Improve Ethereum
ETH Zurich University Computer Science students create a group to improve ETHEREUM platform

ETHEREUM Bounty Program
The Ethereum Bounty Program provides bounties for bugs. We call on our community and all bug bounty hunters to help identify bugs in the protocols and clients. Earn rewards for finding a vulnerability and get a place on our leaderboard. See Rules & Rewards section for details.
With each other, for each other

About "ETH 4 ETH" group
We are " ETH 4 ETH " group, comprise of some graduated ETH Zurich computer science students with a strong skill in Smart Contracts Platform and relevant experience in cryptocurrencies, we believe we can bring creative ideas and successful solutions to the ethereum platform.
what we do
Let's Improve Ethereum Platform
Ethereum is a decentralized platform that runs smart contracts: applications that run exactly as programmed without any possibility of downtime, censorship, fraud or third-party interference.
These apps run on a custom built blockchain, an enormously powerful shared global infrastructure that can move value around and represent the ownership of property.
Our Purposes
Protocol security
The idea for Ethereum was initially published in the White Paper. This concept has been realized in a few protocols and algorithms up for scrutiny:
The blockchain consensus protocol, state engine and virtual machine as well as encodings and Merkle Patricia trees as specified in the Yellow Paper
Help identify flaws such as ones found in the yellow paper, relating to:
Conceptual security issues in the formal specification of the Ethereum protocol.
Misaligned / unintended economic incentives and game theoretic flaws.
Security weaknesses / attacks on the PoW algorithm.
A concrete example could be a contract that consumes very little gas but leads to a lot of computational effort effectively opening the door for DoS attacks.
Client protocol implementation security
Assuming that the protocols and algorithms are flawless, does a client implementation conform to the formal protocol specification? Issues could include:
Validations of blocks, transactions and messages
Ethereum Virtual Machine code execution
Transaction execution
Contract creation
Message calls
Calculation and enforcement of gas and fees
An example of a potential issue in this category is Bitcoin’s “zero-day” flaw, which required a hard-fork.
Network security
This category focuses on generalized attacks on the whole network or a subset of it:
51% and other X% attacks.
Finney attacks.
Sybil attacks.
Replay attacks.
Transaction / messages malleability.
(global) DoS.
Here is an example from bitcoin of a global network based DoS scenario.
Node security
Attacks on a single Go client relating to the Ethereum protocol:
DoS / resource abuse
Account / wallet address gathering/probing
Broadcast / withhold attacks
DoS example from bitcoin. DoS / Resource abuse example from bitcoin.
Solidity language security
This category includes:
Incorrect behaviour of the Solidity code generator or optimizer, which could cause unintended functionality (bugs) in the generated contract code.
Here is an example of a submitted Solidity bug.

We can do it, "With YOU"
Improvment
Smart Contract
BlockChain
Investment
Support us
Invest in "ETH 4 ETH" just with 0.1 ETH and get reward up to 10X
Join this Win-Win investment
Already hundreds from scientific society supported us

Send Your ETH to This Address
keep your eth wallet safe, we reward you to the address that send us eth
0xe21B590A49F898E3C383807b43E517a654CF468e
We have received 37/50 ETH up to now