Skip to content
  • Home
  • Attack-Matrix
  • About Us
Web3 Attack Matrix
  • Home
  • Attack-Matrix
  • About Us
Web3 Attack Matrix

Category Smart Contract Exploit

  • Smart Contract Exploit

Crypto-Jacking

  • Sirish
  • April 25, 2024
  • Smart Contract Exploit

Cross-Chain Bridge Attacks

  • Sirish
  • April 25, 2024
  • Smart Contract Exploit

Constructors with Care

  • Sirish
  • April 25, 2024
  • Smart Contract Exploit

Block Timestamp Manipulation

  • Sirish
  • April 25, 2024
  • Smart Contract Exploit

Integer Overflow/Underflow

  • Sirish
  • April 25, 2024
  • Smart Contract Exploit

Default Visibility

  • Sirish
  • April 25, 2024
  • Smart Contract Exploit

Uninitialized Storage Pointers

  • Sirish
  • April 25, 2024
  • Smart Contract Exploit

Maximal Extractable Value (MEV) Attack

  • andrea.horch@iao.fraunhofer.de
  • March 28, 2023
  • Smart Contract Exploit

Privilege escalation in smart contracts

  • Sirish
  • March 28, 2023

Copyright © 2025 Fraunhofer-Institut für Arbeitswirtschaft und Organisation (IAO)

  • Data Protection
  • Publishing Notes