<<< BACK <<<

STM-010: teEther

Authors

            Krupp, Johannes and Rossow, Christian
            

Venue and Year

            USENIX Security, 2018
            

Original Work

            teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts
            

Defense Modality

            Subtractive
            

Core Method(s)

            symbolic execution
            

Input-Output Mapping

            bytecode => exploit
            

Targeted Contracts

            Any Ethereum
            

Threat Model

Vulnerable contract, malicious contract, or both
            vulnerable contract
            

Targeted Vulnerabilities