What Research Teams at ETH Zurich Are Doing in Secure Systems & Blockchain
Envision a digital landscape where transactions happen without banks, data stays private even in shared clouds, and systems resist even the most sophisticated hacks. This is the realm of secure systems and blockchain technology, where ETH Zurich's brilliant minds are pioneering breakthroughs. As one of Europe's top universities, ETH Zurich hosts teams blending cryptography, computer science, and engineering to build trustworthy tech. From speeding up cryptocurrency payments to fortifying hardware against vulnerabilities, their work shapes a safer online world. Secure systems ensure computers and networks operate without leaks or tampering, while blockchain offers decentralized ledgers for tamper-proof records. ETH teams, like those in applied cryptography and system security, tackle real challenges: quantum threats to encryption, smart contract bugs, and privacy in AI-driven apps. Led by professors such as Srdjan Capkun and Kenneth Paterson, these groups collaborate with industry giants and spin off startups. For beginners, it's like constructing unbreakable vaults for our digital lives, preventing theft or manipulation. In 2025, with rising cyber risks, ETH's innovations, from Snappy for fast Ether payments to formal verification tools, promise resilient futures. This blog explores these teams' efforts, explained simply, highlighting why they matter for everyone using tech daily.

Table of Contents
- What Makes ETH Zurich a Hub for This Research?
- Teams Focused on Secure Systems
- Secure & Trustworthy Systems Group
- System Security Group
- Secure, Reliable, and Intelligent Systems Lab
- Teams in Blockchain Research
- Blockchain Security Team
- Srdjan Capkun's Group and Snappy
- Cryptography Groups and Secure Protocols
- Applied Cryptography Group
- Information Security and Cryptography Group
- Intersections: Blockchain Meets Secure Systems
- Summary Table of Key Teams and Projects
- Conclusion
What Makes ETH Zurich a Hub for This Research?
ETH Zurich, the Swiss Federal Institute of Technology, excels in computer science and engineering, fostering interdisciplinary teams that push secure systems and blockchain boundaries. Home to the Department of Computer Science and centers like ZISC, it attracts global talent for tackling digital threats. Research spans formal verification to ensure code correctness, trusted computing for tamper-proof hardware, and blockchain for decentralized trust.
Professors collaborate on projects addressing real-world needs, like protecting IoT devices or accelerating crypto transactions. ETH's emphasis on open-source tools and spin-offs, such as ChainSecurity for smart contract audits, translates ideas into practice. For those new to the field, secure systems prevent unauthorized access, while blockchain enables peer-to-peer verification without central authorities.
- Strong foundations: Draws from math, algorithms, and systems theory.
- Industry links: Partners with IBM and Proton for applied impact.
- Global influence: Contributes to standards and conferences like EUROCRYPT.
In 2025, ETH's work aligns with rising demands for quantum-safe tech and AI-secure blockchains.
Teams Focused on Secure Systems
Several ETH teams dedicate efforts to secure systems, ensuring hardware, software, and networks resist attacks. They explore trusted execution environments, where code runs isolated from the rest of the system, and formal methods to mathematically prove security.
Research addresses vulnerabilities in processors like Intel, revealing flaws that could compromise data. Teams build frameworks like OpenCCA for Arm secure research, promoting open innovation.
- Hardware focus: Secures chips against side-channel attacks.
- Software verification: Uses tools to check for bugs pre-deployment.
- System-wide defenses: Integrates security in clouds and IoT.
These efforts reduce risks in everyday computing, from smartphones to servers.
Secure & Trustworthy Systems Group
Led by Prof. Shweta Shinde, this group intersects trusted computing, system security, program analysis, and formal verification to build large-scale secure systems. They revealed Intel processor vulnerabilities affecting Microsoft and Google products until mid-2025.
Projects like Heracles attack AMD SEV-SNP and SGXDPDK Firewall leverage hardware for performance and security. Open-source tools like OpenCCA enable Arm CCA research, fostering community-driven advances.
- Trusted computing: Ensures hardware enforces isolation.
