June 8, 2023, 1:10 a.m. | Haiyang Liu, Yuqi Fan, Lin Feng, Zhenchun Wei

cs.CR updates on arXiv.org arxiv.org

The immutable and trustable characteristics of blockchain enable smart
contracts to be applied in various fields. Unfortunately, smart contracts are
subject to various vulnerabilities, which are frequently exploited by
attackers, causing financial damage to users.In this paper, we study the
problem of vulnerable smart contract function locating. We construct a novel
Multi-Relational Nested contract Graph (MRNG) to better characterize the rich
syntactic and semantic information in the smart contract code, including the
relationships between data and instructions. An MRNG represents …

attackers blockchain contract enable exploited financial function nested network problem smart smart contract smart contracts study vulnerabilities vulnerable

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

SITEC- Systems Security Administrator- Camp HM Smith

@ Peraton | Camp H.M. Smith, HI, United States

Cyberspace Intelligence Analyst

@ Peraton | Fort Meade, MD, United States

General Manager, Cybersecurity, Google Public Sector

@ Google | Virginia, USA; United States

Cyber Security Advisor

@ H&M Group | Stockholm, Sweden

Engineering Team Manager – Security Controls

@ H&M Group | Stockholm, Sweden