![]() Displays guide position in pixels when placed.Vertical & horizontal guides that float on top of all else on the screen.The content of the window or the mouse position can be locked.Loupe selections for pixel accurate measurements.Copy and paste Loupe infomation (image, color, etc).Displays co-ordinates of mouse cursor for reference.Displays color under your cursor in RGB, HSB or HEX.Magnify any portion of the screen under your mouse.Define custom area settings for any OS or browser.Pre-defined content area settings for latest browsers.Templates for the iPhone & Windows Mobile.Displays usable screen content areas for Mac or Win.Pre-defined screen templates or create your own.Easily see the usable real estate for any screen size.Snap ruler height, length & rotation to set increments.Fully adjustable horizontal & vertical lengths. ![]() Powerful on-screen rulers for pixel measurements.Create screen shots of any measured element.Copy captured dimensions to the clipboard.Shrink mode "lassos" objects to find width & height.Find distance between objects quickly & easily.Find the dimensions of anything on screen instantly.In 29th USENIX Security Symposium (USENIX Security 20). TXSPECTOR: Uncovering attacks in ethereum from transactions. Mengya Zhang, Xiaokuan Zhang, Yinqian Zhang, and Zhiqiang Lin.Polkadot: Vision for a heterogeneous multi-chain framework. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Securify: Practical security analysis of smart contracts. Petar Tsankov, Andrei Dan, Dana Drachsler-Cohen, Arthur Gervais, 2018.In 2021 IEEE Symposium on Security and Privacy (SP). MAD-HTLC: because HTLC is crazy-cheap to attack. Itay Tsabary, Matan Yechieli, Alex Manuskin, and Ittay Eyal.In 30th USENIX Security Symposium (USENIX Security 21). Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications. Liya Su, Xinyue Shen, Xiangyu Du, Xiaojing Liao, 2021.In Proceedings of the Network and Distributed System Security Symposium (NDSS’19). Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks. Michael Rodler, Wenting Li, Ghassan Karame, and Lucas Davi.In Search of Interoperability: An Overview of the Cross-Chain Market. In Proceedings of the 2018 ACM symposium on principles of distributed computing. It successfully detects all known attacks and finds suspicious attacks unreported before. We evaluate Xscope on four popular cross-chain bridges. Based on those patterns, we design Xscope, an automatic tool to find security violations in cross-chain bridges and detect real-world attacks. ![]() We document three new classes of security bugs and propose a set of security properties and patterns to characterize them. ![]() To bridge the gap, we conduct the first study on the security of cross-chain bridges. With few studies focusing on the security of cross-chain bridges, the community still lacks the knowledge and tools to mitigate this significant threat. In the past year, there have been more than ten severe attacks against cross-chain bridges, causing billions of loss. However, while providing efficient and flexible cross-chain asset transfer, the complex workflow involving both on-chain smart contracts and off-chain programs causes emerging security issues. Cross-Chain bridges have become the most popular solution to support asset interoperability between heterogeneous blockchains. ![]()
0 Comments
Leave a Reply. |