization and Data Execution Prevention. With such security methods in place, attackers are forced to perform additional actions to circumvent them. In this research, we conjecture that some of these actions may require the use of additional system calls. If so, one can trace such attacks to discover attack patterns that can later be used to enhance the detection power of anomaly detection systems. The purpose of this short paper is to motivate the need to investigate the impact of attack on system calls while trying to overcome these prevention mechanisms.</p>
</blockquote>

<p><a href="https://github.com/shayanb/TAF">GitHub</a>   <a href="https://ieeexplore.ieee.org/abstract/document/6688856/">Paper</a>  </p>
]]></content:encoded>
        <pubDate>Sun, 10 Jun 2018 00:00:00 +0000</pubDate>
        <link>https://shayan.es/articles/2018-06/publications</link>
        <guid isPermaLink="true">https://shayan.es/articles/2018-06/publications</guid>
        <dc:creator>Shayan Eskandari</dc:creator>
        
        
        <category>paragraph</category>
        
      </item>
    
      <item>
        <title>Projects</title>
        <description>Overview of the projects</description>
        <content:encoded><![CDATA[<h1 id="projects">Projects</h1>

<h3 id="catena-blockchain-suite">Catena Blockchain Suite</h3>

<blockquote>
  <p>The Catena Blockchain Suite is an industry first product to quickly enable publishing of complex datasets onto public or private blockchains. Utilising smart contracts and hardware security modules, Catena enables a new level of data consistency and integrity. National Research Council (NRC) is using the Catena Blockchain Suite, a Canadian-made product built on the Ethereum blockchain, to publish funding and grant information in real time.</p>
</blockquote>

<p><a href="https://github.com/explorecatena">GitHub</a> <a href="https://explorecatena.com/">Homepage</a><br />
<strong>Press:</strong> <a href="https://www.nrc-cnrc.gc.ca/eng/stories/2018/blockchains.html">National Research Council Canada</a>   <a href="https://globalnews.ca/news/3977745/ethereum-blockchain-canada-nrc/">GlobalNews</a>   <a href="https://www.newswire.ca/news-releases/government-of-canada-exploring-the-potential-of-blockchain-technology-670113383.html">Newswire</a>   <a href="https://www.ethnews.com/canada-leverages-ethereum-blockchain-for-public-transparency-of-government-grant">ETHNews</a>   <a href="https://www.trustnodes.com/2018/01/21/canadian-government-launches-live-ethereum-public-blockchain-trial-government-contracts">TrustNodes</a>  </p>

<hr />

<h3 id="velocity-technology">Velocity Technology</h3>

<blockquote>
  <p>Velocity is a decentralized options platform that allows users to enter into a collar option using a smart contract on the ethereum blockchain. Velocity platform includes smart contracts responsible for the trades and PriceGeth an oracle to publish price on Ethereum blockchain at everyblock.</p>
</blockquote>

<p><a href="https://github.com/VelocityMarket">GitHub</a><br />
<strong>Press:</strong> <a href="https://steemit.com/ethereum/@blockchainbilly/velocity-the-first-open-blockchain-smart-contract-on-a-price-feed">Steemit</a>   <a href="https://www.ethnews.com/velocity-launches-demo-of-smart-contract-price-feed">ETHNews</a>   <a href="https://ibsintelligence.com/ibs-journal/ibs-news/velocity-creates-price-feed-smart-contracts-with-ethereum-tech/">IBSIntelligence</a>   <a href="https://siliconangle.com/blog/2016/10/03/velocity-debuts-demo-of-blockchain-and-ethereum-based-smart-contracts-platform/">siliconANGLE</a>   <a href="http://blocktribune.com/velocity-announces-first-blockchain-smart-contract-on-price-feeds/">BlockTribune</a>  </p>

<hr />

<h3 id="keystamp-an-open-source-proof-of-compliance-standard-on-the-blockchain">Keystamp, An open-source Proof-of-Compliance standard on the blockchain</h3>

<blockquote>
  <p>Ontario Securities Commission Hackathon 1st Prize Winner. Integrating applied cryptography and blockchain technologies in existing corporate processes and commercial relationships, such as compliance policy implementation and audit.</p>
</blockquote>

<p><a href="https://github.com/shayanb/keystamp-crypto">GitHub</a> <a href="https://github.com/existencelabs/keystamp-whitepaper">Homepage</a><br />
<strong>Press:</strong> <a href="https://betakit.com/blockchain-technology-is-king-at-the-oscs-first-fintech-hackathon/">Betakit</a>   <a href="https://www.timelydisclosure.com/2017/03/13/osc-releases-results-of-reghackto-its-first-regulatory-hackathon/">TimelyDisclosure</a>   <a href="http://www.osc.gov.on.ca/en/reghackto.htm">Ontario Securities Commission</a>   <a href="https://youtu.be/DfhJWgULsm0">Keystamp Pitch in RegHackTo</a>  </p>

