Formal MEV Certification Secures DeFi Protocols against Optimal Attacks
Mechanized formalization of MEV using the Lean theorem prover provides machine-checked proofs of extraction bounds, fundamentally securing DeFi protocol logic.
Adaptive Sharding and Zero-Knowledge Proofs Forge Efficient, Private Blockchain Architecture
Integrating zero-knowledge proofs with dynamic sharding fundamentally resolves the scalability-privacy tradeoff, enabling resilient, high-throughput systems.
Formal Compiler Proof Secures Distributed Cryptographic Applications Synthesis
A new compiler security proof unifies four formalisms to automatically synthesize complex, secure distributed protocols from simple sequential programs, guaranteeing end-to-end security.
Layered Aegis Protocol Secures Autonomous AI Agents with Zero-Knowledge Identity
This protocol formally integrates decentralized identity, post-quantum cryptography, and zero-knowledge proofs to enforce agent policy without compromising internal state privacy.
LLM-Driven Property Generation Automates Formal Smart Contract Verification
A Retrieval-Augmented LLM system automates the manual creation of formal contract specifications, dramatically scaling rigorous blockchain security.
Adaptive Sharding and ZKPs Solve Scalability, Security, and Privacy Tradeoffs
A novel model integrates ZKPs and adaptive sharding, formally verified by TLA+, to achieve a resilient, high-throughput, and private blockchain architecture.
Formal Rewrites Safely Scale Byzantine Fault Tolerance Protocols Fivefold
A new formal model and rewrite methodology prove that decoupling and partitioning can safely achieve a fivefold throughput increase for BFT protocols.
LLMs Automate Property Generation for Smart Contract Formal Verification
PropertyGPT leverages large language models and retrieval-augmented generation to automate the creation of formal verification properties, dramatically reducing the manual effort required for smart contract security.
Compiler Security Proof Enables Robust Distributed Cryptographic Synthesis
A novel compiler security proof unifies four theoretical models to automatically generate robust, distributed cryptographic systems from simple centralized code, fundamentally simplifying secure application development.
