DeFiScanner: Spotting DeFi Attacks Exploiting Logic Vulnerabilities on Blockchain.
Bin WangXiaohan YuanLi DuanHongliang MaBin WangChunhua SuWei WangPublished in: IEEE Trans. Comput. Soc. Syst. (2024)
Keyphrases
- countermeasures
- security flaws
- security vulnerabilities
- security risks
- security mechanisms
- information security
- denial of service
- buffer overflow
- dos attacks
- attack scenarios
- computer security
- security issues
- classical logic
- authentication scheme
- security threats
- network security
- attack detection
- security breaches
- logic programming
- malicious users
- access control
- attack graphs
- data corruption
- multi valued
- intrusion detection
- web services
- keyword spotting
- predicate logic
- document analysis
- watermarking scheme