I’ve been lucky to attend a few conferences over the start of August and I wanted to write some notes over my takeaways.
While this might not be the full coverage of the events, if there’s any interest in some of these topics, I would highly recommend taking a look at the YouTube videos of the recordings, or, reading the documentation/papers.
I had the chance to attend 3 main conferences, and a few side events:
- Science of Blockchain Conference (SBC) 2025: https://www.sbc-conference.com/2025/
- Frontiers by Paradigm: https://frontiers.paradigm.xyz/
- Noconsensus (side conference)
- EthGlobal Pragma NYC: https://ethglobal.com/events/pragma-newyork2025
On to the content!
SBC 2025
Blockchain Address Poisoning
- Authors: Taro Tsuchiya, Jin-Dong Dong (Carnegie Mellon University); Kyle Soska (Independent); Nicolas Christin (Carnegie Mellon University)
- paper | video
Notes:
- Scenario:
- User A wants to send funds to User B.
- User A sends a small test transaction to User B’s address to check that it is correct.
- Mallory (Adversary) sends a small test transaction to User A with a ‘similar’ address (e.g. starting and ending in the same characters) to confuse the user.
- A smarter strategy uses a smart contract with a token named similar to the original one, where the adversary imitates a transfer from User A to their adversarial address to make it seem like User A sent the funds.
- User A sends funds to Mallory’s address since they see and use the latest address on their transaction list.
- Adversary sends money from ‘similar’ addresses (e.g. starting and ending in same characters) very soon after the user sends a test transaction. The aim is to confuse people.
- What mitigations are there?
- Better UI
- Warnings on the wallets, similarity scores.
- Have safeguards that require checks.
- Naming (e.g. ENS, naming services)
- Protocol level human readable names.
- Delay on wallet creations for adversaries to farm addresses.
- Remove the 0-value transfer on smart contracts.
- A pass/deny list for the addresses.
- Better UI
- Created a real-time site: Toxin Tagger.
Measuring and Attacking Ethereum
- Authors: Chenyu Li (Institute of Information Engineering, Chinese Academy of Sciences; University of Chinese Academy of Sciences); Ren Zhang (Cryptape and Nervos); Xiaorui Gong (Institute of Information Engineering, Chinese Academy of Sciences; University of Chinese Academy of Sciences)
- paper | video
Notes:
- Typical P2P networks are only for 1 purpose/service (e.g. bittorrent)
- Ethereum’s network has over 7000 services.
- Testnets, rollups, applications piggy backing off the network, etc.
- Very noisy
- How is this possible?
- Started with DISCv4 - a
networkIDwas built in to the protocol.- It meant that other networks were already accounted for.
- Deliberate design choice and has carried over to DISCv5.
- Started with DISCv4 - a
- What existing studies say?
- IMC 2018: very noisy network, jumble of clients and services.
- 2025: many services, inefficient network.
- Benefits
- Code Reuse
- Reduce deployment requirements.
- Node discovery is better (wider range of nodes operating)
- Large pool
- Technical Roadmap of Ethereum’s Global Network (EGN) vs Dedicated
- EGN:
- DISCv4: no priority for same service peers.
- DISCv5: added service advertisements.
- 91% of nodes don’t advertise a service ID or client ID.
- Still doesn’t have a deployment of same-service priority as described in the writing.
- Under 20% of peers are same-service peers.
- Efficiency of Discovery:
- ~10k handshakes per successful connection
- A dedicated network usually has 96% efficiency.
- Bitcoin (for example) has 4 handshakes per connection.
- EGN:
- Experiment with DISCv5
- 1 million+
findnodemessages; 100k+ handshakes, 0 connections. - 2/3 always online nodes = 81% of the DHT unresponsive.
- Possibly due to full connection tables.
- 1 million+
- DHT pollution:
- 300 notes, sending
ping, or respondingfindnode. - dedicated network is stronger, less attack surface.
- 300 notes, sending
- Results from experiments:
- \(1/2\) public nodes have under 5% same-service peers.
- \(> 3/4\) handshakes are with nodes of different/incorrect service.
