Hyperdrive Suffers Account Compromise, $773,000 Drained from thBILL Markets
A compromise within Hyperdrive's thBILL markets enabled unauthorized asset exfiltration, underscoring critical account security vulnerabilities.
Verifiable Federated Learning Aggregation with Zero-Knowledge Proofs
This research introduces zkFL, a novel framework leveraging zero-knowledge proofs and blockchain to secure federated learning against malicious aggregators, fostering trust in collaborative AI systems.
Cryptographic Analysis Fortifies Blockchain against Evolving Attack Vectors
This review systematically maps cryptographic vulnerabilities across blockchain layers, offering targeted defense strategies to secure decentralized systems.
Formal Security Comparison of Proof-of-Work and Proof-of-Stake Consensus Mechanisms
This systematic review formally compares PoW and PoS security properties, revealing PoW's stronger guarantees and PoS's reliance on hybrid designs for comparable safety.
Seedify Bridge Exploited for $1.2 Million through Unauthorized Token Minting
A critical flaw in Seedify's cross-chain bridge allowed unauthorized token minting, leading to a $1.2 million loss and significant market instability.
Griffin AI Suffers $3 Million Cross-Chain Token Minting Exploit
A critical LayerZero misconfiguration allowed an attacker to mint and bridge fake tokens, leading to a $3 million loss and severe token devaluation.
Incentivizing Censorship Resistance in Multi-Proposer Blockchain Fee Mechanisms
This research designs transaction fee mechanisms to robustly prevent censorship and bribery in multi-proposer blockchain protocols, enhancing network integrity.
Malicious Rust Crates Hijack Developer Keys for Solana and Ethereum Wallets
A sophisticated supply chain attack, leveraging typosquatting in Rust's package registry, compromises developer environments to exfiltrate critical blockchain private keys.
Formalizing MEV for Provably Secure Blockchain Architectures
A new abstract model for Maximal Extractable Value provides a rigorous framework for security proofs, fundamentally securing decentralized systems.
