133206-Thumbnail Image.png

Ethereum smart contracts are susceptible not only to those vulnerabilities common to all software development domains, but also to those arising from the peculiar execution model of the Ethereum Virtual Machine. One of these vulnerabilities, a susceptibility to re-entrancy attacks, has been at the center of several high-profile contract exploits.

258.55 KB application/pdf

Download restricted. Please sign in.

Download count: 0


Date Created
Resource Type
  • Text
  • Machine-readable links