- DISCv5 does not fully implement what it designed (yet).
- Blended nature of the network is a vulnerability.
- The large network is good, but must be robust and available to make use of if.
- Being driven by convenience is not a good argument.
- Comes with big cost and drawbacks.
- Makes it a noisy network.
- Takeaway:
- Service-specific networks are far more efficient for forming peers with relevant information.
- Look at the network topologies, what can be done to optimize the service peer routing?
De-anonymizing Ethereum Validators: The P2P Network Has a Privacy Issue
- Authors: Lioba Heimbach, Yann Vonlanthen (ETH Zurich); Juan Villacis (University of Bern); Lucianna Kiffer (IMDEA Networks); Roger Wattenhofer (ETH Zurich)
- paper | video
Notes: (aside: I will not go into detail, since there is still a disclosed, but open way to de-anonymize the validators using statistical analysis provided in this paper.)
- Why does anonymity matter?
- DoS vector to make validators miss proposals/attestations.
- If ahead of time-known, can become a target or censored.
- Ethereum Subnets
- Way to make attestations more efficiently propagated through the network.
- Validators maintain a per in various subnets, at least a peer in all subnets.
- Aggregator has the job of aggregating all the attestations for that subnet, and sending them outward.
- Peer privacy:
- Node can see IP of direct peer (and the subnets)
- They’re not supposed to know if they are validators, or just nodes in the network.
- Methodology for de-anonymization:
- Announce all the subnets
- Whenever a peer sends attestations, look at which subnets they are sending.
- Can use inference.
- Validator distribution
- \(80%\) peers have \(< 100\) validators.
- One node has \(19K\) validators!
- Staking pools on average have more, often \(1000\) nodes configured.
- Node operators have multiple (overlapping) pools.
- \(90%\) from cloud (\(20%\) AWS; OVH, GCloud)
- Mitigations?
- Anonymity
- Use separate nodes (one for attesting, one for proposing)
- Try to gossip all together (private peer agreement, all subnets)
- DoS
- Network defence.
- Distributed validators
- Secret leader elections to hinder who might be rotating in future.
- Anonymity
- Takeaways:
- Care on messaging patterns and what should be kept private / secure.
- Gossip should be carefully looked at, gossiping everything vs optimizations.
- Leader election strategies and public information.
User Perceptions of Security Auditing
- Authors: Molly Zhuangtong huang, Rui Jiang (University of Macau); Tanusree Sharma (Pennsylvania State University); Kanye Ye Wang (University of Macau)
- paper | video
Notes:
- Web3 security deserves much more attention.
- Insufficient comprehensiveness for everyday users.
- User’s usually don’t see the reports (unless they are interested and go digging)
- Information in the report is not detailed enough to give in-depth information.
- Usually they are oversimplified.
- Users can’t tell what the problems actually were caused by.
- Sentiment analysis:
- Diverse, but signs are skewing to negative sentiment of security review reports.
- Questioning the independence of the audit firms.
- And how impartial they are to the product.
- Lack of reputation amongst many of the audit firms.
- Cost of an audit
- Usually no public pricing information (and now way to find except for a quote)
- Acknowledge that different projects are different, often workload-dependent cost model.
- Impact of a security audit:
- Users usually have a brief browse through.
- They don’t read the full report, only want to know what went wrong.
- Challenges of users to understand the tech.
- Big reports and careful writeups help with their understanding.
- Implications:
- Blog, Discord, Knowledge sharing channels are a big help.
- Audit firms should be presenting vulnerabilities and sharing the knowledge and deep look into them.
- Takeaways:
- End-users don’t have much care about the full report, but they want to know the depth (as well as explained well).
- Most of the reports don’t go into detail about what happened, some users want to have a deep dive.
- Security firms are not openly public, they don’t post their information and could be beneficial to share more and have more knowledge sharing channels.
Accountable Liveness
- Authors: Andrew Lewis-Pye (London School of Economics); Joachim Neu (a16z Crypto Research); Tim Roughgarden (Columbia University & a16z crypto); Luca Zanolini (Ethereum Foundation)
- paper | video
Notes:
- Accountable safety is possible - can identify the byzantine actors in the systems.
