Mobile Wallets Exposed to Zero-Click Attacks via Operating System Flaws
Zero-click mobile exploits bypass OS security, enabling silent, full-device compromise to exfiltrate wallet seed phrases and private keys.
AI-Generated Wallet Drainer Infiltrates Open-Source Ecosystem via Malicious NPM Package
An AI-crafted supply chain attack exploited developer trust in the NPM registry to deploy stealthy wallet-draining malware, compromising end-user funds.
Formal MEV Theory Enables Proofs of Contract Security and Value Extraction
A formal, abstract MEV model allows provable security against transaction-ordering attacks, foundational for resilient DeFi architecture.
Automated Liveness Verification Reduces Proof Burden for Distributed Protocols
LVR soundly reduces complex liveness proofs to simpler safety property checks using automated ranking function synthesis, accelerating foundational protocol verification.
Formalizing Accountable Liveness for Provable Consensus Security and Validator Punishment
Introducing Accountable Liveness and the $x$-partially-synchronous model to formally identify and punish consensus-stalling nodes, strengthening BFT security.
Validity Liquidity Fidelity Triad Formalizes Universal Smart Contract Security
This research introduces the VLF property triad to provide a foundational, generalized specification for formally verifying all smart contract security.
LLMs Automate Formal Verification Property Generation for Smart Contracts
Research introduces a Retrieval-Augmented Generation model to automate the creation of formal verification properties, dramatically lowering the security audit barrier and finding 12 zero-day vulnerabilities.
Composable Formal Verification Secures DAG Consensus Protocols Efficiently
A new compositional framework enables proof reuse across diverse DAG protocols, practically halving the effort for provable, architectural security.
LLM-driven Program Partitioning Prevents Smart Contract Data Leakage
LLM-driven program partitioning isolates sensitive contract data, mathematically preventing manipulation attacks and securing decentralized applications.
