2022
DOI: 10.48550/arxiv.2203.00364
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Practical Mitigation of Smart Contract Bugs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…The low-level functions are still present, and can be exploited if the access control is not correctly implemented. sGuard 84 and HCC 85 extend EVMPatch by extracting a CFG and data-flow pattern to patch reentrancy and arithmetic overflow in the bytecode level. Furthermore, both SMARTSHIELD and EVMPatch require significant intervention by developers in writing vulnerability detection instructions in the bytecode level, unlike GoHigh, which is completely automated.…”
Section: Patchingmentioning
confidence: 99%
“…The low-level functions are still present, and can be exploited if the access control is not correctly implemented. sGuard 84 and HCC 85 extend EVMPatch by extracting a CFG and data-flow pattern to patch reentrancy and arithmetic overflow in the bytecode level. Furthermore, both SMARTSHIELD and EVMPatch require significant intervention by developers in writing vulnerability detection instructions in the bytecode level, unlike GoHigh, which is completely automated.…”
Section: Patchingmentioning
confidence: 99%