Uncover the Premeditated Attacks: Detecting Exploitable Reentrancy Vulnerabilities by Identifying Attacker Contracts.
Shuo YangJiachi ChenMingyuan HuangZibin ZhengYuan HuangPublished in: ICSE (2024)
Keyphrases
- attack scenarios
- attack graphs
- countermeasures
- attack graph
- sql injection
- security flaws
- security vulnerabilities
- security risks
- attack detection
- sql injection attacks
- security mechanisms
- intrusion detection system
- buffer overflow
- defense mechanisms
- network intrusion detection systems
- web applications
- alert correlation
- information security
- security issues
- detect malicious
- denial of service
- automatic identification
- dos attacks
- detecting anomalies
- supply chain
- multistage
- data corruption
- watermarking scheme
- automatic detection
- detecting malicious
- security problems
- cyber attacks
- web services
- data mining
- neural network