Tagged articles
13 articles
Page 1 of 1
AntTech
AntTech
Apr 2, 2024 · Information Security

Web3 Anti-Money Laundering Platform: Real-Time Risk Identification and Prevention

This article outlines Ant Group's Web3 multi‑dimensional intelligent anti‑money‑laundering platform, detailing common cryptocurrency risk types, regulatory compliance challenges, and the platform's real‑time monitoring, contract scanning, and graph‑based risk tagging capabilities for proactive detection and rapid response.

Regulatory ComplianceRisk DetectionWeb3
0 likes · 9 min read
Web3 Anti-Money Laundering Platform: Real-Time Risk Identification and Prevention
OPPO Amber Lab
OPPO Amber Lab
Mar 28, 2024 · Information Security

What Security Challenges Will Shape Smart AI Terminals? Insights from the 2024 IEEE‑OPPO Pan‑Terminal Security Forum

The 2024 IEEE‑OPPO Pan‑Terminal Security Forum, held on March 29 at Xi'an Jiaotong University, gathers leading researchers to discuss AI, IoT, blockchain, and smart contract security, presenting cutting‑edge threats, defense strategies, and future technical capabilities for intelligent terminal products.

AI securityIoT securityadversarial attacks
0 likes · 10 min read
What Security Challenges Will Shape Smart AI Terminals? Insights from the 2024 IEEE‑OPPO Pan‑Terminal Security Forum
AntTech
AntTech
Aug 23, 2023 · Blockchain

Explorations in Web3 Ecosystem Security: Threat Landscape, Research Achievements, and Future Directions

The article reviews the rapid rise of Web3, outlines the severe security challenges and economic losses caused by attacks on cross‑chain bridges, DeFi platforms, and smart contracts, and details Ant Group's Sky Dome Lab research on platform, contract, and client‑side defenses along with future AI‑driven initiatives.

DeFiSmart ContractWeb3
0 likes · 9 min read
Explorations in Web3 Ecosystem Security: Threat Landscape, Research Achievements, and Future Directions
AntTech
AntTech
Jun 15, 2023 · Blockchain

Euler Protocol DeFi Attack: Detailed Analysis, Reproduction, and Risk Assessment

This article provides a comprehensive technical analysis of the March 2023 Euler Protocol flash‑loan attack, describing the vulnerability in the donateToReserves function, step‑by‑step attack execution, on‑chain data, reproduced exploit code, simulation of attack parameters, and broader security implications for DeFi platforms.

DeFi AttackEuler ProtocolFlash Loan
0 likes · 17 min read
Euler Protocol DeFi Attack: Detailed Analysis, Reproduction, and Risk Assessment
AntTech
AntTech
Apr 20, 2023 · Information Security

Exploring ChatGPT for Smart Contract Vulnerability Detection: Experiments and Analysis

This study investigates the capability of ChatGPT, a large language model, to detect common smart‑contract vulnerabilities, evaluates its performance against traditional tools across multiple datasets, and discusses its strengths, limitations, and future potential in blockchain security auditing.

AIChatGPTSmart Contract
0 likes · 23 min read
Exploring ChatGPT for Smart Contract Vulnerability Detection: Experiments and Analysis
Bilibili Tech
Bilibili Tech
Jun 28, 2022 · Information Security

Code Branch Avoidance Techniques in SM2 Elliptic Curve Cryptographic Implementations

The article explains how data‑dependent branches in SM2 elliptic‑curve implementations leak secret keys via power, EM, and cache side‑channels, compares point addition and doubling, critiques Montgomery ladder timing leaks, and proposes a branch‑free select‑based scalar multiplication to achieve constant‑time security at some performance cost.

Montgomery LadderSM2 cryptographySide-channel attack
0 likes · 11 min read
Code Branch Avoidance Techniques in SM2 Elliptic Curve Cryptographic Implementations
AntTech
AntTech
Dec 16, 2021 · Information Security

CNCC2021 Technical Forum – Security Challenges in Digital Transformation

CNCC2021’s technical forum, held on December 17, 2021, gathered leading academics and industry experts to discuss privacy computing, secure multiparty computation, AI-driven cybersecurity, single sign‑on privacy, Yao’s garbled circuits, and blockchain smart‑contract security, highlighting emerging risks and solutions for digital transformation.

AI securityDigital TransformationPrivacy Computing
0 likes · 11 min read
CNCC2021 Technical Forum – Security Challenges in Digital Transformation
Senior Brother's Insights
Senior Brother's Insights
Aug 28, 2018 · Blockchain

How a DoS Attack Secured the Fomo3D Ethereum Game Winner

The article dissects the sophisticated DoS attack that let a player win the Fomo3D Ethereum game by flooding the transaction pool with high‑gas‑price garbage calls, detailing the game mechanics, Ethereum gas economics, block‑by‑block execution, and the extensive technical preparation required.

DoS attackEthereumFomo3D
0 likes · 13 min read
How a DoS Attack Secured the Fomo3D Ethereum Game Winner