Over one-third of even the latest Ethereum smart contracts consist mostly of junk!
We were commissioned by the Ethereum Foundation to study the impact of a new gas cost model, based on Verkle tree access costs.
We were commissioned by the Ethereum Foundation to do a study of the impact of EIP-3074 (AUTH and AUTHCALL) on existing contracts.
Received bug bounties from Vesper Finance and BT Finance for vulnerability disclosures. Both vulnerabilities follow the same pattern and we study when it can be exploited.
We reported a critical vulnerability to Primitive Finance, leading to the generous R bounty and an article on the war room operation.
A vulnerable bot was controlling some $80K. We killed it, saving the funds of its owner(s).
Reported critical vulnerability to Dinngo/DeFlast team leading to their rescue of all threatened funds. The vulnerable contract had no public source.
Reported critical vulnerability to DeFi Saver team which would have allowed hackers to steal over $3.5m. Vulnerability was originally flagged by one of our tools.
Technical paper on our analysis technology for tainted contract guards. Interesting observations on symbolic execution vs. static analysis approaches.
Research article on our analysis technology, especially the modeling of "memory" in EVM smart contracts.