12345678910111213141516171819202122232425 |
- \relax
- \bibstyle{plain}
- \providecommand \oddpage@label [2]{}
- \@writefile{toc}{\contentsline {section}{\numberline {1}Weakness and consequences}{1}{}\protected@file@percent }
- \@writefile{toc}{\contentsline {subsection}{\numberline {1.1}Solidity storage layout}{1}{}\protected@file@percent }
- \@writefile{toc}{\contentsline {subsection}{\numberline {1.2}The Weakness}{1}{}\protected@file@percent }
- \citation{securify}
- \citation{teether}
- \@writefile{loa}{\contentsline {algocf}{\numberline {1}{\ignorespaces A completely unchecked array write}}{2}{}\protected@file@percent }
- \@writefile{loa}{\contentsline {algocf}{\numberline {2}{\ignorespaces An incorrectly managed array length}}{2}{}\protected@file@percent }
- \@writefile{toc}{\contentsline {section}{\numberline {2}Vulnerable contracts in literature}{2}{}\protected@file@percent }
- \citation{securify}
- \citation{teether}
- \citation{fuzzdrivegen}
- \citation{smartian}
- \citation{doughoyte}
- \bibdata{exercise.bib}
- \bibcite{smartian}{1}
- \bibcite{doughoyte}{2}
- \bibcite{teether}{3}
- \bibcite{fuzzdrivegen}{4}
- \@writefile{toc}{\contentsline {section}{\numberline {3}Code properties and automatic detection}{3}{}\protected@file@percent }
- \@writefile{toc}{\contentsline {section}{\numberline {4}Exploit sketch}{3}{}\protected@file@percent }
- \bibcite{securify}{5}
- \gdef \@abspage@last{4}
|