Skip to content

apehex/web3-evasion-techniques

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

37 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Evading Detection In Web3

Smart contracts are core tools for scammers and protocol attackers to steal digital assets.

As there is now more scrutiny by both users and security tools, scammers are answering with deception.

There is a long history of malware detection and evasion growing side-by-side in the binary and web2 spaces.

It is very likely web3 will follow the same path: this repository will detail the latest developments.

Report

Exports

The current version of the report is available in PDF in the report subfolder.

It has 3 different variants based on the theme: dark / Forta / light.

The figures are also exported separately in the figures subfolder.

Compiling with LaTeX

From the root directory of the repository:

cd sources/
lualatex --output-directory ../report/ dark.tex
lualatex --output-directory ../figures/ figures/light.tex

The report can be built with pdflatex, xetex or lualatex.

The Forta theme requires either xetex or lualatex since it is using specific fonts.

Malware Samples

Some techniques are illustrated with POC / real-world examples.

The goal is to build a labeled dataset of malicious code.

About

2023 SOTA on evading detection, for web3 malware.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages