YoVDO

TeEther - Gnawing at Ethereum to Automatically Exploit Smart Contracts

Offered By: USENIX via YouTube

Tags

USENIX Security Courses Cybersecurity Courses Smart Contracts Courses

Course Description

Overview

Explore a conference talk from USENIX Security '18 that delves into automatic vulnerability identification and exploit generation for Ethereum smart contracts. Learn about teEther, a tool developed to create exploits for contracts using only their binary bytecode. Discover how the researchers formulated a generic definition of vulnerable contracts and applied it to build this innovative tool. Gain insights into the intersection of cryptocurrency, smart contract security, and automated exploit generation in this 24-minute presentation by Johannes Krupp from CISPA, Saarland University.

Syllabus

USENIX Security '18 - teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts


Taught by

USENIX

Related Courses

La Disrupción del Blockchain
Universidad Austral via Coursera
Blockchain: Hype oder Innovation?
openHPI
Smart Contracts
University at Buffalo via Coursera
Decentralized Applications (Dapps)
University at Buffalo via Coursera
Bitcoin and Cryptocurrencies
University of California, Berkeley via edX