Smart contract security
Analysis of common and emerging vulnerability patterns in production smart contracts: reentrancy variants, oracle manipulation, flash loan attack surfaces, governance attack vectors, and upgrade proxy risks. Research informs our audit-readiness methodology and development practices.
Adversarial AI security
Research on attack surfaces in AI systems deployed in production: prompt injection, model extraction, data poisoning in training pipelines, adversarial example generation, and guardrail bypass techniques for on-chain and off-chain AI agents.
Post-quantum cryptography
Implementation research on NIST-standardised PQC algorithms: performance benchmarking of CRYSTALS-Kyber and Dilithium in constrained environments, hybrid migration patterns, and cryptographic agility design for long-lived systems.
Web3 threat intelligence
Analysis of on-chain exploit patterns, DeFi protocol attack post-mortems, cross-chain bridge vulnerabilities, and governance manipulation techniques. Used to inform proactive security controls in protocol development engagements.