Formalizing MEV with Adversarial Knowledge Enables Provable Security
This abstract model defines Maximal Extractable Value via adversarial knowledge, providing the foundational theory for provable security against economic attacks.
Differential Privacy Enables Provably Fair Transaction Ordering
Establishing a formal link between Differential Privacy and State Machine Replication's equal opportunity property quantifiably eliminates algorithmic bias in ordering.
Compositional Formal Verification Secures Complex DAG Consensus Protocols
This framework modularizes DAG consensus proofs into reusable components, dramatically reducing verification effort and ensuring robust protocol safety.
LLMs Automate Property Generation, Resolving the Smart Contract Verification Bottleneck
A retrieval-augmented LLM framework automatically generates formal properties, drastically improving the scalability and security assurance of smart contracts.
Formally Synthesizing Secure Distributed Systems from Centralized Programs
This research unifies simulation-based security with compiler techniques to automatically generate provably secure distributed cryptographic applications.
DeepSEA System: Foundational Verification for Smart Contracts
A new system provides end-to-end formal verification for smart contracts by linking a verified language and compiler to operational semantics.
Automated Formal Verification Revolutionizes Cardano Smart Contract Development
This innovation introduces automated formal verification for Cardano smart contracts, leveraging Lean4 and SMT solvers to ensure correctness without manual proofs, enhancing development efficiency.
Language Design Impacts Smart Contract Formal Verification Efficacy
This research comparatively analyzes formal verification in Solidity and Move, revealing how inherent language design choices fundamentally dictate verifiability and security outcomes.
Cryptographic Analysis of Blockchain Security Vulnerabilities and Defenses
This review systematically maps cryptographic defenses against blockchain attack vectors across all architectural layers, enhancing system resilience.
