Archives

Explore talks and presentations from past EthCC events

EthCC[9] thumbnail
The Unexpected

EthCC[9] Closing Ceremony

Join the EthCC team for our closing keynote and get excited for next year!

Speaker

Jerome de Tychey
EthCC[9] thumbnail
Research

Ethereum Layer Two Client Similarity: Geth

Many L2 networks on Ethereum use Geth to build blocks. We will look at the Geth codebase in order to understand changes made and how these codebases evolve. This is important to determine how updates ...

Speaker

Jan Gorzny
EthCC[9] thumbnail
Research

Rethinking PeerDAS: Transparent, Post-Quantum DAS with FRI

This talk explores using FRI as DAS in PeerDAS, how to deploying it into the consensus layer, and how multi-verifier settings can enable trusted-setup-free, post-quantum secure DAS via distributed ver...

Speaker

Stefano De Angelis
EthCC[9] thumbnail
Security

Strengthening Oracle Security in 2026: Key Principles for Builders

Provides builders with a practical framework to select, configure, and integrate oracles in DeFi, drawing on lessons learned to date. Includes a checklist, real-world examples, and key security consid...

Speaker

Bianca Buzea
EthCC[9] thumbnail
Security

Crypto Agility Framework for Ethereum (CAFE)

CAFE is a crypto-agility framework designed to help Ethereum and its Layer-2 ecosystem migrate safely to post-quantum cryptography. This presentation introduces the concept of crypto-agility as an ...

Speaker

Oleg Lodygensky
EthCC[9] thumbnail
Security

Stateless Clients: Verifying Blockchain Data Without Trust or Infrastructure

How stateless clients eliminate RPC trust, enable on-device verification, and harden wallets, dApps, and agents against silent data-manipulation attacks. A practical walkthrough of proof-based blockch...

Speaker

Jork Leonhardt
EthCC[9] thumbnail
DeFi

Rethinking AMMs: Why Today’s Liquidity Design Won't Work  at Scale

The presentation will explore how traditional AMMs are no longer fit for purpose. As DeFi scales, the inefficiencies of traditional AMM design become a ball and chain on growth, that is until now.

Speaker

Sergej Kunz
EthCC[9] thumbnail
Security

Common Vulnerabilities In Networking Protocols

Explore security flaws in networking infrastructure underlying blockchain protocols. Learn common vulnerabilities in UDP, TCP, WebSockets, HTTP, TLS, gRPC, and P2P protocols discovered during audits.

Speaker

Kirk Baird
EthCC[9] thumbnail
Security

An Offensive Security View to Cross Chain Bridge Security

A deep offensive-security walkthrough of cross-chain bridges , real attack paths, $2.5B+ bridge hacks, trust assumptions, lock-mint / burn-release models, network-layer weaknesses, and case studies sh...

Speaker

Ece Orsel
EthCC[9] thumbnail
Zero Knowledge & Cryptography

TEE as a Primitive for RWA & DeFi on Ethereum

How TEE enables confidential data processing, private tokens, and compliant off-chain workflows for RWA and DeFi on Ethereum, turning trusted execution into a core infrastructure primitive for institu...

Speaker

Tom David
EthCC[9] thumbnail
Research

The Cost of Uncertainty: Tail Latency in Ethereum’s PBS Hot Path

Latency is not only UX; it shapes behavior & market structure. I’ll map the PBS hot path & show how latency variance creates uncertainty, leading to hedging (fees, retries, exclusivity) & weaker price...

Speaker

Sajida
EthCC[9] thumbnail
Security

Security Is Infrastructure: Designing Resilient Systems for Ethereum’s Future

Ethereum’s next era requires infrastructure that can withstand failure. This talk explores how validator networks, rollups, and bridges can be designed with resilience at their core—where security isn...

Speaker

Dyma Budorin
EthCC[9] thumbnail
Security

Live State Fuzzing: Testing Live Deployments Proactively

Start fuzzing from live on chain state, not from scratch. Learn how state aware fuzzing on a local fork uncovers deep, realistic vulnerabilities in deployed smart contracts on the network of your choi...

Speaker

Jon Stephens
EthCC[9] thumbnail
DeFi

DeFi Revolutionizes TradFi with 24/7 Markets on Equities, Commodities & FX

What if you could trade Apple stock at 3am on Sunday? Or gold during Christmas? DeFi perpetuals make it possible. I'll share what we learned building Kaiko's infrastructure for truly global, always-on...

Speaker

Ambre Soubiran
EthCC[9] thumbnail
Security

AI Fuzzing: From Stochastic Chaos to Directed Precision.

Fuzzing struggles with randomness, external calls, and complex data types. This talk reveals how LLMs guide fuzzers through taint analysis, semantic understanding, and dynamic feedback—turning chaotic...

Speaker

Andy M. Lee
EthCC[9] thumbnail
Research

Optimising Block Building with Genetic Algorithms

This talk dives into the current inefficiencies of block building algorithms, and shows how better handling of transaction nonces plus genetic algorithms can help find near optimal transaction sequenc...

Speaker

Luis Correia