📥 Download the slides: [ Ссылка ]
Today I'm showing how EVM disassembly works and how to reconstruct the control flow graph (CFG) of an Ethereum smart contract when you only have access to the bytecode (closed-source). It's really useful when you're looking to analyze in-depth a contract at the EVM assembly level.
#Reversing #Ethereum #EVM
00:00 Introduction
02:04 Introduction to EVM reversing
05:08 Bytecode disassembly
07:26 Control Flow Graph (CFG) reconstruction
13:26 Fonctions identification
16:55 Functions name recovery
19:54 Example with the Bored Ape (BAYC) contract
22:46 Why use reverse engineering on Ethereum smart contract?
24:46 Bytecode optimization
27:25 Smart contract Post-mortem analysis
28:46 Conclusion
Links:
- [ Ссылка ]
- Video Devcon4: [ Ссылка ]
- Bored Ape (BAYC) contract: [ Ссылка ]
- Ethereum Signature Database: [ Ссылка ]
- [ Ссылка ]
==== 💻 FuzzingLabs Training ====
- C/C++ Whitebox Fuzzing: [ Ссылка ]
- Rust Security Audit and Fuzzing: [ Ссылка ]
- WebAssembly Reversing and Dynamic Analysis: [ Ссылка ]
- Go Security Audit and Fuzzing: [ Ссылка ]
==== 🦄 Join the community ====
[ Ссылка ]
==== 📡 Socials ====
- Twitter: [ Ссылка ]
- Telegram: [ Ссылка ]
- TikTok: [ Ссылка ]
Keywords: Reversing, Reverse Engineering, EVM, Ethereum Smart contract, Solidity, Disassembly, Decompilation, EVM bytecode, opcode
Link to this video: [ Ссылка ]
Ещё видео!