<<< BACK <<<

STM-090:

Authors

            Perez, Daniel and Livshits, Ben
            

Venue and Year

            USENIX Security, 2021
            

Original Work

            Smart Contract Vulnerabilities: Vulnerable Does Not Imply Exploited
            

Defense Modality

            Exploratory
            

Core Method(s)

            execution tracing
            

Input-Output Mapping

            chain data => report
            

Targeted Contracts

            Any Ethereum
            

Threat Model

Vulnerable contract, malicious contract, or both
            vulnerable contract
            

Targeted Vulnerabilities