Archives
Enough Hacks: A Framework for Building Secure Protocols
Security comes first. Developers must include the essential; externalise the rest. I will show the b...
Merlin Egalite
Formal Verification of Smart Contracts in Cairo
Delve into formal verification of smart contracts in Cairo language, highlighting its potential amid...
Đorđe Mijović
Ensuring the Sanity of Deployed Smart Contracts
Vulnerabilities like the Nomad bridge hack have been caused by issues in the deployment process. We ...
Matthias Egli
On the importance of the Security Alliance
The Security Alliance (SEAL) is a cross-industry, non-profit organisation, established under the lea...
Mehdi Zerouali
Embracing a Culture of Continuous Security
This talk emphasizes the importance of integrating security as a fundamental component of Web3 devel...
Andrew Wesie
Developing Secure Multi-Provers with SGX
Developing secure multi-provers is pivotal for a network’s decentralization efforts. We will discuss...
Porter Adams
Preventing Unknown Attacks in DeFi
We describe how Morpho, EigenLayer, and Safe secured their smart contracts against potentially unkno...
Mooly Sagiv
A Gentle Introduction To End To End Encrypted Messaging
End-to-end encryption is intimidating...but it doesn't have to be. This talk will go through the bas...
Nick Molnar