<hr />

<h3 id="shir-ya-khat">Shir Ya Khat</h3>

<blockquote>
  <p>Farsi (Persian) educational podcast on Blockchain technologies and cryptocurrencies</p>
</blockquote>

<p><a href="http://shiryakhat.net">Homepage</a><br />
<strong>Press:</strong> <a href="https://coiniran.com/%D8%AA%D9%88%DA%A9%D9%86-%D8%A2%D9%84%D8%AA%DA%A9%D9%88%DB%8C%D9%86-%D9%85%D8%A7%D9%87%DB%8C%D8%AA-%D8%A8%D9%84%D8%A7%DA%A9%DA%86%DB%8C%D9%86/">CoinIran</a>  </p>

<hr />
]]></content:encoded>
        <pubDate>Sun, 10 Jun 2018 00:00:00 +0000</pubDate>
        <link>https://shayan.es/articles/2018-06/projects</link>
        <guid isPermaLink="true">https://shayan.es/articles/2018-06/projects</guid>
        <dc:creator>Shayan Eskandari</dc:creator>
        
        
      </item>
    
      <item>
        <title>Lectures and Panels</title>
        <description>Details of the talks and Panels</description>
        <content:encoded><![CDATA[<h1 id="lectures-and-panels">Lectures and Panels</h1>

<h3 id="secrev---the-security-revolution-from-montreal">SecRev - The Security Revolution from Montreal</h3>

<p><em>Montreal, Canada.</em></p>

<blockquote>
  <p>The Cybersecurity Revolution is an event conceived to openly encourage sharing and interaction among the wider cybersecurity research community. It is an event focused around research, education, science and learning and not the furthering of commercial interests. On this talk I presented my work on the first look at browser-based Cryptojacking.</p>
</blockquote>

<p><a href="https://secrev.dfir.science/">Website</a>   <a href="https://arxiv.org/abs/1803.02887">Paper</a>   <a href="https://github.com/shayanb/cryptojacking-first-paper/blob/master/Presentation/Cryptojacking_IEEESB2018.pdf">Slides</a>   <a href="https://youtu.be/R7sUoOV8TAg">Video</a>  </p>

<hr />

<h3 id="2nd-annual-blockchain-bootcamp">2nd Annual Blockchain Bootcamp</h3>

<p><em>Blockhouse (Catallaxy), Montreal, Canada.</em></p>

<blockquote>
  <p>Our blockchain bootcamp is an introductory level workshop that will teach you the main building blocks of blockchain, with hands on experience with timestamping and associated use cases.</p>
</blockquote>

<hr />

<h3 id="a-first-look-at-browser-based-cryptojacking">A first look at browser-based Cryptojacking</h3>

<p><em>IEEE SECURITY &amp; PRIVACY ON THE BLOCKCHAIN (IEEE S&amp;B) 2018 University College London (UCL), London, UK</em></p>

<blockquote>
  <p>IEEE SECURITY &amp; PRIVACY ON THE BLOCKCHAIN (IEEE S&amp;B) - Paper Presentation</p>
</blockquote>

<p><a href="https://github.com/shayanb/cryptojacking-first-paper">GitHub</a>   <a href="https://arxiv.org/abs/1803.02887">Paper</a>   <a href="https://github.com/shayanb/cryptojacking-first-paper/blob/master/Presentation/Cryptojacking_IEEESB2018.pdf">Slides</a>  </p>

<hr />

<h3 id="blockchain-fundamentals">Blockchain Fundamentals</h3>

<p><em>Concordia University, Montreal, Canada</em></p>

<blockquote>
  <p>Covering all of the basic fundamentals of blockchain and about the impact that this innovative technology will have on society.</p>
</blockquote>

<p><a href="http://www.concordia.ca/cuevents/main/2018/02/10/lecture-blockchain-fundamentals.html">Website</a>   <a href="https://www.icloud.com/keynote/0uzKpKrRRJ0HlBg7Sx_GZPA0w#Concordia_feb102018_fundamentals_of_blockchain">Slides</a>  </p>

<hr />

<h3 id="wth-is-bitcoin">WTH is Bitcoin?</h3>

<p><em>Technologies, World and Societies, School of Sociological and Anthropological Studies, University of Ottawa, Canada</em></p>

<blockquote>
  <p>A thorugh historical view of where Bitcoin and Blockchain technology came from and how it evolved to be what we know now.</p>
</blockquote>

