Обзорная статья про атаки на смарт-контракты и в целом простым языком о технологии: https://eprint.iacr.org/2016/1007.pdf
Использование SMT решателей при деобфускации. Hack.lu 2017 SMT Solvers in the IT Security - deobfuscating binary code with logic https://www.youtube.com/watch?v=cyr_4_rN4pY&feature=youtu.be
YouTube
Hack.lu 2017 SMT Solvers in the IT Security - deobfuscating binary code with logic by Thaís Hamasaki
SMT Solvers in the IT Security - deobfuscating binary code with logic
by Thaís Moreira Hamasaki
Malware is sneaky. Malicious codes are implemented to stay hidden during the infection and operation, preventing their removal and the analysis of the code.…
by Thaís Moreira Hamasaki
Malware is sneaky. Malicious codes are implemented to stay hidden during the infection and operation, preventing their removal and the analysis of the code.…