<<< BACK <<<
STM-010: teEther
Authors
Krupp, Johannes and Rossow, Christian
Venue and Year
USENIX Security, 2018
Original Work
teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts
Defense Modality
Subtractive
Core Method(s)
symbolic execution
Input-Output Mapping
bytecode => exploit
Targeted Contracts
Any Ethereum
Threat Model
Vulnerable contract, malicious contract, or both
vulnerable contract
Targeted Vulnerabilities