Preventing Disaster: Advances in Smart Contract Vulnerability Detection

By Bernhard Mueller

What do the DAO, Parity MultiSig wallet and Beautychain have in common? 1. All three were hacked with disastrous consequences, 2. In each case, the bugs could have easily been spotted in advance using automated analysis techniques.

In this talk, we'll investigate the above exploits in depth and show how to use a combination of multi-transactional symbolic execution, taint analysis and greybox fuzzing to detect similar bugs with high accuracy and a low false positive rate. We'll also introduce optimization tricks that enable fast detection of ""deep"" vulnerabilities - exploit conditions that are triggered over a longer sequence of highly specific transactions.

Finally, we'll show how developers can apply these security analysis methods to their own contracts using MythX and Mythril.

Devcon V: Day 1: Room D

Share your thoughts, add a comment!

You must be logged in in order to place a comment.

Article comments

Loading...
No comments yet, be the first to comment this article