- Accountable liveness, the goal is to also identify the byzantine actors in the system, but need to distinguish from natural faults that occur.
- Most safety have a safety proof:
- Honest nodes are not accused because the proofs show their innocence.
- Slashing/punishment is left for the protocol to define.
- Liveness: transaction remains unconfirmed for a longer time than necessary.
- Use logs of messages.
- Find the votes for nodes that are omitting votes, etc.
- Prove absence of expected messages.
- Network Delay?
- Byzantine adversary can frame another node.
- Theorem:
- Only applicable to networks where they are more synchonous than asynchronous.
- Not even partial-synchrony works.
- Introduce x-partial-sync:
- GST for partial sync.
- Introduce window and views of synchronicity.
- Break up the time into chunks (windows), with smaller slices (views);
- Each view can be synchronous or asynchronous.
- Main result:
- Augment protocols so that \(f < \frac{n}{2}\); x-partial-sync: \(x < \frac{1}{2}\)
- \(x\) is the number of synchronous views in a window.
- Augment protocols so that \(f < \frac{n}{2}\); x-partial-sync: \(x < \frac{1}{2}\)
- Blame accounting:
qblamesr(e.g. nodes will blame other nodes of not voting if they don’t get the messages)- Additional messaging on rounds, having a blame step
- In synchronous views, the honest nodes will not report other honest nodes.
- Byzantine nodes will always be identified
- Because honest nodes will report them in both sync and async views; whereas honest nodes will only be reported in async rounds at most.
Mysticeti: Reaching the Latency Limits with Uncertified DAGs
- Authors: Kushal Babel (Cornell Tech ; IC3); Andrey Chursin (Mysten Labs); George Danezis (Mysten Labs & University College London (UCL)); Anastasios Kichidi, Lefteris Kokoris-Kogias, Arun Koshy (Mysten Labs); Alberto Sonnino (Mysten Labs & University College London (UCL)); Mingwei Tian (Mysten Labs)
- paper | video
Notes:
- Bandwidth vs Latency Delay
- Not all messages are equal (propose messages, data messages, etc.)
- Primary node broadcasts to all
- Gossip / subset replications.
- Censorship is possible pre-view change.
- DAG (DAGRider)
- concurrent proposal; 3 message delay.
- Block (round number, payload, previous blocks, vote signatures)
- Links to 2f+1
- Mysticeti
- Mysticeti-C (upgrade, happy-path)
- Accept votes are included by all other blocks.
- Mysticeti Pipelined
- Slots can be leader elections
- Results: 50 nodes has 400K+ TPS (~500K)
- SUI mainnet changed from Narwhal and Bullshark to Mysticeti.
- Mysticeti-C (upgrade, happy-path)
- Real world
- If
Alinks toB;Amust be in the DAG beforeB.- If
Awas slow,Bis slowed. - Garbage collection added to blocks, better broadcast.
- Score-based block
- If
- If
Permissionless blockchains from Physical Resources
- Authors: Mirza Ahad Baig, Christoph U. Günther, Krzysztof Pietrzak (Institute of Science and Technology Austria)
- paper | video
Notes:
- Two papers previously:
- 2025/1410 : Nakamoto consensus from multiple resources
- 2025/… : On the (in)security of Proof of Space
- Can’t get Nakamoto-like consensus from storage alone.
- Fully permissionless: protocol doesn’t know of parties.
- Physical Resources:
- Work, space, velocity
- Proof of Space:
- Initialization: store
pon disk; challengecon disk with proof - Proof is slow because they have to go through
nparts, but the challengecis easy. - Creating proofs is slow, proving should be quick.
- Initialization: store
- Verifiable Delay:
- Take some input
xand someTsteps; should outputywith a proof \(\pi\). - The proof should verify that
Tsequential steps were used to produceyfromx.
- Take some input
Categorising:
- Quantitative: Work, Space
- Qualitative: Velocity
- Timed: Work, Velocity (x/second, e.g. hashes per second)
Chia Network: honest * VDF > adversary * VDF
Secure Resources: investment goes into weight.