April 24, 2024, 4:11 a.m. | Zhiyang Chen, Ye Liu, Sidi Mohamed Beillahi, Yi Li, Fan Long

cs.CR updates on arXiv.org arxiv.org

arXiv:2404.14580v1 Announce Type: new
Abstract: Smart contract transactions associated with security attacks often exhibit distinct behavioral patterns compared with historical benign transactions before the attacking events. While many runtime monitoring and guarding mechanisms have been proposed to validate invariants and stop anomalous transactions on the fly, the empirical effectiveness of the invariants used remains largely unexplored. In this paper, we studied 23 prevalent invariants of 8 categories, which are either deployed in high-profile protocols or endorsed by leading auditing firms …

arxiv attacks contract contracts cs.cr cs.pl cs.se events monitoring patterns runtime runtime monitoring security security attacks smart smart contract smart contracts transactions

Sr Security Engineer - Colombia

@ Nubank | Colombia, Bogota

Security Engineer, Investigations - i3

@ Meta | Menlo Park, CA | Washington, DC | Remote, US

Cyber Security Engineer

@ ASSYSTEM | Bridgwater, United Kingdom

Security Analyst

@ Northwestern Memorial Healthcare | Chicago, IL, United States

GRC Analyst

@ Richemont | Shelton, CT, US

Security Specialist

@ Peraton | Government Site, MD, United States