<<< BACK <<<

STM-044: EthRacer

Authors

            Kolluri, Aashish and Nikolic, Ivica and Sergey, Ilya and Hobor, Aquinas and Saxena, Prateek
            

Venue and Year

            ISSTA, 2019
            

Original Work

            Exploiting The Laws of Order in Smart Contracts
            

Defense Modality

            Subtractive
            

Core Method(s)

            fuzzing
            

Input-Output Mapping

            bytecode + chain data => report
            

Targeted Contracts

            Any Ethereum
            

Threat Model

Vulnerable contract, malicious contract, or both
            both
            

Targeted Vulnerabilities