Talk

I tried reverse engineering a Solana smart contract and it drove me to insanity: here’s why.

March 19, 17:00 (CLOUD)

We’re gonna do a small but deep dive into Solana smart contracts. They are written in Rust and this complicates things… a lot. Reversing Rust binaries has the high potential of long-lasting emotional trauma. Luckily in Solana we can use a couple of tricks to avoid some of the worst parts. No knowledge of Solana required (it’s just eBPF in the end).

Speaker

Luca Di Bartolomeo

Luca Di Bartolomeo is a final year PhD student in the HexHive lab at EPFL working on Binary Analysis and Mobile Security. His research focuses on static analysis, ranging from performant analysis passes scanning millions of Android apps to surgical analysis of AArch64 executables that enables accurately rewriting them without source code. He thrives in the CTF community: he qualified for DEFCON CTF finals for four consecutive years, and led the creation and organization of LakeCTF for the past three years.

Organized by

Technology partners

Partner events

Scroll to Top