Formalizing MEV: A New Model for Provably Secure Blockchains
This research formalizes Maximal Extractable Value, providing a mathematical framework to analyze and mitigate economic attacks in decentralized systems.
Formalizing MEV Theory to Secure Decentralized Blockchain Architectures
This research establishes a rigorous, abstract model for Maximal Extractable Value, enabling formal security proofs against its detrimental impact on blockchain integrity.
Harmony Cross-Chain Bridge Private Keys Compromised, Millions in ETH Drained
A critical compromise of private keys controlling a cross-chain bridge exposes systemic vulnerabilities in multi-chain asset transfer security, risking significant user capital.
Onyx Protocol NFT Liquidation Contract Exploited, $3.8 Million Drained
A critical vulnerability within Onyx Protocol's NFT Liquidation contract allowed an attacker to drain $3.8 million in vUSD stablecoins.
Mechanism Design Enhances Blockchain Consensus Truthfulness and Scalability
This research introduces novel mechanism design principles to fortify blockchain consensus, ensuring truthful block proposals and mitigating fork-related coordination failures.
Quantum Computing Secures Blockchain Consensus, Reducing Energy and Enhancing Security
Integrating quantum supremacy into blockchain mining fundamentally alters consensus, promising quantum-safe security and reduced energy consumption.
Social Paradigm Detection Bolsters Byzantine Fault Tolerance in Blockchains
A novel social-inspired mechanism detects Byzantine nodes with high confidence, enhancing blockchain resilience beyond static fault assumptions.
Formalizing MEV: Rigorous Model for Blockchain Economic Security
This research establishes a foundational theory of Maximal Extractable Value, enabling provable security against economic attacks in decentralized systems.
Algebraic Verifiable Delay Functions Vulnerable to Parallel Computation
Cryptanalysis reveals fundamental flaws in algebraic Verifiable Delay Functions, demonstrating parallel computation can bypass intended sequential delays, necessitating new secure designs.
