![EthCC[9] thumbnail](/_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fethcc9.e0a0ce60.jpeg&w=3840&q=75)
EthCC[9] Closing Ceremony
Join the EthCC team for our closing keynote and get excited for next year!
Speaker
![EthCC[9] thumbnail](/_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fethcc9.e0a0ce60.jpeg&w=3840&q=75)
Ethereum Layer Two Client Similarity: Geth
Many L2 networks on Ethereum use Geth to build blocks. We will look at the Geth codebase in order to understand changes made and how these codebases evolve. This is important to determine how updates ...
Speaker
![EthCC[9] thumbnail](/_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fethcc9.e0a0ce60.jpeg&w=3840&q=75)
Rethinking PeerDAS: Transparent, Post-Quantum DAS with FRI
This talk explores using FRI as DAS in PeerDAS, how to deploying it into the consensus layer, and how multi-verifier settings can enable trusted-setup-free, post-quantum secure DAS via distributed ver...
Speaker
![EthCC[9] thumbnail](/_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fethcc9.e0a0ce60.jpeg&w=3840&q=75)
Strengthening Oracle Security in 2026: Key Principles for Builders
Provides builders with a practical framework to select, configure, and integrate oracles in DeFi, drawing on lessons learned to date. Includes a checklist, real-world examples, and key security consid...
Speaker
![EthCC[9] thumbnail](/_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fethcc9.e0a0ce60.jpeg&w=3840&q=75)
Crypto Agility Framework for Ethereum (CAFE)
CAFE is a crypto-agility framework designed to help Ethereum and its Layer-2 ecosystem migrate safely to post-quantum cryptography. This presentation introduces the concept of crypto-agility as an ...
Speaker
![EthCC[9] thumbnail](/_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fethcc9.e0a0ce60.jpeg&w=3840&q=75)
Stateless Clients: Verifying Blockchain Data Without Trust or Infrastructure
How stateless clients eliminate RPC trust, enable on-device verification, and harden wallets, dApps, and agents against silent data-manipulation attacks. A practical walkthrough of proof-based blockch...
Speaker
![EthCC[9] thumbnail](/_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fethcc9.e0a0ce60.jpeg&w=3840&q=75)
Rethinking AMMs: Why Today’s Liquidity Design Won't Work at Scale
The presentation will explore how traditional AMMs are no longer fit for purpose. As DeFi scales, the inefficiencies of traditional AMM design become a ball and chain on growth, that is until now.
Speaker
![EthCC[9] thumbnail](/_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fethcc9.e0a0ce60.jpeg&w=3840&q=75)
Common Vulnerabilities In Networking Protocols
Explore security flaws in networking infrastructure underlying blockchain protocols. Learn common vulnerabilities in UDP, TCP, WebSockets, HTTP, TLS, gRPC, and P2P protocols discovered during audits.
Speaker
![EthCC[9] thumbnail](/_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fethcc9.e0a0ce60.jpeg&w=3840&q=75)
An Offensive Security View to Cross Chain Bridge Security
A deep offensive-security walkthrough of cross-chain bridges , real attack paths, $2.5B+ bridge hacks, trust assumptions, lock-mint / burn-release models, network-layer weaknesses, and case studies sh...
Speaker
![EthCC[9] thumbnail](/_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fethcc9.e0a0ce60.jpeg&w=3840&q=75)
TEE as a Primitive for RWA & DeFi on Ethereum
How TEE enables confidential data processing, private tokens, and compliant off-chain workflows for RWA and DeFi on Ethereum, turning trusted execution into a core infrastructure primitive for institu...
Speaker
![EthCC[9] thumbnail](/_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fethcc9.e0a0ce60.jpeg&w=3840&q=75)
The Cost of Uncertainty: Tail Latency in Ethereum’s PBS Hot Path
Latency is not only UX; it shapes behavior & market structure. I’ll map the PBS hot path & show how latency variance creates uncertainty, leading to hedging (fees, retries, exclusivity) & weaker price...
Speaker
![EthCC[9] thumbnail](/_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fethcc9.e0a0ce60.jpeg&w=3840&q=75)
Security Is Infrastructure: Designing Resilient Systems for Ethereum’s Future
Ethereum’s next era requires infrastructure that can withstand failure. This talk explores how validator networks, rollups, and bridges can be designed with resilience at their core—where security isn...
Speaker
![EthCC[9] thumbnail](/_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fethcc9.e0a0ce60.jpeg&w=3840&q=75)
Live State Fuzzing: Testing Live Deployments Proactively
Start fuzzing from live on chain state, not from scratch. Learn how state aware fuzzing on a local fork uncovers deep, realistic vulnerabilities in deployed smart contracts on the network of your choi...
Speaker
![EthCC[9] thumbnail](/_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fethcc9.e0a0ce60.jpeg&w=3840&q=75)
DeFi Revolutionizes TradFi with 24/7 Markets on Equities, Commodities & FX
What if you could trade Apple stock at 3am on Sunday? Or gold during Christmas? DeFi perpetuals make it possible. I'll share what we learned building Kaiko's infrastructure for truly global, always-on...
Speaker
![EthCC[9] thumbnail](/_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fethcc9.e0a0ce60.jpeg&w=3840&q=75)
AI Fuzzing: From Stochastic Chaos to Directed Precision.
Fuzzing struggles with randomness, external calls, and complex data types. This talk reveals how LLMs guide fuzzers through taint analysis, semantic understanding, and dynamic feedback—turning chaotic...
Speaker
![EthCC[9] thumbnail](/_next/image?url=%2F_next%2Fstatic%2Fmedia%2Fethcc9.e0a0ce60.jpeg&w=3840&q=75)
Optimising Block Building with Genetic Algorithms
This talk dives into the current inefficiencies of block building algorithms, and shows how better handling of transaction nonces plus genetic algorithms can help find near optimal transaction sequenc...
Speaker