
Briefing
The core research problem is the vulnerability of Turing-complete blockchains to resource exhaustion attacks where malicious transactions decouple the computational work imposed on block-proposing actors from the fees paid for that work. The foundational breakthrough is the formalization and empirical demonstration of three novel attacks ∞ ConditionalExhaust, MemPurge, and GhostTX ∞ which exploit conditional transaction logic and the fee mechanism to burden victims’ computational resources and mempools. The single most important implication is that the fundamental design of transaction fee and execution mechanisms in expressive blockchains, such as Ethereum, contains inherent features that compromise network liveness and security under specific economic conditions.

Context
Prior to this work, the primary focus of blockchain security analysis concerning transaction execution centered on gas limits and economic incentives to prevent simple denial-of-service. The prevailing theoretical limitation was the assumption that a transaction’s fee mechanism sufficiently compensated actors for the resources expended to validate and execute it, regardless of whether the transaction was ultimately included in a block. This research directly challenges that assumption by showing how conditional execution logic bypasses the intended economic equilibrium, creating an uncompensated computational burden.

Analysis
The paper introduces the concept of a “conditional resource exhaustion attack” (ConditionalExhaust) where a transaction is crafted to execute significant computation only during the validation phase by block builders and proposers, but then is designed to fail a conditional check that prevents its inclusion in a block. This failure means the transaction fee is never paid, while the computational work required to verify it is already expended. This mechanism fundamentally differs from previous denial-of-service attempts because it is stealthy, exploits the logic of the fee mechanism, and can be combined with a MemPurge attack to clog mempools and force proposers to create empty blocks, directly compromising network liveness.

Parameters
- Expected Attack Cost ∞ $376 ∞ The estimated cost for a one-shot combined ConditionalExhaust and MemPurge attack to compromise a victim’s ability to propose a block on an Ethereum testnet.
- Censoring Blocks ∞ 46% ∞ The percentage of Ethereum blocks observed in a related study that were built by censoring actors, indicating a prevalent environment that lowers the cost for a successful attack.
- Liveness Impact ∞ 85% ∞ The average delay in transaction inclusion observed for censored transactions, demonstrating how liveness is compromised by existing network conditions.

Outlook
Future research must pivot toward developing novel, more robust fee mechanisms that ensure pre-execution compensation for computational resources expended during the transaction validation and mempool processing phases. The real-world application is the design of next-generation transaction formats and execution environments, potentially within Proposer-Builder Separation (PBS) systems, that leverage zero-knowledge proofs or verifiable computation to decouple transaction validation from its execution cost, thereby preventing the uncompensated work primitive. This opens new avenues for mechanism design focused on provably fair resource allocation in Turing-complete decentralized systems.

Verdict
This research fundamentally redefines the theoretical limits of economic security in Turing-complete blockchains by exposing a critical, inherent vulnerability in their transaction fee mechanisms.
