<<< BACK <<<
STM-079: ETHPLOIT
Authors
Zhang, Qingzhao and Wang, Yizhuo and Li, Juanru and Ma, Siqi
Venue and Year
SANER, 2020
Original Work
ETHPLOIT: From Fuzzing to Efficient Exploit Generation against Smart Contracts
Defense Modality
Subtractive
Core Method(s)
fuzzing
Input-Output Mapping
source code => exploits
Targeted Contracts
Any Ethereum
Threat Model
Vulnerable contract, malicious contract, or both
both
Targeted Vulnerabilities