Ethereum/EVM Smart Contract Reverse Engineering & Disassembly - Blockchain Security #3

Описание к видео Ethereum/EVM Smart Contract Reverse Engineering & Disassembly - Blockchain Security #3

📥 Download the slides: https://academy.fuzzinglabs.com/intro...

Today I'm showing how EVM disassembly works and how to reconstruct the control flow graph (CFG) of an Ethereum smart contract when you only have access to the bytecode (closed-source). It's really useful when you're looking to analyze in-depth a contract at the EVM assembly level.

#Reversing #Ethereum #EVM

00:00 Introduction
02:04 Introduction to EVM reversing
05:08 Bytecode disassembly
07:26 Control Flow Graph (CFG) reconstruction
13:26 Fonctions identification
16:55 Functions name recovery
19:54 Example with the Bored Ape (BAYC) contract
22:46 Why use reverse engineering on Ethereum smart contract?
24:46 Bytecode optimization
27:25 Smart contract Post-mortem analysis
28:46 Conclusion

Links:
https://academy.fuzzinglabs.com/intro...
Video Devcon4: https://archive.devcon.org/archive/wa...
Bored Ape (BAYC) contract: https://etherscan.io/address/0xbc4ca0...
Ethereum Signature Database: https://www.4byte.directory/
https://ethervm.io/decompile/0xBC4CA0...

==== 💻 FuzzingLabs Training ====
C/C++ Whitebox Fuzzing: https://academy.fuzzinglabs.com/c-whi...
Rust Security Audit and Fuzzing: https://academy.fuzzinglabs.com/rust-...
WebAssembly Reversing and Dynamic Analysis: https://academy.fuzzinglabs.com/wasm-...
Go Security Audit and Fuzzing: https://academy.fuzzinglabs.com/go-se...

==== 🦄 Join the community ====
https://academy.fuzzinglabs.com/fuzzi...

==== 📡 Socials ====
Twitter:   / fuzzinglabs  
Telegram: https://t.me/fuzzinglabs
TikTok:   / fuzzinglabs  

Keywords: Reversing, Reverse Engineering, EVM, Ethereum Smart contract, Solidity, Disassembly, Decompilation, EVM bytecode, opcode
Link to this video:    • Ethereum/EVM Smart Contract Reverse E...  

Комментарии

Информация по комментариям в разработке