Roberto Zunino’s research while affiliated with University of Trento and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (98)


DeFi Composability as MEV Non-interference
  • Chapter

February 2025

·

1 Read

Massimo Bartoletti

·

Riccardo Marchesin

·

Roberto Zunino



Scalable UTXO Smart Contracts via Fine-Grained Distributed State

June 2024

·

5 Reads

Current UTXO-based smart contracts face an efficiency bottleneck, requiring any transaction sent to a contract to specify the entire updated contract state. This requirement becomes particularly burdensome when the contract state contains dynamic data structures, such as maps, which are needed in many use cases for tracking users interactions with the contract. The problem is twofold: on the one hand, a large state in transactions implies a large transaction fee; on the other hand, a large centralized state is detrimental to the parallelization of transactions, which should be one of the main selling points of UTXO-based blockchains compared to account-based ones. We propose a technique to efficiently execute smart contracts on an extended UTXO blockchain, which allows the contract state to be distributed across multiple UTXOs. In this way, transactions only need to specify the part of the state they need to access, reducing their size (and fees). We also show how to exploit our model to parallelize the validation of transactions on multi-core CPUs. We implement our technique and provide an empirical validation of its effectiveness.


Smart Contract Languages: a comparative analysis
  • Preprint
  • File available

April 2024

·

240 Reads

·

3 Citations

Decentralized blockchain platforms support the secure exchange of assets among users without relying on trusted third parties. These exchanges are programmed with smart contracts, computer programs directly executed by blockchain nodes. Multiple smart contract languages are available nowadays to developers, each with its own distinctive features, strengths, and weaknesses. In this paper, we examine the smart contract languages used in six major blockchain platforms: Ethereum, Solana, Cardano, Algorand, Aptos, and Tezos. Starting with a high-level overview of their design choices, we provide a comprehensive assessment that focuses on programming style, security, code readability, and usability, drawing on an original benchmark that encompasses a common set of use cases across all the smart contract languages under examination.

Download

Secure compilation of rich smart contracts on poor UTXO blockchains

May 2023

·

18 Reads

Most blockchain platforms from Ethereum onwards render smart contracts as stateful reactive objects that update their state and transfer crypto-assets in response to transactions. In this way, they support the development of contracts in the imperative procedural paradigm, familiar to most programmers. A drawback of this design choice is that when a user submits a transaction, they cannot predict in which state it will be executed, exposing them to transaction-ordering attacks. The UTXO model is an alternative blockchain design that thwarts these attacks by requiring new transactions to spend past ones: since transactions have unique identifiers, reordering attacks are ineffective. Currently, the blockchains following the UTXO model either provide contracts with limited expressiveness (Bitcoin), or require complex run-time environments and unfamiliar programming abstractions (Cardano). We present a framework for smart contracts in the UTXO model, that allows expressive contracts to be securely executed by bare-bone UTXO blockchains with loop-free scripts enriched with covenants, and supports the familiar procedural programming style.


Figure 4: Graphical representation of Lemma 5.6 (left) and its proof (right).
Sound approximate and asymptotic probabilistic bisimulations for PCTL

March 2023

·

12 Reads

Logical Methods in Computer Science

We tackle the problem of establishing the soundness of approximate bisimilarity with respect to PCTL and its relaxed semantics. To this purpose, we consider a notion of bisimilarity inspired by the one introduced by Desharnais, Laviolette, and Tracol, and parametric with respect to an approximation error δ\delta, and to the depth n of the observation along traces. Essentially, our soundness theorem establishes that, when a state q satisfies a given formula up-to error δ\delta and steps n, and q is bisimilar to qq' up-to error δ\delta' and enough steps, we prove that qq' also satisfies the formula up-to a suitable error δ"\delta" and steps n. The new error δ"\delta" is computed from δ\delta, δ\delta' and the formula, and only depends linearly on n. We provide a detailed overview of our soundness proof. We extend our bisimilarity notion to families of states, thus obtaining an asymptotic equivalence on such families. We then consider an asymptotic satisfaction relation for PCTL formulae, and prove that asymptotically equivalent families of states asymptotically satisfy the same formulae.


A theoretical basis for Blockchain Extractable Value

February 2023

·

25 Reads

Extractable Value refers to a wide class of economic attacks to public blockchains, where adversaries with the power to reorder, drop or insert transactions in a block can "extract" value from user transactions. Empirical research has shown that mainstream protocols, like e.g. decentralized exchanges, are massively targeted by these attacks, with detrimental effects on their users and on the blockchain network. Despite the growing impact of these attacks in the real world, theoretical foundations are still missing. In this paper we propose a formal theory of Extractable Value, based on a general, abstract model of blockchains and smart contracts. Our theory is the basis for formal proofs of security against Extractable Value attacks.



