<<< BACK <<<
STM-044: EthRacer
Authors
Kolluri, Aashish and Nikolic, Ivica and Sergey, Ilya and Hobor, Aquinas and Saxena, Prateek
Venue and Year
ISSTA, 2019
Original Work
Exploiting The Laws of Order in Smart Contracts
Defense Modality
Subtractive
Core Method(s)
fuzzing
Input-Output Mapping
bytecode + chain data => report
Targeted Contracts
Any Ethereum
Threat Model
Vulnerable contract, malicious contract, or both
both
Targeted Vulnerabilities