Title Page
Contents
요약 7
Abstract 8
Ⅰ. Introduction 9
Ⅱ. Related works 10
A. Smart Contract Vulnerability 10
B. Smart Contract Audit 12
C. Smart Contract Vulnerability Detection 13
Ⅲ. Proposed Method 15
A. Vulnerability detection 17
1) Re-entrancy 20
2) Functions that send Ether to arbitrary destinations 21
3) Controlled Delegatedcall 22
4) Sucidal 23
5) Contracts that lock Ether 23
6) Unchecked Send 24
7) Integer Overflow and Underflow 24
8) State variables that could be declared constant 25
9) Short Address 25
10) Timestamp Dependence 26
11) Manuplated Balance 26
10) Wrtie after write 27
B. Access Control 27
C. Trigger Halt Mechanism 32
Ⅳ. Experiments and Results 35
Ⅴ. Conclusion 45
Reference 46