-
-
Notifications
You must be signed in to change notification settings - Fork 84
ETH enumerate undergoing #1
Comments
Yes it's more complex. In your case, the jump target offset is calculated dynamically when the The SSA engine only do static analysis (stack evaluation) and not dynamic analysis meaning that it will not calculate the result of I'm currently working on EVM symbolic execution, can you provide me the complete bytecode and i will try to make it work ;) |
Thanks for you replay, Thank you very much |
Thanks,
The jump target is the result of Thank for your feedback |
I have added some code into the Ethereum part of Octopus. In case of basic arithmetic operation (like You will need to run If you get some other bugs/crashes, don't hesitate to create issues with the smart contract address and i will fixes them ASAP ;) |
Thank you very much,and while using it I encounter another question. When it analysis bytecode like https://etherscan.io/address/0x4Ea7De704bd13D48a2FdB5C81D54dBC50fE49319#code , it will cause an MEMORY ERROR. I wonder how to resolve it. some other contract : Thank you. |
Thanks for the report, i have created a specific ticket #3 for the memory issue. |
I noticed that there is something wrong when I am using this fantastic lib. It can not analysis ETH bytecode correctly when there is bytecode like
And I find a comment in function
ssa_stack_memory_storage_flow_instruction
I think is is because the
push_instr.ssa
is something likeADD PUSH XXX, PUSH YYY
.I wonder why you have not do this job. Is there something more complex hiding?
The text was updated successfully, but these errors were encountered: