Uncover the Premeditated Attacks: Detecting Exploitable Reentrancy Vulnerabilities by Identifying Attacker Contracts.
Shuo YangJiachi ChenMingyuan HuangZibin ZhengYuan HuangPublished in: CoRR (2024)
Keyphrases
- attack scenarios
- attack graphs
- countermeasures
- attack graph
- security vulnerabilities
- sql injection
- security flaws
- security risks
- sql injection attacks
- attack detection
- intrusion detection system
- security mechanisms
- alert correlation
- defense mechanisms
- detecting anomalies
- network intrusion detection systems
- buffer overflow
- malicious activities
- information security
- supply chain
- detecting malicious
- intrusion detection
- security issues
- data corruption
- network administrators
- dos attacks
- automatic identification
- denial of service
- web services
- malicious attacks
- computer security
- malicious users
- terrorist attacks
- security problems
- digital images