<<< BACK <<<

STM-088: SeRIF

Authors

            Cecchetti, Ethan and Yao, Siqiu and Ni, Haobin and Myers, Andrew C
            

Venue and Year

            Oakland, 2021
            

Original Work

            Compositional Security for Reentrant Applications
            

Defense Modality

            Subtractive
            

Core Method(s)

            formal
            

Input-Output Mapping

            source code => report
            

Targeted Contracts

            Any contract
            

Threat Model

Vulnerable contract, malicious contract, or both
            vulnerable contract
            

Targeted Vulnerabilities