
Description
Ethereum smart contracts are susceptible not only to those vulnerabilities common to all software development domains, but also to those arising from the peculiar execution model of the Ethereum Virtual Machine. One of these vulnerabilities, a susceptibility to re-entrancy attacks, has been at the center of several high-profile contract exploits.
Download count: 0
Details
Contributors
- Lehman, Maxfield Chance Christian (Author)
- Bazzi, Rida (Thesis director)
- Doupe, Adam (Committee member)
- School of Mathematical and Statistical Sciences (Contributor)
- Computer Science and Engineering Program (Contributor)
- Barrett, The Honors College (Contributor)
Date Created
The date the item was original created (prior to any relationship with the ASU Digital Repositories.)
2018-12
Subjects
Resource Type
Collections this item is in