PUB_01 — 2025
LATEST
DOI: 10.5281/zenodo.18744500
Agent Delegated Purchasing Protocol (ADPP): Trust-Scored Autonomous Commerce
Presents the Agent Delegated Purchasing Protocol (ADPP), a framework for trust-scored autonomous commerce where AI agents execute purchasing decisions on behalf of principals with cryptographic accountability and real-time trust verification.
CURATED_ACCESS :: RESEARCHER_TIER
Bundled PDFs, citation exports, early access to pre-prints
Unlock Curated Access →
PUB_02 — 2025
DOI: 10.5281/zenodo.18736639
Covert Cyber Warfare: Firmware-Persistent macOS Compromise and Steganographic Active Defense
Documents a real-world firmware-persistent macOS compromise involving steganographic command channels, firmware-level persistence mechanisms, and active defense countermeasures. Provides forensic methodology and defensive steganography techniques for incident responders.
CURATED_ACCESS :: RESEARCHER_TIER
Bundled PDFs, citation exports, early access to pre-prints
Unlock Curated Access →
PUB_03 — 2025
DOI: 10.5281/zenodo.18652596
Trust Must Be Proven: Verification Infrastructure for the Synthetic Era
The fabrication of credible identity is now an industrial process. Generative AI has compressed the cost of producing synthetic persons, institutions, and authority signals to near zero, while verifying authenticity remains structurally expensive. This paper presents a verification infrastructure framework for the synt...
CURATED_ACCESS :: RESEARCHER_TIER
Bundled PDFs, citation exports, early access to pre-prints
Unlock Curated Access →
PUB_04 — 2025
DOI: 10.5281/zenodo.18652592
The Structural Credibility Gap: A Constructive Proof of Synthetic Authority Through Self-Referential Verification Architecture
Controlled self-referential experiment in synthetic authority construction. Maps escalation from media deepfakes to full synthetic institutions. Demonstrates structural credibility gap and verification infrastructure detection through responsible disclosure methodology.
CURATED_ACCESS :: RESEARCHER_TIER
Bundled PDFs, citation exports, early access to pre-prints
Unlock Curated Access →
PUB_05 — 2025
DOI: 10.5281/zenodo.18645301
Entity-Level Deepfakes and the Stabilization of Intellectual Provenance
This paper formalizes the concept of entity-level deepfakes—synthetic constructs that maintain persistent digital identities across platforms, participate in fabricated reference networks, and are designed to be indistinguishable from authentic entities. Introduces the Synthetic Density Index and proposes verified trai...
CURATED_ACCESS :: RESEARCHER_TIER
Bundled PDFs, citation exports, early access to pre-prints
Unlock Curated Access →
PUB_06 — 2025
DOI: 10.5281/zenodo.18737208
Full-Spectrum Synthetic Organizations: How AI Closes the Last Verification Gap for Under $500
Demonstrates that a complete organizational impersonation infrastructure—fabricated company, deepfake-capable executives, compromised AI model contamination, and customer-facing operations—can be established for under $500 initial cost. The attack exploits three convergent vectors: real-time deepfake generation, recurs...
CURATED_ACCESS :: RESEARCHER_TIER
Bundled PDFs, citation exports, early access to pre-prints
Unlock Curated Access →
PUB_07 — 2025
DOI: 10.5281/zenodo.18520768
Synthetic Organizational Depth: A $50 Attack on Trust Systems in Faith-Technology
Demonstrates that a fully believable synthetic organization with executive personas and publication histories can be fabricated for approximately $50 initial costs. Presents Helix Fabric v2, a distributed detection framework with 15 signal types across multiple worker categories.
CURATED_ACCESS :: RESEARCHER_TIER
Bundled PDFs, citation exports, early access to pre-prints
Unlock Curated Access →
PUB_08 — 2025
DOI: 10.5281/zenodo.18736713
Helix Fabric v2: A Serverless Meta-Orchestrator for Autonomous Synthetic Organization Detection and Competitive Intelligence
A serverless meta-orchestration system built on Cloudflare Workers that autonomously detects synthetic organizations, AI-generated personas, and intellectual property clones in the faith-technology ecosystem. Multi-signal detection across fleet-spawned workers.
CURATED_ACCESS :: RESEARCHER_TIER
Bundled PDFs, citation exports, early access to pre-prints
Unlock Curated Access →
PUB_09 — 2025
DOI: 10.5281/zenodo.18520751
Predictive Augmentation for Anticipatory Cyber Defense: A Unified Framework Integrating Adversarial Machine Learning, Game-Theoretic Autonomous Defense, and Zero-Knowledge Attribution
A unified framework for anticipatory cyber defense integrating eight convergent dimensions: adversarial machine learning countermeasures, supply chain and hardware implant analysis, quantum threat transition analysis, attribution resistance with deepfake forensics, autonomous defense game theory, zero-knowledge proof s...
