
Briefing
The core research problem is the fundamental security flaw in Turing-complete blockchains where transaction fees are only collected upon block inclusion, yet significant computational work is expended on all transactions for speculative validity checks. The foundational breakthrough is the formalization of the ConditionalExhaust attack, which crafts transactions designed to fail only after consuming maximum computational resources, thereby imposing uncompensated work on validators and builders. This new theory has the single most important implication of demonstrating a critical, economically viable vector for large-scale resource exhaustion and liveness failure, forcing a re-evaluation of current transaction fee and execution layer mechanism design.

Context
The established theoretical model for blockchain security relies on the principle that transaction fees must compensate block producers for the computational and storage resources consumed. The challenge, however, is the complexity introduced by Turing-complete execution environments like the Ethereum Virtual Machine (EVM), where a transaction’s validity and resource consumption are not known a priori. The prevailing theoretical limitation is that transaction verification must occur before inclusion, allowing an adversary to exploit this pre-execution phase to impose high, uncompensated verification costs on the network’s actors, which was previously considered too expensive or technically infeasible to execute at scale.

Analysis
The paper’s core mechanism centers on a new primitive called the ConditionalExhaust transaction, which is an economically rational Denial-of-Service vector. This transaction is specifically engineered to execute a computationally heavy operation that is conditional on a state change that will ultimately cause the transaction to fail or revert. The logic is that a validator or builder must perform the full, costly execution to confirm the transaction’s invalidity, yet because the transaction is not included in the final block, the adversary pays no gas fee. This mechanism fundamentally differs from previous denial-of-service attempts by making the attack highly targeted and cost-efficient for the attacker, enabling them to decouple the imposed computational work from the fee compensation, and is further augmented by the MemPurge and GhostTX attacks targeting mempool and Proposer-Builder Separation (PBS) reputation systems.

Parameters
- Worst-Case Attack Cost ∞ $376 (The expected cost for a one-shot combined ConditionalExhaust and MemPurge attack for a non-validator adversary to burden a victim’s resources and clog their mempool, causing empty block creation.)
 - Liveness Impact ∞ Empty Blocks (The observed result of the combined attack on an Ethereum testnet, directly compromising the system’s ability to process transactions.)
 - Attack Vectors Introduced ∞ 3 (ConditionalExhaust, MemPurge, GhostTX – representing conditional resource exhaustion, mempool eviction, and PBS reputation attack, respectively.)
 

Outlook
The immediate next steps in this research area must focus on mechanism design to re-couple work and compensation, likely through pre-confirmation schemes or reputation-based staking requirements for transaction submission. Potential real-world applications in 3-5 years include the deployment of new execution environments that employ verifiable computation (e.g. ZK-proofs) to prove the cost of execution before the work is performed, or the adoption of new mempool policies that dynamically adjust priority based on predicted execution cost and historical actor behavior. This research opens new avenues for exploring generalized resource exhaustion attacks (REAs) across all Turing-complete decentralized systems, necessitating a shift toward proactive, cryptographic fee mechanisms.
