<<< BACK <<<
STM-088: SeRIF
Authors
Cecchetti, Ethan and Yao, Siqiu and Ni, Haobin and Myers, Andrew C
Venue and Year
Oakland, 2021
Original Work
Compositional Security for Reentrant Applications
Defense Modality
Subtractive
Core Method(s)
formal
Input-Output Mapping
source code => report
Targeted Contracts
Any contract
Threat Model
Vulnerable contract, malicious contract, or both
vulnerable contract
Targeted Vulnerabilities