Ethereum Protocol Evolves: Scaling, Staking, and User Experience Enhanced
Architectural refinements through Layer-2 integration and core upgrades strategically expand Ethereum's processing capacity and enhance user interaction.
Monero Suffers 18-Block Reorganization from Qubic 51% Attack
A mining pool's majority hash rate control enabled a deep blockchain reorg, invalidating transactions and undermining network finality.
Execution Tickets: Protocolizing MEV for Equitable Value Distribution
A novel ticketing mechanism aims to integrate Maximal Extractable Value directly into the Ethereum protocol, fostering fairer distribution and network robustness.
ZKPoT: Private, Efficient Consensus for Federated Learning Blockchains
A novel Zero-Knowledge Proof of Training consensus validates federated learning contributions privately, overcoming traditional blockchain inefficiencies and privacy risks.
Formalizing MEV for Blockchain Security Proofs
This research establishes a formal theory of Maximal Extractable Value, providing a foundational model for analyzing and proving blockchain security against economic attacks.
Shibarium Bridge Compromised by Flash Loan and Validator Key Exploit
A critical vulnerability in Shibarium's validator key management allowed a flash loan attack to drain $2.4 million, exposing systemic bridge risks.
Ethereum Fusaka Upgrade Boosts Scalability and Node Efficiency
The Fusaka upgrade architecturally enhances Ethereum's base layer, fundamentally improving transaction throughput and optimizing data availability for Layer 2 rollups.
Ethereum Fusaka Upgrade Enhances Data Availability and Scaling
The Fusaka upgrade, centered on PeerDAS, rearchitects data availability verification to significantly amplify Layer 2 throughput and reduce operational overhead for nodes.
Layered Blockchain Security: Classifying Cryptocurrency Attacks
This research systematically categorizes blockchain attack vectors across five infrastructure layers, offering a foundational framework to understand and mitigate evolving cryptocurrency threats.
