분류 전체보기7 A Deep Dive Understanding of Smart Contract Vulnerabilities - Part 2 Logic bugs in lending protocols When considering how lending and borrowing-based DeFi protocols can break, it's helpful to think about how bugs propagate at the software level and affect the business logic level. There are a lot of steps to forming and closing a bond contract. Here are some attack vectors to consider. Ways lenders lose out Bugs that enable the principal due to reduce (possible t.. 2024. 4. 3. A Deep Dive Understanding of Smart Contract Vulnerabilities - Part 1 This article serves as a mini-course on smart contract security and provides an extensive list of the issues and vulnerabilities that tend to recur in Solidity smart contracts. A security issue in Solidity boils down to smart contracts not behaving the way they were intended to. This can fall into four broad categories: A Deep Dive Understanding of Smart Contract Vulnerabilities - Part 1 tutoria.. 2024. 3. 30. Full-Chain Attacks: A Look at Baseband Vulnerability Exploits - 2 Preface In Hardwear.io's Basebanheimer talk, a method was introduced to achieve arbitrary code execution using 32-core Linux on its older Helio series chipsets by exploiting the MediaTek baseband Pivot vulnerability CVE-2022-21765. Based on previous thoughts, this vulnerability could theoretically also be exploited on MediaTek's latest chipset series (Dimensity, which uses 64-bit cores). Vulnera.. 2024. 3. 26. Full-Chain Attacks: A Look at Baseband Vulnerability Exploits - 1 we have introduced our latest research into full-chain baseband exploits. We have showcased new research tools (our nanoMIPS decompiler, debugger, and emulator for Mediatek basebands) and explored the interconnected components across the Cellular Processor and the Application Processor of Samsung and Mediatek radio interface stacks. The most serious of vulnerabilities in these interfaces can lea.. 2024. 3. 25. 이전 1 2 다음