<<< BACK <<<

STM-040: CESC

Authors

            Li, Yue
            

Venue and Year

            ICSE-Companion, 2019
            

Original Work

            Finding Concurrency Exploits on Smart Contracts
            

Defense Modality

            Subtractive
            

Core Method(s)

            static analysis
            

Input-Output Mapping

            bytecode => report
            

Targeted Contracts

            Any Ethereum
            

Threat Model

Vulnerable contract, malicious contract, or both
            vulnerable contract
            

Targeted Vulnerabilities