SLIDES: Reversing Ethereum WebAssembly contract 101 by Patrick Ventuzelo

SLIDES: Reversing Ethereum WebAssembly contract 101

Slides of my talk/workshop given at EthCC Paris 2020 about reversing Ewasm (Ethereum flavored WebAssembly) smart contract.
In this talk, I briefly introduce WebAssembly concepts , Ewasm specificity and opcodes/instructions. Secondly, I show how to create Ewasm smart contract and expose different techniques/tools to perform WebAssembly module closed-source analysis. Finally, we go through some basic examples to apply reversing (reverse engineering) on those Ewasm contracts and understand the logic inside.

What's included?

File Icon 1 file

Contents

ETHCC2020_reversing_ewasm_contact_101_last.pdf
2.61 MB

Patrick Ventuzelo

Patrick Ventuzelo is a French Independent Security Researcher specialized in vulnerability research, fuzzing, reverse engineering and program analysis. 

Patrick found hundreds of bugs using fuzzing and developed both open-source security tools Octopus and WARF.

Patrick is a regular speaker and trainer at various security conferences around the globe, including RingZer0, REcon Montreal, ToorCon, hack.lu, NorthSec, REcon Brussels, SSTIC, FIRST, Microsoft DCC, BlackAlps, etc.