<<< BACK <<<

STM-012: Erays

Authors

            Zhou, Yi and Kumar, Deepak and Bakshi, Surya and Mason, Joshua and Miller, Andrew and Bailey, Michael
            

Venue and Year

            USENIX Security, 2018
            

Original Work

            Erays: Reverse Engineering Ethereum’s Opaque Smart Contracts
            

Defense Modality

            Exploratory
            

Core Method(s)

            static analysis
            

Input-Output Mapping

            bytecode => metadata
            

Targeted Contracts

            Any Ethereum
            

Threat Model

Vulnerable contract, malicious contract, or both
            both
            

Targeted Vulnerabilities