Trail of Bits Blog

Menu

Skip to content
  • Home

Yearly Archives: 2014

Close Encounters with Symbolic Execution (Part 2) December 4, 2014
Close Encounters with Symbolic Execution November 25, 2014
Speaker Lineup for THREADS ’14: Scaling Security October 2, 2014
We’re Sponsoring the NYU-Poly Women’s Cybersecurity Symposium September 29, 2014
Enabling Two-Factor Authentication (2FA) for Apple ID and DropBox September 2, 2014
ReMASTering Applications by Obfuscating during Compilation August 20, 2014
McSema is Officially Open Source! August 7, 2014
Education Initiative Spotlight: THREADS Call for Papers August 1, 2014
Education Initiative Spotlight: Build it Break it July 30, 2014
Education Initiative Spotlight: CSAW Summer Program for Women July 28, 2014

Post navigation

← Older posts

About Us

Since 2012, Trail of Bits has helped secure some of the world’s most targeted organizations and products. We combine high-­end security research with a real­ world attacker mentality to reduce risk and fortify code.

Read more at www.trailofbits.com

Subscribe via RSS

RSS feed RSS - Posts

Recent Posts

  • Don’t overextend your Oblivious Transfer
  • Security flaws in an SSO plugin for Caddy
  • Holy Macroni! A recipe for progressive language enhancement
  • Secure your Apollo GraphQL server with Semgrep
  • iVerify is now an independent company!
  • The Engineer’s Guide to Blockchain Finality
  • Can you pass the Rekt test?
  • Use our suite of eBPF libraries
  • A mistake in the bulletproofs paper could have led to the theft of millions of dollars
  • How AI will affect cybersecurity: What we told the CFTC
  • The future of Clang-based tooling
  • Announcing the Trail of Bits Testing Handbook
  • Fuzzing on-chain contracts with Echidna
  • Trail of Bits’s Response to OSTP National Priorities for AI RFI
  • Evaluating blockchain security maturity

Yearly Archive

  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012

Categories

  • Apple (13)
  • Attacks (12)
  • Audits (8)
  • Authentication (5)
  • Binary Ninja (14)
  • Blockchain (58)
  • Capture the Flag (11)
  • Careers (2)
  • CodeQL (3)
  • Compilers (26)
  • Conferences (30)
  • Containers (2)
  • Cryptography (45)
  • Crytic (4)
  • Cyber Grand Challenge (7)
  • DARPA (21)
  • Dynamic Analysis (13)
  • Ecosystem Security (1)
  • Education (16)
  • Empire Hacking (7)
  • Engineering Practice (15)
  • Events (7)
  • Exploits (30)
  • Fuzzing (33)
  • Go (5)
  • Guides (13)
  • Internship Projects (34)
  • iVerify (5)
  • Kubernetes (2)
  • Linux (2)
  • Machine Learning (11)
  • Malware (7)
  • Manticore (17)
  • McSema (11)
  • Meta (12)
  • Mitigations (11)
  • osquery (22)
  • Paper Review (11)
  • People (6)
  • Podcast (1)
  • Policy (9)
  • Press Release (29)
  • Privacy (9)
  • Products (8)
  • Program Analysis (18)
  • Recruitment (1)
  • Remote Work (1)
  • Research Practice (22)
  • Reversing (15)
  • Rust (4)
  • SafeDocs (1)
  • Semgrep (2)
  • Sinter (1)
  • Slither (3)
  • Sponsorships (12)
  • Static Analysis (29)
  • Symbolic Execution (18)
  • Training (2)
  • Uncategorized (33)
  • Windows (1)
  • Working at Trail of Bits (2)
  • Year in Review (5)
  • Zero Knowledge (10)
My Tweets
Trail of Bits Blog
Proudly powered by WordPress Theme: Everyday.
 

Loading Comments...