<<< BACK <<<

STM-079: ETHPLOIT

Authors

            Zhang, Qingzhao and Wang, Yizhuo and Li, Juanru and Ma, Siqi
            

Venue and Year

            SANER, 2020
            

Original Work

            ETHPLOIT: From Fuzzing to Efficient Exploit Generation against Smart Contracts
            

Defense Modality

            Subtractive
            

Core Method(s)

            fuzzing
            

Input-Output Mapping

            source code => exploits
            

Targeted Contracts

            Any Ethereum
            

Threat Model

Vulnerable contract, malicious contract, or both
            both
            

Targeted Vulnerabilities