YoVDO

TeEther - Gnawing at Ethereum to Automatically Exploit Smart Contracts

Offered By: USENIX via YouTube

Tags

USENIX Security Courses Cybersecurity Courses Smart Contracts Courses

Course Description

Overview

Explore a conference talk from USENIX Security '18 that delves into automatic vulnerability identification and exploit generation for Ethereum smart contracts. Learn about teEther, a tool developed to create exploits for contracts using only their binary bytecode. Discover how the researchers formulated a generic definition of vulnerable contracts and applied it to build this innovative tool. Gain insights into the intersection of cryptocurrency, smart contract security, and automated exploit generation in this 24-minute presentation by Johannes Krupp from CISPA, Saarland University.

Syllabus

USENIX Security '18 - teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts


Taught by

USENIX

Related Courses

Never Been KIST - Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport
USENIX via YouTube
Eclipse Attacks on Bitcoin’s Peer-to-Peer Network
USENIX via YouTube
Control-Flow Bending - On the Effectiveness of Control-Flow Integrity
USENIX via YouTube
Protecting Privacy of BLE Device Users
USENIX via YouTube
K-Fingerprinting - A Robust Scalable Website Fingerprinting Technique
USENIX via YouTube