Testing Smart Contract Security with AVVERIFIER | HackerNoon
Briefly

No existing smart contract analysis framework effectively detects address verification vulnerabilities. AVVERIFIER was developed as a solution and contrasted against established tools like Mythril, Ethainter, Jackal, and ETHBMC. Mythril operates as a symbolic executor to find vulnerabilities, but needed modifications to address these gaps. Ethainter analyzes source code to extract control and data flow dependencies, requiring similar enhancements for vulnerability detection. The evaluation highlights the challenges of existing frameworks and emphasizes the need for robust address verification analysis.
To the best of our knowledge, no existing smart contract analysis framework supports the detection of address verification vulnerabilities, highlighting a significant gap in the current tools available.
Mythril, Ethainter, Jackal, and ETHBMC are popular contract analyzers that serve as baselines for illustrating the effectiveness of AVVERIFIER in detecting address verification vulnerabilities.
Read at Hackernoon
[
|
]