<<< BACK <<<
STM-090:
Authors
Perez, Daniel and Livshits, Ben
Venue and Year
USENIX Security, 2021
Original Work
Smart Contract Vulnerabilities: Vulnerable Does Not Imply Exploited
Defense Modality
Exploratory
Core Method(s)
execution tracing
Input-Output Mapping
chain data => report
Targeted Contracts
Any Ethereum
Threat Model
Vulnerable contract, malicious contract, or both
vulnerable contract
Targeted Vulnerabilities