Odin.fun Loses $7m to Liquidity Pool Manipulation Exploit
A critical AMM design flaw, lacking external price validation, enabled attackers to drain substantial Bitcoin via artificial token inflation.
Formalizing MEV: Rigorous Model for Provably Secure Blockchain Architectures
This research introduces a formal, abstract model for Maximal Extractable Value, enabling systematic analysis and the development of provably secure blockchain protocols.
Simulating Ethereum Data Availability Sampling for Scalability Optimization
A novel simulation study dissects Data Availability Sampling parameters, offering critical insights to enhance blockchain scalability and data integrity for decentralized networks.
Mechanism Design Enhances Blockchain Consensus Truthfulness and Scalability
This research introduces novel mechanism design principles to fortify blockchain consensus, ensuring truthful block proposals and mitigating fork-related coordination failures.
Formalizing MEV: Rigorous Model for Blockchain Economic Security
This research establishes a foundational theory of Maximal Extractable Value, enabling provable security against economic attacks in decentralized systems.
Algebraic Verifiable Delay Functions Vulnerable to Parallel Computation
Cryptanalysis reveals fundamental flaws in algebraic Verifiable Delay Functions, demonstrating parallel computation can bypass intended sequential delays, necessitating new secure designs.
New Gold Protocol Suffers $2m Flash Loan Oracle Manipulation Exploit
A critical flaw in the protocol's price oracle and transfer logic enabled a flash loan attack, compromising $2 million and devaluing the NGP token by 88%.
Formalizing Economic Security for Permissionless Consensus Protocols with Slashing
This research formalizes economic security for permissionless consensus, demonstrating how slashing mechanisms in Proof-of-Stake can enhance network resilience.
Angelfish Consensus: Optimizing Throughput and Latency in BFT Protocols
A novel hybrid consensus protocol, Angelfish, dynamically balances leader-based and DAG-based approaches, achieving optimal throughput and latency for Byzantine fault-tolerant systems.
