Research

A collection of 41 posts

Understand EVM bytecode – Part 4

Understand EVM bytecode – Part 4

In previous section:Understand EVM bytecode – Part 1Understand EVM bytecode – Part 2Understand EVM bytecode – Part 3We have talked about how different Solidity data types ...

Understand EVM bytecode – Part 3

Understand EVM bytecode – Part 3

In previous sections:Understand EVM bytecode – Part 1Understand EVM bytecode – Part 2We have talked about creation and runtime parts of the EVM bytecode. We ...

Understand EVM bytecode – Part 2

Understand EVM bytecode – Part 2

In the first section,Understand EVM bytecode – Part 1We have inspected the contract creation part of the EVM bytecode of the smart contract. In ...

How to Stop Snooping Android Apps

How to Stop Snooping Android Apps

Are you worried Android apps are secretly recording what you say or what you do? A new study from computer science researchers at Northeastern ...

A Trojan Disguised as a Keyboard App

A Trojan Disguised as a Keyboard App

A Trojan disguised as a keyboard app performs various operations on a user’s deviceTrustlook Labs discovered a Trojan taking advantage of the “su” ...