paint-brush
Maliciously Manipulate Storage Variables in Solidity [A How-To Guide]by@Valid.Network
1,890 reads
1,890 reads

Maliciously Manipulate Storage Variables in Solidity [A How-To Guide]

by Valid Network Research5mMay 7th, 2020
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Smart contracts offer the ability to determine factors and expectations set out by the contract. In the field of programming, factors can be described as ‘variables’ and ‘conditions’ within the actual code. As such, state changes throughout a smart contract should adhere only to the contract’s logic. We will examine a couple of cases that prove a capable attacker could potentially violate the terms set by the smart contract in the first place. This can be achieved by these three methods: arithmetic overflows/underflows of EVM.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - Maliciously Manipulate Storage Variables in Solidity [A How-To Guide]
Valid Network Research HackerNoon profile picture
Valid Network Research

Valid Network Research

@Valid.Network

Leaders in Blockchain cybersecurity.

L O A D I N G
. . . comments & more!

About Author

Valid Network Research HackerNoon profile picture
Valid Network Research@Valid.Network
Leaders in Blockchain cybersecurity.

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite