Skip to content
View terezaburianova's full-sized avatar
🦒
🦒

Block or report terezaburianova

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
terezaburianova/README.md

Hi, I'm Tereza

  • 🎓 I graduated with an M.Sc. in Computer Science from the Brno University of Technology.
  • 💻 My specialization is cybersecurity, but I have broad knowledge and a strong passion for coding.
  • 💹 I’m passionate about blockchain technologies, though I’m also open to roles in other areas, especially FinTech.
  • ❓ I work with Rust and Python lately, I also have some experience with other languages (C, C++, Haskell...), I'm now exploring Java.
  • 💼 I’m open to discuss interesting projects. Feel free to reach out via email or LinkedIn if you’d like to chat.

📖 Research & Writing

(Click a publication name below to expand and see details.)

Paper: Secret Leader Election in Ethereum PoS: An Empirical Security Analysis of Whisk and Homomorphic Sortition under DoS on the Leader and Censorship Attacks
  • Preprint on arXiv
  • Abstract: Proposer anonymity in Proof-of-Stake (PoS) blockchains is a critical concern due to the risk of targeted attacks such as malicious denial-of-service (DoS) and censorship attacks. While several Secret Single Leader Election (SSLE) mechanisms have been proposed to address these threats, their practical impact and trade-offs remain insufficiently explored. In this work, we present a unified experimental framework for evaluating SSLE mechanisms under adversarial conditions, grounded in a simplified yet representative model of Ethereum's PoS consensus layer. The framework includes configurable adversaries capable of launching targeted DoS and censorship attacks, including coordinated strategies that simultaneously compromise groups of validators. We simulate and compare key protection mechanisms - Whisk, and homomorphic sortition. To the best of our knowledge, this is the first comparative study to examine adversarial DoS scenarios involving multiple attackers under diverse protection mechanisms. Our results show that while both designs offer strong protection against targeted DoS attacks on the leader, neither defends effectively against coordinated attacks on validator groups. Moreover, Whisk simplifies a DoS attack by narrowing the target set from all validators to a smaller list of known candidates. Homomorphic sortition, despite its theoretical strength, remains impractical due to the complexity of cryptographic operations over large validator sets.
Master's Thesis: Safeguarding PoS Consensus: A Comparative Analysis of Proposer Protection Mechanisms Against Various Attack Vectors
  • Thesis | Implementation | Survey Paper
  • Presented at Excel@FIT and ETHPrague, Dean's Award for Excellent Master's Thesis
  • Abstract: The thesis deals with proposer protection mechanisms in the Ethereum Proof-of-Stake consensus. The aim is to introduce the principles and possible weaknesses of the consensus mechanism, identify and investigate potential attack vectors targeting proposers, evaluate various proposer protection mechanisms and further investigate two selected mechanisms, Whisk and homomorphic sortition, by simulating their behaviour under different circumstances. For this purpose, a simulation framework was designed and several scenarios were proposed to test the security effectiveness of the mechanisms during the attack. Measurements were conducted to estimate the computational demand of both mechanisms. Finally, the results were discussed, the feasibility of the mechanisms was determined and topics for future research and improvements were suggested.
Specification: EIP-6916
  • Specification
  • I am a co-author of the “EIP-6916: Automatically Reset Testnet” specification. I analysed protocol-level feasibility and identified discrepancies in relation to integration with the current implementation. I also partially implemented this specification in Rust-based Ethereum clients.
Game Theory Course Project: How Ethereum Utilizes Auctions to Mitigate Negative MEV Impact
  • Paper
  • In Ethereum, MEV allows block proposers to increase their reward by ordering, including and excluding the transactions in the block. The profit gained from MEV can be significant. While MEV is an important part of many mechanisms, it can also have negative impact on the consensus of PoS Ethereum. One of the mechanisms that has been proposed to mitigate these negative effects is the Proposer-Builder Separation (PBS). This project aims to generally describe the PBS mechanism and then take a closer look at how the mechanism utilizes auctions. It describes the architecture of the PBS, analyses the blockspace auction of the MEV-Boost implementation and shortly introduces the Order Flow Auctions.
Bachelor's Thesis: Modeling and Simulation of Incentive Mechanisms in Ethereum
  • Thesis | Implementation
  • Abstract: The topic of this thesis is the Ethereum incentive mechanism, in particular the changes introduced in EIP-1559. The aim of the thesis is to investigate the behaviour and propose any potential improvements in case of discovered flaws. The previously used first price auction mechanism required users to choose the incentive arbitrarily, which led to overpaying and high fee volatility. These problems occurred mainly due to higher network utilization after the popularization of projects such as decentralized finance, NFT collections, and the metaverse. The new incentive mechanism introduced the variable block size, which can adapt to the current network usage. Base fee, a value that indicates the minimum fee needed to include the transaction in the block, is then calculated based on the utilization of the previous block, making the fees more predictable. Several simulation experiments were proposed to investigate the typical behaviour and possible weaknesses of the mechanism. Finally, a possible improvement was found, and future research was proposed. The goals of the thesis were achieved, and the results were presented in the thesis.
Secure Hardware Devices Course Project: Relay Attack Survey
  • Paper
  • Abstract: This survey summarizes interesting research regarding relay attacks with focus on the most affected areas - Passive Keyless Entry and Start vehicles, contactless payments and NTLM. Implementations of the attack and possible countermeasures are presented, with one of the most universal measures being distance bounding protocols.

🎓 University Projects

(Click a category below to expand and see details.)

Selected Master's Projects
Selected Bachelor's Projects

Pinned Loading

  1. leader-election-sim leader-election-sim Public

    Rust

  2. eth-protocol-fellows/cohort-four eth-protocol-fellows/cohort-four Public

    Fourth cohort of Ethereum Protocol Fellowship

    206 103

  3. terezaburianova terezaburianova Public

    1

  4. VUT-KRY-AES-RSA VUT-KRY-AES-RSA Public

    Python

  5. VUT-KRY-cipher-breaking VUT-KRY-cipher-breaking Public

    C++

  6. VUT-PDS VUT-PDS Public

    Python