- Formal verification: Proves system correctness mathematically.
- Practical impacts: Influences product fixes and spin-offs like Soverli for secure smartphones.
Their work targets cloud, ML infrastructure, and IoT for long-term security.
System Security Group
The System Security Group researches security protocols for networks and systems, including wireless security and trusted execution. They analyze phishing effectiveness and develop UWB relay protections for secure payments.
Recent papers at CCS 2024 and USENIX Security 2024 explore embedded phishing training and PURE for UWB-protected payments. Blockchain ties include secure localization tech.
- Network protocols: Designs defenses for wired and wireless.
- Phishing studies: Improves user awareness and system nudges.
- Secure localization: Prevents spoofing in positioning systems.
Affiliated with ZISC, they bridge theory and practice for robust systems.
Secure, Reliable, and Intelligent Systems Lab
Under Prof. Martin Vechev, the SRI Lab focuses on secure, reliable ML, especially large language models, with blockchain verification spin-offs like ChainSecurity. They present at ICML 2025 on trustworthy AI.
Research includes LMQL for LLM programming and constrained diffusion models. Spin-offs like DeepCode for AI code security highlight applied impact.
- Trustworthy ML: Secures models against adversarial attacks.
- Blockchain audits: Verifies smart contracts automatically.
- Open-source tools: GitHub repos for reproducible research.
Their work ensures intelligent systems remain secure and reliable.
Teams in Blockchain Research
ETH teams advance blockchain through security analysis and protocol innovations. The Blockchain Security Team uses programming languages, ML, and automated analysis for smart contract correctness. SRI Lab builds audit platforms for certification.
Capkun's group speeds payments with Snappy on Ethereum. Research addresses scalability, privacy, and attacks.
- Smart contracts: Automates verification to prevent exploits.
- Payment systems: Reduces confirmation times for practicality.
- Decentralized apps: Secures dApps against common vulnerabilities.
ETH's initiatives, like Ethereum Zurich events, foster community and innovation.
Blockchain Security Team
This team at ETH pioneers techniques for blockchain and smart contract security, employing ML for vulnerability detection. They develop automated auditors to certify contract correctness, preventing billions in losses from bugs.
Focus includes state-of-the-art analysis for emerging threats in decentralized finance and NFTs.
- Automated audits: Tools scan code for flaws pre-deployment.
- ML integration: Predicts risks in complex contracts.
- Research output: Papers and tools shared openly.
Their work elevates blockchain's trustworthiness for widespread adoption.
Srdjan Capkun's Group and Snappy
Prof. Srdjan Capkun, Director of ZISC, leads research in system security and blockchain. His team developed Snappy, accelerating Ether payments to seconds via background deposits and smart contracts.
Snappy automates security without user intervention, addressing blockchain latency. Capkun also explores trusted hardware for manipulation-proof devices.
- Fast transactions: Cuts Ether confirmation from minutes.
- Smart contracts: Enforces rules automatically.
- Privacy focus: Integrates with secure hardware for trustless systems.
This makes cryptocurrencies viable for daily use.
Cryptography Groups and Secure Protocols
ETH's cryptography groups secure protocols underpinning blockchains and systems. They analyze TLS and SSH for flaws, influencing billions of users. Research includes zero-knowledge proofs for privacy in transactions.
Teams develop forward-secure storage and quantum-safe schemes.
- Protocol analysis: Models for real-world security.
- Zero-knowledge: Proves facts without revealing data.
- Standards work: Contributes to IETF and NIST.
These foundations enable secure, scalable blockchains.
Applied Cryptography Group
Under Prof. Kenneth Paterson, this group analyzes deployed crypto systems, from TLS to password managers like 1Password. Theses explore secure hardware for SSO and forward-secure cloud storage.
They study side-channels and key rotation for data at rest, affiliated with ZISC.
- Real-world audits: Fixes in protocols like Telegram.
- Provable security: Models for practical schemes.
- Blockchain ties: Analyzes crypto in decentralized apps.
Awards highlight their impact on global security.
