Blackhat Ethereum

Presented at Summercon 2018, June 29, 2018, 11 a.m. (50 minutes)

In the blockchain, there are no secrets. Every transaction is logged and everyone has a copy of all of the code. Nearly all of this code can only be analyzed through reverse engineering. Over the past year, we've seen enterprising hackers use flaws in smart contracts to whisk away millions. This was made possible thanks to Ethereum, the technology that powers cryptocats, and Solidity, a high level language that describes Ethereum's Turing complete smart contracts. This talk will introduce smart contract security, present common vulnerability classes, and demonstrate how to reverse engineer EVM code to identify these vulnerabilities. The talk will also present tools to support vulnerability discovery in EVM code and Solidity.


Presenters:

  • Ryan Stortz
    Ryan Stortz is a Principal Security Researcher at Trail of Bits in NYC. Jay Little is security researcher at Trail of Bits. Jay has over 10 years experience making types and structures in IDA Pro. @trailofbits
  • Jay Little
    Ryan Stortz is a Principal Security Researcher at Trail of Bits in NYC. Jay Little is security researcher at Trail of Bits. Jay has over 10 years experience making types and structures in IDA Pro. @trailofbits

Links:

Similar Presentations: