Zero Knowledge VM Hijinks
Dean Pierce
@deanpierce
Hushcon 2023
$ whoami
WTF are Zero Knowledge Virtual Machines?
* more about this in Part 4
Part 1 : ZK History
(things are about to get really handwavy)
Cave of Ali Baba
Victor and Peggy play in caves.
How to Explain Zero-Knowledge Protocols to Your Children (1990)
(interactive)
ZK Gadgets
(from Cathie Yun's SBC'19 talk)
ZK Circuits
(from Cathie Yun's SBC'19 talk)
ZK Circuits
ZK Virtual Machines (Polygon ZkEVM)
ZK Virtual Machines (Polygon ZkEVM)
All still just polynomials multiplied by massive prime fields.
ZK Virtual Machines (RiscZero)
ZK Virtual Machines (RiscZero)
Part 2 : ZK Applications
Part 2 : ZK Applications
ZK Identity
Tornado.cash
Dark Forest (zkga.me)
ZK Machine Learning
Blockchain Scaling
Proof of Exploitability
Part 3: Automated Bounty Markets
Prereq: Automated Markets
Prereq: Icicle-emu
BugMart.org Market Flow
Seller posts: (all information posted on public smart contract)
Buyer posts:
Seller confirms purchase order:
Final claim is verified by smart contract, which will not pay seller unless the proof checks out
ZkBounty.org Market Flow
Sponsor posts a bounty / security claim:
Researcher pulls down target, adds to fuzz infrastructure, finds bug, and submits:
If researcher's proofs are valid, smart contract automatically sends funds to the researcher
ZkBounty.org Market Flow
ZkRansom.org Market Flow
Unintended "encryption event" initiated on victim system
Victim informed of encryption event, told to visit website
Attacker generates proof and claims payment by posting:
Attacker only gets paid after the contract validates the proof
Automated Bounty Market Utopia
Part 4 : Soundness bugs
d
l2beat.com
Call to action!
@deanpierce on all the things
Xitter, Lens, Warpcast, BlueSky,
defcon.social, Telegram, Discord, ..