Security Vulnerabilities in zk Snarks and their application in zk rollups
1:04:37
Control Flow Graph Reconstruction from EVM bytecode
58:18
The Secret to Vulnerability Management
57:38
How AI & Web3 Intersect
25:41
What don't we know? Understanding Security Vulnerabilities in SNARKs | Devcon SEA
54:44
Decentralized Execution Sharding for Enhanced Smart Contract Functionality
1:04:37
A mental model for Uniswap V3 Liquidity Pools on L2s & Profitability Analysis
26:52
Andrew Ng Explores The Rise Of AI Agents And Agentic Reasoning | BUILD 2024 Keynote
1:30:55