Mojtaba Eshghie

Results 15 comments of Mojtaba Eshghie

This could alternatively be done merely via doing the first step (in DCR simulation) manually. We can do this for now for the replication package of the paper (add a...

- [ ] updateRBAC is not yet invoked each time an event is executed. - [ ] When an activity is sent for the DCR engine, the role is not...

On second thoughts this would have been a deterimental vulnerability of the monitoring system if implemented like this. In simple words, any function could change the roles of an account...

Tools, libraries, etc: We might be able to work with a simpler one for instance sequence fuzzers: [Effectively Generating Vulnerable Transaction Sequences in Smart Contracts with Reinforcement Learning-guided Fuzzing](https://dl.acm.org/doi/abs/10.1145/3551349.3560429) [ityfuzz](https://github.com/fuzzland/ityfuzz)...

Also this might be helpful: https://github.com/e0ipso/plugnplay

A symbolic testing tool for EVM smart contracts [https://github.com/a16z/halmos/](https://github.com/a16z/halmos/)

A repo to showcase web3 hacks [https://github.com/Cyfrin/sc-exploits-minimized](https://github.com/Cyfrin/sc-exploits-minimized)

Kontrol combines KEVM and Foundry to grant developers the ability to perform formal verification without learning a new language or tool. [https://github.com/runtimeverification/kontrol](https://github.com/runtimeverification/kontrol) K Tutorial [https://github.com/runtimeverification/k/tree/master/k-distribution/k-tutorial](https://github.com/runtimeverification/k/tree/master/k-distribution/k-tutorial)

Transaction trace_call RPC Method (quicknode) Look at *stateDiff* parameter: *It returns the information on altered Ethereum state due to execution of the given transaction* [https://www.quicknode.com/docs/ethereum/trace_call](https://www.quicknode.com/docs/ethereum/trace_call)