<p><a href="https://goo.gl/6bcbgR">Slides</a>  </p>

<hr />

<h3 id="bootstrap-ethereum-development">Bootstrap Ethereum Development</h3>

<p><em>ETHWaterloo, Waterloo, Canada</em></p>

<blockquote>
  <p>A walkthrough on Ethereum development stack, describing how EVM and Full nodes function. Teaching on what development environment to work on for Hackthons and faster deployment</p>
</blockquote>

<p><a href="https://ethwaterloo.com/">Website</a>   <a href="https://docs.google.com/presentation/d/1jSuV5QYuflugM38ibvZjFW94ipj0FbF-VkIHWBNgRm8/edit#slide=id.g35f391192_00">Slides</a>  </p>

<hr />
]]></content:encoded>
        <pubDate>Sun, 10 Jun 2018 00:00:00 +0000</pubDate>
        <link>https://shayan.es/articles/2018-06/lectures</link>
        <guid isPermaLink="true">https://shayan.es/articles/2018-06/lectures</guid>
        <dc:creator>Shayan Eskandari</dc:creator>
        
        
        <category>paragraph</category>
        
      </item>
    

    <!-- Key Portfolio Sections -->
    <item>
      <title>About - Professional Background</title>
      <description>Senior Security Engineer and Blockchain Researcher with PhD in Information Systems Engineering from Concordia University. Expert in smart contract security and DeFi auditing.</description>
      <link>https://shayan.es/about/</link>
      <guid isPermaLink="true">https://shayan.es/about/</guid>
      <pubDate>Fri, 20 Feb 2026 18:21:15 +0000</pubDate>
      <dc:creator>Shayan Eskandari</dc:creator>
      <category>professional</category>
      <category>blockchain security</category>
    </item>

    <item>
      <title>Security Audits Portfolio</title>
      <description>Portfolio of 50+ smart contract security audits for major DeFi protocols including ENS, Balancer, Gitcoin, Aztec Protocol, and other leading Web3 projects.</description>
      <link>https://shayan.es/audits/</link>
      <guid isPermaLink="true">https://shayan.es/audits/</guid>
      <pubDate>Fri, 20 Feb 2026 18:21:15 +0000</pubDate>
      <dc:creator>Shayan Eskandari</dc:creator>
      <category>security audits</category>
      <category>defi</category>
      <category>smart contracts</category>
    </item>

    <item>
      <title>Research Publications</title>
      <description>Academic publications in blockchain security, including papers on smart contract auditing, oracle manipulation, front-running attacks, and cryptojacking analysis published in top-tier venues.</description>
      <link>https://shayan.es/#publications</link>
      <guid isPermaLink="true">https://shayan.es/research/</guid>
      <pubDate>Fri, 20 Feb 2026 18:21:15 +0000</pubDate>
      <dc:creator>Shayan Eskandari</dc:creator>
      <category>research</category>
      <category>publications</category>
      <category>blockchain security</category>
    </item>

    <item>
      <title>Open Source Projects</title>
      <description>Open-source tools and technical projects: MoaV (multi-protocol anti-censorship stack), retroMaid (ROM metadata scraper), AiVS (AI Agents + EigenLayer AVS), Legions (EVM node security toolkit), Catena Blockchain Suite (Government of Canada blockchain pilot), LibSubmarine (front-running protection), Smart Contract VulnDB, DlAGRAMS (blockchain icon library), Velocity (decentralized options), Keystamp (proof-of-compliance, OSC Hackathon winner), Bitaccess Enterprise Wallet, and Bitcoin Point of Sale.</description>
      <link>https://shayan.es/projects/</link>
      <guid isPermaLink="true">https://shayan.es/projects/</guid>
      <pubDate>Fri, 20 Feb 2026 18:21:15 +0000</pubDate>
      <dc:creator>Shayan Eskandari</dc:creator>
      <category>projects</category>
      <category>open source</category>
      <category>security tools</category>
      <category>anti censorship</category>
      <category>blockchain</category>
    </item>

    <item>
      <title>Technical Projects and Applications</title>
      <description>Software applications and tools: Nedagram (text-over-sound communication), PadSnap (image padding tool), ethduties (Ethereum validator duties tracker), EtherTrip (blockchain visualizer), FocalFlow (animation creator), Ethereum Validator Calculator (EIP-7251 staking rewards), Life Timeline Creator, ShirYaKhat (Persian blockchain podcast), Pangana (Web3 security consulting), The Creed (Web3 security DAO), Auctionify (decentralized auction platform), and Tehran Traffic (iOS traffic app).</description>
      <link>https://shayan.es/apps/</link>
      <guid isPermaLink="true">https://shayan.es/apps/</guid>
      <pubDate>Fri, 20 Feb 2026 18:21:15 +0000</pubDate>
      <dc:creator>Shayan Eskandari</dc:creator>
      <category>projects</category>
      <category>blockchain</category>
      <category>security tools</category>
    </item>

  </channel>
</rss>