Information Security and Cryptography Group
Led by Prof. Ueli Maurer, this group advances theoretical cryptography for secure systems. Research includes cryptographic protocols and EUROCRYPT 2025 papers on advances.
They focus on indistinguishability obfuscation and functional encryption for blockchains.
- Theoretical foundations: Proves protocol security.
- Building blocks: Enables privacy in distributed ledgers.
- Modular designs: Scalable for complex systems.
Maurer's retirement in 2025 underscores his legacy in constructive theory.
Intersections: Blockchain Meets Secure Systems
ETH teams merge blockchain with secure systems for hybrid solutions. Capkun's trusted hardware complements blockchain's decentralization. SRI's ChainSecurity verifies contracts using formal methods.
Research on private blockchains uses Diophantine arguments for integrity. Quantum-safe crypto protects ledger integrity.
- Secure verification: Formal tools for smart contracts.
- Hardware-blockchain: Trusted enclaves for transactions.
- Privacy enhancements: Zero-knowledge in decentralized apps.
These intersections drive next-gen secure, decentralized tech.
Summary Table of Key Teams and Projects
Team/Group | Focus Area | Key Projects/Tools | Leader/Impact |
---|---|---|---|
Secure & Trustworthy Systems | Trusted Computing & Verification | Heracles, OpenCCA | Shweta Shinde; Hardware Vulns |
System Security Group | Network & Wireless Security | PURE Payments | Protocol Defenses |
SRI Lab | Secure ML & Blockchain Audits | ChainSecurity Spin-off | Martin Vechev; AI Security |
Blockchain Security Team | Smart Contract Analysis | Automated Auditors | Vulnerability Prevention |
Applied Cryptography Group | Protocol & System Analysis | 1Password Security | Kenny Paterson; Real-World Fixes |
Conclusion
ETH Zurich's research teams in secure systems and blockchain are crafting the building blocks for a trustworthy digital era. From Shinde's trusted computing to Capkun's Snappy and Paterson's protocol analyses, they address vulnerabilities, enhance privacy, and enable fast, secure transactions. Through formal methods, AI integration, and open-source tools, their work influences global standards and spin-offs. As blockchain evolves and threats multiply, ETH's interdisciplinary approach ensures innovations that protect and empower users worldwide.
What is the Secure & Trustworthy Systems Group researching?
They focus on trusted computing, system security, and formal verification for large-scale systems.
How does Snappy improve blockchain payments?
It speeds Ether transactions using background deposits and smart contracts.
What is the Blockchain Security Team's main goal?
To advance smart contract security with automated analysis and ML.
Who leads the Applied Cryptography Group?
Prof. Kenneth Paterson analyzes deployed crypto systems.
What role does formal verification play?
It mathematically proves system security against vulnerabilities.
How does ETH contribute to quantum-safe tech?
Through cryptography groups developing resistant protocols.
What is ChainSecurity?
An SRI spin-off for blockchain security verification.
What secure hardware does Capkun research?
Tamper-proof devices complementing blockchain trust.
What theses explore in Applied Crypto?
Topics like secure cloud storage and SSO with hardware.
How does SRI Lab secure ML?
Focuses on trustworthy models and LLM programming.
What is ZISC?
Zurich Information Security Center coordinating ETH efforts.
What protocols do crypto groups analyze?
TLS, SSH, and blockchain-related ones for flaws.
What is the System Security Group's focus?
Security protocols for networks and wireless systems.
How does ETH support blockchain events?
Through ties to Ethereum Zurich conferences.
What is trusted execution?
Hardware isolating code for secure running.
Who is Ueli Maurer?
Professor advancing theoretical cryptography foundations.
What spin-offs from ETH research?
Like ChainSecurity and DeepCode for security tools.
How do teams use ML in security?
For vulnerability prediction and audit automation.
What is zero-knowledge proof?
Proves statements without revealing underlying data.
What future impacts from ETH work?
Quantum-safe blockchains and verified smart contracts.
What's Your Reaction?






