Chaofan Shou

我们刚刚发布了 IQ AI.

查看详情

Chaofan Shou

Chaofan Shou is the cofounder and CTO of Fuzzland, a security company specializing in automated testing tools for smart contracts and also a developer at . He is also a Ph.D. student at UC Berkeley in the Sky Computing Lab, where his research focuses on program analysis, security, and distributed systems. [1] [2] [3] [4]

Overview

Chaofan Shou has established himself as a notable figure in security and program analysis. His work spans academic research, entrepreneurship, and security engineering, with significant contributions to security and automated testing methodologies. Shou's expertise in identifying and addressing security vulnerabilities has led to the discovery of numerous critical issues across various platforms, with reported bounties reaching approximately $1.9 million. His research has been published in prestigious academic conferences, and he has delivered talks at industry events focused on blockchain security and fuzzing techniques. [1] [2] [3] [4]

Education

Shou is currently pursuing his Ph.D. at the University of California, Berkeley, where he works in the Sky Computing Lab under the supervision of Professor Koushik Sen. His doctoral research concentrates on program analysis, security, and distributed systems. Prior to his doctoral studies, Shou attended the University of California, Santa Barbara. [1] [4]

Career

Shou's professional career includes a position as a security engineer at Salesforce, where he contributed to Static Application Security Testing (SAST) solutions, internal network scanning services, and data pipelines. During this period, he developed expertise in identifying security vulnerabilities across various platforms, which served as a basis for later work with technologies.

Following his time at Salesforce, Shou became a founding engineer at Veridise, a security startup. At Veridise, he led the development of several automated testing tools specifically designed for and blockchains. His work at Veridise included the development of Chainsaw, a tool for breaking blockchains with coverage-guided fuzzing, which he presented at the Smart Contract Summit (SBC) in 2022.

Shou co-founded Fuzzland, where he currently serves as the Chief Technology Officer (CTO). Fuzzland focuses on security, particularly developing automated testing tools for smart contracts. In February 2024, Fuzzland announced the closing of a $3 million seed funding round, as reported in a Medium post by Shou. At Fuzzland, Shou has continued his work on fuzzing techniques for blockchain security, presenting "MEV + Fuzzing = DeFi Firewall" at BuildETH in 2023. [1] [2] [3] [4] [5] [6] [7] [8] [9]

Research and Publications

Shou has authored and co-authored several academic papers in the fields of security, program analysis, and distributed systems. His notable publications include:

  • "ItyFuzz: Snapshot-Based Fuzzer for On-Chain Smart Contract Auditing" (ISSTA '23), co-authored with Shangyin Tan and Koushik Sen;
  • "Query Planning for Robust and Scalable Hybrid Network Telemetry Systems" (CoNext '24), with multiple co-authors;
  • "Unveiling Collusion-Based Ad Attribution Laundering Fraud: Detection, Analysis, and Security Implications" (CCS '24);
  • "CorbFuzz: Checking Browser Security Policies with Fuzzing" (ASE '21). [1]

Throughout his career, Shou has identified and reported numerous security vulnerabilities across various platforms. His contributions to bug bounty programs between 2020 and 2022 resulted in approximately $1.9 million in bounties, including locked tokens. Some of his notable security findings include:

  • Remote Code Execution (RCE) vulnerabilities in RisingWave (2024);
  • Server-Side Request Forgery (SSRF) issues in Devin.ai leading to user information leaks (2024);
  • Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF) vulnerabilities in Twitter that could lead to account takeovers (2023);
  • Multiple Denial of Service (DoS) vulnerabilities in platforms like Edge and DogeChain (2022). [1]

Shou maintains an active presence on GitHub, where he has contributed to numerous repositories. His pinned projects include ItyFuzz, a bytecode-level hybrid fuzzer for , and digfuzz, an implementation of probabilistic path prioritization for hybrid fuzzing. He has also contributed to major open-source projects such as LibAFL and Facebook's Hermes JavaScript engine. [1] [3] [5] [5]

Speaking Engagements

Shou has presented his work at various industry events, including:

  • "MEV + Fuzzing = DeFi Firewall" at BuildETH in 2023, representing Fuzzland;
  • "Chainsaw: Breaking Blockchains With Coverage-Guided Fuzzing" at the Smart Contract Summit (SBC) in 2022, representing Veridise. [1] [4]

Interviews

Mitigating Smart Contract Attacks #01

On August 16, 2024, Chaofan Shou appeared in an interview on the IC3 Initiative for Cryptocurrencies and Contracts YouTube channel, presenting his views on the challenges and defense strategies against attacks. According to Shou, losses in 2024 have already exceeded US $100 million, with notable incidents such as the Ronin Bridge exploit and repeated hacks of protocols that underwent multiple audits without addressing critical flaws.

Shou points out that many attacks occur via private RPCs, preventing front‑running bots from detecting and blocking malicious transactions before they are mined. The fierce competition among defender and attacker bots, combined with skyrocketing gas fees, drastically reduces the effectiveness of on‑chain rescue attempts, he notes that no fund recoveries were successful in 2024 using front‑running alone.

According to the researcher, there is a recurring pattern in the preparatory phase of attacks: attackers often deploy exploit contracts moments before executing the malicious transaction. This detail, Shou argues, opens a window for proactive interventions. By monitoring and analyzing newly deployed contracts, defense teams could repurpose those same exploits to hijack the original attack, significantly increasing the chances of fund recovery.

To operationalize this concept, Chaofan Shou proposes the creation of a “mysterious Oracle” capable of predicting attack parameters or reconstructing exploit transactions in real time. In experiments conducted since January 2023, his team demonstrates that, with optimized parameters and exploit‑hijacking techniques, it would be possible to recover up to US $120 million in compromised funds.

Finally, Shou emphasizes the importance of combining on‑chain analysis, collaboration among research teams, and new approaches, such as programmatic repair of contracts, to create dynamic defense mechanisms. In his view, leveraging historical attack data and predictive models is essential to prevent future losses and more effectively protect the ecosystem. [10]

发现错误了吗?

编辑者

Profile picture of Anonymous userSophIA

编辑日期

April 19, 2025

编辑原因:

Republishing the Chaofan Shou wiki with updated content and media.

Loading...

参考文献

首页分类排名事件词汇表