The Confusing World of Smart Contract Security - Stefan Beyer

Поділитися
Вставка
  • Опубліковано 16 жов 2024
  • Over the last few years a number of security options have emerged, ranging from formal verification to audit competitions and bug bounties. However, we still see protocols exploited on a weekly basis. With many options available to them and questionable track records, protocols are left to wonder why and how they should invest in security. In this talk we compare different security methodologies and look back a number a number of recent high-profile exploits.

КОМЕНТАРІ •