Talks & Speaking

Conference talks and presentations sharing knowledge with the community

Behavior-Based Security for the Next Billion On-Chain Users

ETHDenver

February 20, 2026

Denver, Colorado

Behavior-Based Security for the Next Billion On-Chain Users

This talk presents a practical framework for detecting malicious token launches by analyzing on-chain behavioral patterns. Instead of waiting for user reports or post-exploit analysis, Rodrigo demonstrates how to identify threats within seconds of deployment using six core behavioral signals—sniper coordination, deployer history, fund flow tracing, timing patterns, retention analysis, and confidence scoring—giving wallets, DEXes, and researchers actionable tools to protect the next billion on-chain users.

Blockchain Security
Behavioral Analysis
Threat Detection
Smart Contract Security
Web3 Security
On-Chain Analytics
Rug Pull Prevention
Slides AvailableVideo Available
Patterns in Chaos: Cross-Chain Forensics at Scale

DuneCon 25

November 19, 2025

Devconnect Buenos Aires

Patterns in Chaos: Cross-Chain Forensics at Scale

Attackers behave consistently across every chain, even when the ecosystems look chaotic. In this talk, Rodrigo breaks down the five behavioral patterns that reveal scams and exploits long before they happen—sniper bot dynamics, cross-chain identity leaks, dangerous function signature pairings, large-scale behavioral spam attacks, and bonding curve concentration risks. Using real multi-chain data, he shows how these patterns let Webacy detect threats at deploy-time instead of after the damage, giving users and protocols an early-warning system for on-chain risk.

Blockchain Forensics
Cross-Chain Security
Threat Detection
Behavioral Analysis
Smart Contract Security
Web3 Security
Data Analytics
Slides AvailableVideo Available
AI and the Future of On-Chain Trust and Safety

DeFi Security Summit

November 21, 2025

Devconnect Buenos Aires

AI and the Future of On-Chain Trust and Safety

DeFi security has traditionally focused on post-incident forensics and code-level audits. This talk introduces a new attacker-behavior threat model designed for EVM ecosystems, built on repeatable patterns that appear before an exploit executes. Rodrigo walks through pre-deployment signals, attacker clustering, transaction-intent mismatches, and cross-actor correlations that reveal malicious intent early. The session equips protocols, wallets, and infra teams with practical methods to anticipate and block attacks at the moment of deployment, enabling a more proactive security posture across Ethereum and L2s.

AI
Machine Learning
Web3 Security
Blockchain
Threat Detection
Smart Contract Auditing
On-Chain Analytics
Rug Pull Prevention
Slides AvailableVideo Available