Trail of Bits Blog

Menu

Skip to content
  • Home

Category Archives: Attacks

Security flaws in an SSO plugin for Caddy September 18, 2023
Readline crime: exploiting a SUID logic bug February 16, 2023
Stranger Strings: An exploitable flaw in SQLite October 25, 2022
Towards Practical Security Optimizations for Binaries March 25, 2022
Detecting MISO and Opyn’s msg.value reuse vulnerability with Slither December 16, 2021
Using osquery for remote forensics May 31, 2019
Contract upgrade anti-patterns September 5, 2018
You could have invented that Bluetooth attack August 1, 2018
The DBIR’s ‘Forest’ of Exploit Signatures May 5, 2016
Writing Exploits with the Elderwood Kit (Part 2) May 20, 2013

Post navigation

← Older posts

About Us

Since 2012, Trail of Bits has helped secure some of the world’s most targeted organizations and products. We combine high-­end security research with a real­ world attacker mentality to reduce risk and fortify code.

Read more at www.trailofbits.com

Subscribe via RSS

RSS feed RSS - Posts

Recent Posts

  • Pitfalls of relying on eBPF for security monitoring (and some solutions)
  • Don’t overextend your Oblivious Transfer
  • Security flaws in an SSO plugin for Caddy
  • Holy Macroni! A recipe for progressive language enhancement
  • Secure your Apollo GraphQL server with Semgrep
  • iVerify is now an independent company!
  • The Engineer’s Guide to Blockchain Finality
  • Can you pass the Rekt test?
  • Use our suite of eBPF libraries
  • A mistake in the bulletproofs paper could have led to the theft of millions of dollars
  • How AI will affect cybersecurity: What we told the CFTC
  • The future of Clang-based tooling
  • Announcing the Trail of Bits Testing Handbook
  • Fuzzing on-chain contracts with Echidna
  • Trail of Bits’s Response to OSTP National Priorities for AI RFI

Yearly Archive

  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012

Categories

  • Apple (13)
  • Attacks (12)
  • Audits (8)
  • Authentication (5)
  • Binary Ninja (14)
  • Blockchain (58)
  • Capture the Flag (11)
  • Careers (2)
  • CodeQL (3)
  • Compilers (26)
  • Conferences (30)
  • Containers (2)
  • Cryptography (45)
  • Crytic (4)
  • Cyber Grand Challenge (7)
  • DARPA (21)
  • Dynamic Analysis (13)
  • Ecosystem Security (1)
  • Education (16)
  • Empire Hacking (7)
  • Engineering Practice (15)
  • Events (7)
  • Exploits (30)
  • Fuzzing (33)
  • Go (5)
  • Guides (14)
  • Internship Projects (34)
  • iVerify (5)
  • Kubernetes (2)
  • Linux (3)
  • Machine Learning (11)
  • Malware (7)
  • Manticore (17)
  • McSema (11)
  • Meta (12)
  • Mitigations (11)
  • osquery (22)
  • Paper Review (11)
  • People (6)
  • Podcast (1)
  • Policy (9)
  • Press Release (29)
  • Privacy (9)
  • Products (8)
  • Program Analysis (18)
  • Recruitment (1)
  • Remote Work (1)
  • Research Practice (22)
  • Reversing (15)
  • Rust (4)
  • SafeDocs (1)
  • Semgrep (2)
  • Sinter (1)
  • Slither (3)
  • Sponsorships (12)
  • Static Analysis (29)
  • Symbolic Execution (18)
  • Training (2)
  • Uncategorized (33)
  • Windows (1)
  • Working at Trail of Bits (2)
  • Year in Review (5)
  • Zero Knowledge (10)
My Tweets
Trail of Bits Blog
Proudly powered by WordPress Theme: Everyday.
 

Loading Comments...