Power BI Fundamentals - Create visualizations and dashboards from scratch
Get 20% off all career paths from fullstack to AI
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a conference talk from USENIX Security '18 that delves into automatic vulnerability identification and exploit generation for Ethereum smart contracts. Learn about teEther, a tool developed to create exploits for contracts using only their binary bytecode. Discover how the researchers formulated a generic definition of vulnerable contracts and applied it to build this innovative tool. Gain insights into the intersection of cryptocurrency, smart contract security, and automated exploit generation in this 24-minute presentation by Johannes Krupp from CISPA, Saarland University.
Syllabus
USENIX Security '18 - teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts
Taught by
USENIX