A Methodology for Replicating Historical Exploits on EVM-Compatible Blockchains
Replicating historical exploits on blockchain platforms is essential for testing emerging real-time defense mechanisms. However, existing tools primarily fork blockchain states and replay original exploit transactions rather than replicating these hacks in new blocks. This paper introduces a methodology for replicating exploit transactions across EVM-compatible blockchains, enabling testing of new security measures. By addressing key challenges in address mapping, contract deployment and storage configuration, our approach successfully replicates 18 security challenge exploit transactions and 12 real-world exploit transactions. This evaluation results confirm the methodology’s effectiveness in recreating both controlled security challenges and real-world exploits, marking a significant advancement in smart contract security research and testing.
Sat 3 MayDisplayed time zone: Eastern Time (US & Canada) change
14:00 - 15:30 | Afternoon Session 3WETSEB at 202 Chair(s): Giuseppe Destefanis Brunel University of London, Roberto Tonelli University of Cagliari | ||
14:00 25mTalk | Liquidity Pool: A Study on Usage Trends, Profit Strategies, and Fee Structures WETSEB Antonio Pierro University of Cagliari - Department of Mathematics and Computer Science, Andy Amoordon Université Paris 1 Panthéon-Sorbonne, Fausto Camboni Independent Researcher | ||
14:25 20mTalk | A Methodology for Replicating Historical Exploits on EVM-Compatible Blockchains WETSEB Zhiyang Chen University of Toronto, Jan Gorzny Zircuit, Phillip Kemper Zircuit, Martin Derka Zircuit | ||
14:45 30mDay closing | Final Discussion and Concluding Remarks WETSEB |