Research
Exploring the cutting edge of Web3 security, zkEVM vulnerabilities, and the evolving landscape of blockchain protocol security.
Vulnerabilities in zkEVM State Transition Proofs
An analysis of potential attack vectors in zkEVM implementations, focusing on the verification of state transition proofs and the implications for cross-chain security.
MEV Protection Strategies for ZK-Rollups
A comprehensive guide to mitigating Maximal Extractable Value (MEV) in the context of ZK-Rollups, with practical solutions for protocol designers and implementers.
Secure Bridge Architectures for Cross-Chain Communication
An evaluation of bridge security architectures with a focus on zk-based approaches, highlighting best practices and emerging patterns for secure cross-chain communication.
Formal Verification Methods for Smart Contracts
A deep dive into formal verification techniques for smart contracts, with a special focus on their application to zkEVM-compatible contracts and the unique challenges they present.
Dark Forest Game Theory in Web3 Security
An exploration of game-theoretic approaches to Web3 security, drawing parallels with the "dark forest" metaphor and its implications for security researchers and protocol designers.
Collaborate on Research
Interested in collaborating on cutting-edge Web3 security research? I'm always open to partnerships with researchers, protocols, and organizations working to advance the state of blockchain security.
Get in Touch