Watch / Reversing Ethereum Smart Contracts to find out what's behind EVM bytecode

Reversing Ethereum Smart Contracts to find out what's behind EVM bytecode

  • YouTube
  • IPFS
  • Swarm
  • Details

Reversing Ethereum Smart Contracts to find out what's behind EVM bytecode

Duration: 00:18:59

Speaker: Patrick Ventuzelo

Type: Talk

Expertise: Intermediate

Event: Devcon 4

Date: Oct 2018

Reverse engineering is a common technique used by security researcher to understand and analyze the behavior of closed-source binaries. If you apply this to Ethereum smart contract (and more specifically on the EVM bytecode), thats allow you to analyze and verify the result of your Solidity source code compilation. From a developer point of view, it can save you a lot of time and money if you succeed to detect flaws and missing bytecode optimization. Also, providing the Solidity source code it's not mandatory during the smart contract creation, that’s why being able to directly reverse the EVM bytecode make even more sense if you want to understand the behavior of external smart contracts.
About the speakers

PV

Patrick Ventuzelo

Security researcher

Patrick Ventuzelo is a French security researcher working for Quoscient GmbH. Previously, he worked for P1 Security, the French Department of Defense (DoD) and Airbus Defense & Space Cybersecurity.He is mainly focused on Reverse Engineering and Vulnerability Research on various platforms with a strong interest on new research areas such as WebAssembly, Smart Contracts and Blockchain.Patrick has been speaker and trainer multiple time at various international security conferences such as Toorcon, REcon Montreal, SSTIC, REcon Brussels. Recently, he presented his research on “Reverse Engineering of Blockchain Smart Contracts (ETH/NEO/EOS)” and release an open-source security analysis tool called Octopus (https://github.com/quoscient/octopus)

  • Related