Главная
Study mode:
on
1
Intro
2
Blockchain is a special kind of Database
3
Blockchain is a Distributed Ledger
4
What are Smart Contracts?
5
Why do Smart Contracts need Blockchain?
6
Integer Underflow/Overflow
7
Timestamp Dependence
8
Denial of Service
9
Reentrancy Attack
10
Parity Wallet attacks
11
Short Address Attack
12
Honeypots
13
51% Attack (Proof of Work)
14
Long Range Attack (Proof of Stake)
15
TEE-based consensus
16
Partitioning Attack
17
Delay Attack
18
Questions?
Description:
Explore known vulnerabilities in smart contracts and blockchain networks in this HITB GSEC 2018 conference talk. Delve into specific issues that have occurred on the Ethereum blockchain, applicable to any platform using the Ethereum Virtual Machine. Learn about best practices to mitigate these vulnerabilities. Examine potential attack vectors on the Bitcoin network and similar peer-to-peer validation systems. Cover topics including integer underflow/overflow, timestamp dependence, denial of service, reentrancy attacks, Parity Wallet attacks, short address attacks, honeypots, 51% attacks, long-range attacks, TEE-based consensus, partitioning attacks, and delay attacks. Gain insights from cybersecurity expert Jorden Seet, who shares his experience in penetration testing, smart contract auditing, and blockchain development.

Blockchain and Smart Contract Attack Vectors

Hack In The Box Security Conference
Add to list