A Sound Up-to-n,δn,\delta Bisimilarity for PCTL

June 2022

·

4 Reads

·

1 Citation

Lecture Notes in Computer Science

We tackle the problem of establishing the soundness of approximate bisimilarity with respect to PCTL and its relaxed semantics. To this purpose, we consider a notion of bisimilarity similar to the one introduced by Desharnais, Laviolette, and Tracol, which is parametric with respect to an approximation error δ, and to the depth n of the observation along traces. Essentially, our soundness theorem establishes that, when a state q satisfies a given formula up-to error δ and steps n, and q is bisimilar to q′ up-to error δ′ and enough steps, we prove that q′ also satisfies the formula up-to a suitable error δ′′ and steps n. The new error δ′′ is computed from δ,δ′ and the formula, and only depends linearly on n. We provide a detailed overview of our soundness proof.


Citations (71)


... lized because they rely on Operators to post transactions to L1s, and even the temporary absence or downtime of such operators can substantially affect the efficiency of Rollups. Furthermore, Blockchain interoperability and technology convergence (as explained in Jahid, Alsharif & Hall (2023),Mosteanu & Faccia (2021),Saini, Bera, et. al. (2023) andBartoletti, Benetollo, et. al. (2025)) will likely lead to increasing concentration of transactions in, and Centralization of L2s and L1s. ...

Reference:

On Trust-At-Scale, Game Theory And AI: HCI And The Inefficiencies Of PoS/DPoS, PoR, RPCA And PoW
Smart contract languages: A comparative analysis
  • Citing Article
  • October 2024

Future Generation Computer Systems

... The main pitfall is that it requires developers to manage intricate details such as gas costs, storage optimization, and explicit memory management. Moreover, it also does not provide good abstractions in some cases [54]. This makes code development trickly and error-prone, leading to multiple vulnerabilities [55], that have been actually exploited to perform fraudulent actions, such as for the DAO attack [56]. ...

Smart Contract Languages: a comparative analysis

... An interesting line of work is also to embed in SEArch other compliance mechanisms based on different types of contracts, and their associated tools. Some options are tools like CAT [22] which is based on contract automata [23,24,25] or contract-oriented middlewares like the one in [26,27] which supports timed behavioural types or the one in [28], which is based on contract-oriented primitives. Recently, tools for inferring behavioural specifications from code have been proposed. ...

Contract-Oriented Design of Distributed Applications: A Tutorial

... This paper extends the work [BMZ22] in two directions. First, the current paper includes the proofs of all statements, which were not present in [BMZ22]. Second, in [BMZ22] we hinted at the possible application of soundness to the asymptotic behaviour of systems which depend on a parameter η. ...

A Sound Up-to-n,δn,\delta Bisimilarity for PCTL
  • Citing Chapter
  • June 2022

Lecture Notes in Computer Science

... Response by the community resulted in a plethora of security-enhancing analyses and tools, ranging from static and dynamic checks of program code and bytecode, fuzz testing, and deep learning, to formal models of contracts interaction, and even game-theoretical analyses [1,38,20]. However and given the stakes, most of the effort has been on the identification of potential vulnerabilities. More precisely, when designing a tool to determine whether certain portion of code is susceptible to malicious exploitation by a third party, true positives and detection sensitivity are the focus. ...

Verifying liquidity of recursive Bitcoin contracts

Logical Methods in Computer Science

... Other research investigates formal models for blockchain-based contracts (overview in Bartoletti et al [6]). In contrast to our work, they address formal verification in the context of specific chains, such as Bitcoin or Ethereum , while our goal is a model reasonably independent of any particular system. ...

A Formal Model of Algorand Smart Contracts
  • Citing Chapter
  • October 2021

Lecture Notes in Computer Science

... Turing-completeness: ILLUM is Turing-complete: indeed, we can simulate in ILLUM any counter machine [25], a wellknown Turing-complete computational model. The construction is similar to that in [26], and stores each counter in the arguments of recursive clauses. Incrementing and decrementing the counters is simply done by specifying the new values of the arguments inside the call. ...

Computationally sound Bitcoin tokens
  • Citing Conference Paper
  • June 2021

... This model is similar to Cardano's eUTXO model [6]- [8], in that a transaction output contains a datum field which can be used to store contract data. As in the eUTXO model, covenants [9]- [11] are used to ensure that that the datum is updated according to the smart contract behaviour. We further extend the eUTXO model by adding a ctrId field to the transactions, which represents the ID of the contract which is being affected by the transaction. ...

Bitcoin Covenants Unchained
  • Citing Chapter
  • October 2020

Lecture Notes in Computer Science

... hashlocks and timelocks to ensure secure and atomic swaps by requiring recipients to provide cryptographic proof of payment within a specified timeframe. Technically, the HTLC pattern enables the implementation of time-bound transactions (Bartoletti et al. 2020;Monika et al. 2022;Chan and Lesani 2021). ...

A formal model of Algorand smart contracts
  • Citing Preprint
  • September 2020