Star 0

Abstract

Jiafeng Li a Senior Security Research Engineer on Qihoo 360 0keeTeam&RedTeam; and white hat tutor.

Zuotong Feng s a student at Chongqing University of Posts and Telecommunications and words as a security researcher on Qihoo 360 RedTeam.

[Abstract]
==========
The blockchain is not perfect, there are many challenges, and security threats are one of the most important issues facing the blockchain. As its economic value continues to rise, it has prompted attackers to use various means of attack to gain benefits.
This presentation will introduce the attack methods discovered by our team in the blockchain research and public vuln, such as the Ethereum Geth node Dos, EOS node attack, smart contract call injection attack, integer overflow and other attacks, And I will show in detail how I found it, I will introduce what methods are used, what functions are tracked, the tools used, etc. Each of these vulnerabilities is very interesting and I am looking forward to sharing it with everyone. To the best of our knowledge, this presentation will be the first to release the 2018 blockchain security white paper.

Outline
1. Introduction & Background
2. Blockchain public chain vulnerability Research(About 3 vulnerabilities)
3. Blockchain public chain vulnerability Demo
4. Blockchain Smart Contract Vulnerability Research(At least 3 vulnerabilities)
5. Blockchain Smart Contract Vulnerability Demo
6. Conclusion

Slides