<<< BACK <<<
STM-040: CESC
Authors
Li, Yue
Venue and Year
ICSE-Companion, 2019
Original Work
Finding Concurrency Exploits on Smart Contracts
Defense Modality
Subtractive
Core Method(s)
static analysis
Input-Output Mapping
bytecode => report
Targeted Contracts
Any Ethereum
Threat Model
Vulnerable contract, malicious contract, or both
vulnerable contract
Targeted Vulnerabilities