Jon specializes in formal methods within computer science, with particular focus on program analysis, verification, synthesis, and security applications.

As a PhD candidate at UT Austin within the UToPiA Group, Jon has contributed published research and created tools addressing smart contract security and ZK protocols, including SmartPulse and Zequal.

Previously, Jon earned both his B.Sc. and M.Sc. degrees in Computer Science from the University of Arizona. There, his research encompassed malware detection evasion, exception based control transfer analysis, covert channels, static analysis for covert collusion detection, and dynamic analysis focusing on interpreter optimization across multiple languages.

In his role at Veridise, Jon has conducted security audits across diverse protocols spanning smart contracts, blockchain implementations, and ZK circuits. His client portfolio includes RISC Zero, Succinct, Semaphore, vLayer, and Ankr.

Author articles

Product Insights

Continuous Web3 Security: Catching Bugs Before They Cost Millions

Veridise CEO Jon Stephens explains how continuous security integration prevents exploits and accelerates Web3 development at TOKEN2049 Singapore.

See How We Caught Critical Vulnerabilities Others Missed

Get detailed case study showing how formal verification stopped production vulnerabilities

Each case study breaks down actual vulnerabilities we discovered in production code, the mathematical proofs we used to catch them, and the specific verification techniques that prevented exploitation. See the exact tools and methodologies our clients use to ship secure protocols.

“AuditHub has an amazing tool, Picus, which enables RISC Zero to verify and prove the determinism of our ZK circuits. AuditHub integrated into our CI/CD and performs automated checks while we continue making improvements to our code. Amazing work!”

Jeremy Bruestle

CEO & Co-founder at RISC Zero

See How We Caught Critical Vulnerabilities Others Missed

Get detailed case study showing how formal verification stopped production vulnerabilities

Each case study breaks down actual vulnerabilities we discovered in production code, the mathematical proofs we used to catch them, and the specific verification techniques that prevented exploitation. See the exact tools and methodologies our clients use to ship secure protocols.

“AuditHub has an amazing tool, Picus, which enables RISC Zero to verify and prove the determinism of our ZK circuits. AuditHub integrated into our CI/CD and performs automated checks while we continue making improvements to our code. Amazing work!”

Jeremy Bruestle

CEO & Co-founder at RISC Zero