Archives
Curvance: The Fuzzer's Edge
Discover how Trail of Bits and Curvance tackled the first invariant development project for fuzzing....
Anish Naik, mai
Secrets of Uniswap V4: A Deep Dive into Hooks Security
We'll unravel the complexities and innovations of Uniswap V4's hooks mechanism. Based on examples, I...
Damian Rusinek
Demystifying Decentralized Confidential Computing #DeCC
Discover DeCC as both a community movement and a technology for data protection, and explore the int...
Gilles Fedak, Nelly Cornejo
Getting started with Kontrol: a formal verification tool
The workshop will be a crash course on Formal Verification with Kontrol. Attendants will leverage th...
Juan Conejero, Andrei Vacaru
Is Privacy Gone? What Blockchain Data Reveals
Bubblemaps is a leading tool for blockchain investigation. In this presentation, we'll show how we'v...
Nicolas Vaiman
North Korea Wages De Facto War on Everyone Here
As the CISO of a billion-dollar web3/crypto company (Ava Labs), I serve as a defense-only military g...
J.M. Porup
How to securely configure and use Telegram & Twitter
Telegram and Twitter are the most attacked accounts in the crypto ecosystem nowadays. I will show ho...
Pablo Sabbatella
How Did I Get Scammed And What Can I Do About It?
Scams are a big issue in crypto. Often the victims don't even know or remember what they did to get ...
Rosco Kalis