2019
DOI: 10.48550/arxiv.1907.03890
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Manticore: A User-Friendly Symbolic Execution Framework for Binaries and Smart Contracts

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 0 publications
0
7
0
Order By: Relevance
“…Since symbolic execution deals with unknown variables as symbolic variables, it is potentially suitable for analysis of smart contracts, which utilizes information outside codes [6], i.e., blockchain. Hence, many tools have been proposed so far [5], [12], [23], [30]- [32], [44]. The primary motivation of recent works aims to extend analysis areas, e.g., intercontract analysis and contract creation.…”
Section: B Other Analysis Tools For Ethereummentioning
confidence: 99%
“…Since symbolic execution deals with unknown variables as symbolic variables, it is potentially suitable for analysis of smart contracts, which utilizes information outside codes [6], i.e., blockchain. Hence, many tools have been proposed so far [5], [12], [23], [30]- [32], [44]. The primary motivation of recent works aims to extend analysis areas, e.g., intercontract analysis and contract creation.…”
Section: B Other Analysis Tools For Ethereummentioning
confidence: 99%
“…Furthermore, analysis of reentrancy attacks is often heuristic and thus Oyente often produces many false positives. Extensions of Oyente that support readability of outputs from symbolic execution have been proposed [20,21], and the usability of RA can be potentially be improved in a similar way.…”
Section: Related Workmentioning
confidence: 99%
“…Another reason to opt for bytecode rewriting are existing smart contract vulnerability detection tools. As of now, the majority of them operate on the EVM level [13,20,23,24,32] and report their findings on the EVM level. A bytecode rewriting approach can exploit the reports of these analysis tools to directly generate an EVM bytecodebased patch.…”
Section: Design Choicesmentioning
confidence: 99%