Smart Contract Short Address Attack Mitigation Failure

Reading Time: 3 minutes

Overview Our  smart contract audit team found that Short Address Attack mitigations can cause several problems with smart contracts. A Short Address Attack is when a contract receives less data than it was expecting, and Solidity fills the missing bytes with zeros. The deployed smart contract cannot prevent this and will interpret those extra zeros as […]

Security Auditing: Beware of Duplicated Storage in Solidity Smart Contract Development

Reading Time: 2 minutes

Security Smart Contract Auditing: Beware of Duplicated Storage in Solidity Smart Contract Development Solidity semantics are confusing for smart contract developers with experience in traditional programming languages. This semantics can lead to security issues like the one we found in a recent smart contract security audit we did. The following code caught our attention: In […]

Review of AppeCoin: An Alternative Anonymous Cryptocurrency

Reading Time: 6 minutes

AppeCoin, Sergio D. Lerner‘s proposal for an e-cash scheme, is designed for a peer-to-peer network which does not rely on a Trusted Third Party. Like the cryptocurrencies Monero or Zcash, AppeCoin is a protocol which aims to guarantee to its users full privacy. Lerner’s e-cash scheme leverages coin shuffling. Unlike ZeroCoin, where the monetary units […]

zk-SNARKs definition

zk-SNARKs Technically Explained: Basic Principles

Reading Time: 1

The full technical article is available here. Introduction Payment confidentiality is a property for cryptocurrencies which allows the user to hide the sender and receiver, as well as the amount of a transaction in the blockchain. Monero Research Lab invented Ring Confidential Transactions, while Zcash uses a different approach based on recent scientific progress in the field […]

ECDSA Security in Bitcoin and Ethereum: a Research Survey

Reading Time: 1

Elliptic curve cryptography is becoming more and more popular. One of its main supporters is the cryptocurrency system Bitcoin which uses an elliptic curve scheme for their digital signatures. Smaller key size, a more efficient implementation than the RSA system, and a similar level of security make elliptic curve cryptography an interesting alternative to RSA. […]