CURATED_ACCESS :: RESEARCHER_TIER
Bundled PDFs, citation exports, early access to pre-prints
Unlock Curated Access →
PUB_10 — 2025
DOI: 10.5281/zenodo.18736645
Helical Pipeline Architecture for Autonomous Multi-Agent SaaS Development (Extended)
Extended version (28 pages) with formal model (9 definitions, 3 theorems). Presents a pipeline parallelism model for multi-agent SaaS development using helical architecture, constitutional AI governance, and gradient auto-compaction for LLM agent orchestration.
CURATED_ACCESS :: RESEARCHER_TIER
Bundled PDFs, citation exports, early access to pre-prints
Unlock Curated Access →
PUB_11 — 2025
DOI: 10.5281/zenodo.18707254
5Ghoul Defensive: Practical Countermeasures for 5G NR Vulnerabilities
Analyzes the 5Ghoul vulnerability family affecting 5G NR implementations and develops practical defensive countermeasures including firmware-level mitigations, network-side detection heuristics, and protocol-aware monitoring strategies for mobile infrastructure operators.
CURATED_ACCESS :: RESEARCHER_TIER
Bundled PDFs, citation exports, early access to pre-prints
Unlock Curated Access →
PUB_12 — 2025
DOI: 10.5281/zenodo.18718585
Transaction Trust Scoring for Agent Commerce: Infrastructure for Verifiable Agent-to-Vendor Transactions
Presents the Transaction Trust Score (TTS), a real-time scoring system that aggregates four independent signals—entity verification, constraint compliance history, behavioral fingerprinting, and counterparty risk assessment—into a single trust verdict delivered in under 200ms. Formalized as the Delegated Agent Commerce...
CURATED_ACCESS :: RESEARCHER_TIER
Bundled PDFs, citation exports, early access to pre-prints
Unlock Curated Access →
PUB_13 — 2025
DOI: 10.5281/zenodo.18718587
Hardware Trust vs. Entity Trust: Complementary Attestation Models for Agent Commerce
Argues that hardware-based trust (Trusted Execution Environments) and entity-based trust (behavioral verification scoring) are complementary attestation models. Formalizes a dual-attestation architecture integrating TEE hardware proofs with Transaction Trust Scoring (TTS). Valid TEE attestation improves trust scores by...
CURATED_ACCESS :: RESEARCHER_TIER
Bundled PDFs, citation exports, early access to pre-prints
Unlock Curated Access →
PUB_14 — 2025
DOI: 10.5281/zenodo.18185086
Multi-LLM Peer Orchestration
Presents a multi-LLM peer orchestration framework where heterogeneous language models collaborate through structured debate, constitutional governance, and consensus protocols to produce higher-quality outputs than any single model.
CURATED_ACCESS :: RESEARCHER_TIER
Bundled PDFs, citation exports, early access to pre-prints
Unlock Curated Access →
PUB_15 — 2025
DOI: 10.5281/zenodo.18137882
Constitutional AI Governance Constraints
Formalizes constitutional governance constraints for autonomous AI systems, defining hard boundaries, soft preferences, and escalation protocols that ensure alignment without sacrificing capability.
CURATED_ACCESS :: RESEARCHER_TIER
Bundled PDFs, citation exports, early access to pre-prints
Unlock Curated Access →
PUB_16 — 2025
DOI: 10.5281/zenodo.18137884
Formal Verification of AI Governance (Coq/Z3)
Applies formal verification techniques using Coq proof assistant and Z3 SMT solver to prove safety properties of AI governance constraint systems, establishing machine-checkable guarantees for constitutional AI frameworks.
CURATED_ACCESS :: RESEARCHER_TIER
Bundled PDFs, citation exports, early access to pre-prints
Unlock Curated Access →
PUB_17 — 2025
DOI: 10.5281/zenodo.18137886
Prior Art Evidence Chain Methodology
Establishes a methodology for constructing cryptographically verifiable prior art evidence chains using persistent identifiers, timestamped deposits, and hash-linked provenance records.
CURATED_ACCESS :: RESEARCHER_TIER
Bundled PDFs, citation exports, early access to pre-prints
Unlock Curated Access →
PUB_18 — 2025
DOI: 10.5281/zenodo.18137888
IP Evidence Chain
Presents an intellectual property evidence chain framework that links DOI-anchored publications, code repositories, and deployment artifacts into a tamper-evident provenance graph for defending IP claims.
CURATED_ACCESS :: RESEARCHER_TIER
Bundled PDFs, citation exports, early access to pre-prints
Unlock Curated Access →
Stay Current
Get Research Updates & the Full 18-Paper Corpus
New publications on synthetic identity detection, agent commerce trust, hardware attestation, and formal verification. CC-BY-4.0 licensed.
Try The Research
Is this company real? Check any domain in 4 seconds.
This isn't theory. The methodology above is deployed and running. Paste any domain and see the trust signals yourself.
Check a Domain Free →
No signup · Instant results · Full report: $9.99