- 🎓 I graduated with an M.Sc. in Computer Science from the Brno University of Technology.
- 💻 My specialization is cybersecurity, but I have broad knowledge and a strong passion for coding.
- 💹 I’m passionate about blockchain technologies, though I’m also open to roles in other areas, especially FinTech.
- ❓ I work with Rust and Python lately, I also have some experience with other languages (C, C++, Haskell...), I'm now exploring Java.
- 💼 I’m open to discuss interesting projects. Feel free to reach out via email or LinkedIn if you’d like to chat.
(Click a publication name below to expand and see details.)
Paper: Secret Leader Election in Ethereum PoS: An Empirical Security Analysis of Whisk and Homomorphic Sortition under DoS on the Leader and Censorship Attacks
- Preprint on arXiv
- Abstract: Proposer anonymity in Proof-of-Stake (PoS) blockchains is a critical concern due to the risk of targeted attacks such as malicious denial-of-service (DoS) and censorship attacks. While several Secret Single Leader Election (SSLE) mechanisms have been proposed to address these threats, their practical impact and trade-offs remain insufficiently explored. In this work, we present a unified experimental framework for evaluating SSLE mechanisms under adversarial conditions, grounded in a simplified yet representative model of Ethereum's PoS consensus layer. The framework includes configurable adversaries capable of launching targeted DoS and censorship attacks, including coordinated strategies that simultaneously compromise groups of validators. We simulate and compare key protection mechanisms - Whisk, and homomorphic sortition. To the best of our knowledge, this is the first comparative study to examine adversarial DoS scenarios involving multiple attackers under diverse protection mechanisms. Our results show that while both designs offer strong protection against targeted DoS attacks on the leader, neither defends effectively against coordinated attacks on validator groups. Moreover, Whisk simplifies a DoS attack by narrowing the target set from all validators to a smaller list of known candidates. Homomorphic sortition, despite its theoretical strength, remains impractical due to the complexity of cryptographic operations over large validator sets.
Master's Thesis: Safeguarding PoS Consensus: A Comparative Analysis of Proposer Protection Mechanisms Against Various Attack Vectors
- Thesis | Implementation | Survey Paper
- Presented at Excel@FIT and ETHPrague, Dean's Award for Excellent Master's Thesis
- Abstract: The thesis deals with proposer protection mechanisms in the Ethereum Proof-of-Stake consensus. The aim is to introduce the principles and possible weaknesses of the consensus mechanism, identify and investigate potential attack vectors targeting proposers, evaluate various proposer protection mechanisms and further investigate two selected mechanisms, Whisk and homomorphic sortition, by simulating their behaviour under different circumstances. For this purpose, a simulation framework was designed and several scenarios were proposed to test the security effectiveness of the mechanisms during the attack. Measurements were conducted to estimate the computational demand of both mechanisms. Finally, the results were discussed, the feasibility of the mechanisms was determined and topics for future research and improvements were suggested.
Specification: EIP-6916
- Specification
- I am a co-author of the “EIP-6916: Automatically Reset Testnet” specification. I analysed protocol-level feasibility and identified discrepancies in relation to integration with the current implementation. I also partially implemented this specification in Rust-based Ethereum clients.
Game Theory Course Project: How Ethereum Utilizes Auctions to Mitigate Negative MEV Impact
- Paper
- In Ethereum, MEV allows block proposers to increase their reward by ordering, including and excluding the transactions in the block. The profit gained from MEV can be significant. While MEV is an important part of many mechanisms, it can also have negative impact on the consensus of PoS Ethereum. One of the mechanisms that has been proposed to mitigate these negative effects is the Proposer-Builder Separation (PBS). This project aims to generally describe the PBS mechanism and then take a closer look at how the mechanism utilizes auctions. It describes the architecture of the PBS, analyses the blockspace auction of the MEV-Boost implementation and shortly introduces the Order Flow Auctions.
Bachelor's Thesis: Modeling and Simulation of Incentive Mechanisms in Ethereum
- Thesis | Implementation
- Abstract: The topic of this thesis is the Ethereum incentive mechanism, in particular the changes introduced in EIP-1559. The aim of the thesis is to investigate the behaviour and propose any potential improvements in case of discovered flaws. The previously used first price auction mechanism required users to choose the incentive arbitrarily, which led to overpaying and high fee volatility. These problems occurred mainly due to higher network utilization after the popularization of projects such as decentralized finance, NFT collections, and the metaverse. The new incentive mechanism introduced the variable block size, which can adapt to the current network usage. Base fee, a value that indicates the minimum fee needed to include the transaction in the block, is then calculated based on the utilization of the previous block, making the fees more predictable. Several simulation experiments were proposed to investigate the typical behaviour and possible weaknesses of the mechanism. Finally, a possible improvement was found, and future research was proposed. The goals of the thesis were achieved, and the results were presented in the thesis.
Secure Hardware Devices Course Project: Relay Attack Survey
- Paper
- Abstract: This survey summarizes interesting research regarding relay attacks with focus on the most affected areas - Passive Keyless Entry and Start vehicles, contactless payments and NTLM. Implementations of the attack and possible countermeasures are presented, with one of the most universal measures being distance bounding protocols.
(Click a category below to expand and see details.)
Selected Master's Projects
- Data Communications, Computer Networks and Protocols: Monitoring of BitTorrent Traffic in LAN
- Cryptography: Hybrid RSA–AES Secure Communication System | Implementation and Breaking of Affine Cipher
- Information System Security: Internal Network Security Audit (Capture-The-Flag style)
- Biometry: Assessment of Retinal Image Quality Based on General Characteristics
- Artificial Intelligence and Machine Learning: Freecell | Neural Networks
- Parallel and Distributed Algorithms: Parallel Splitting Algorithm | K-Means algorithm
- Functional and Logic Programming: Decision Trees Classification and Training | Hamiltonian Cycles
- Computation Systems Architectures: Parallelization | Vectorization
- Data Storage and Preparation: Big Data in NoSQL | Data preparation and their descriptive characteristics | Data extraction from the web
