Trail of Bits Blog
Menu
Skip to content
Home
Category Archives:
Attacks
Towards Practical Security Optimizations for Binaries
March 25, 2022
Detecting MISO and Opyn’s msg.value reuse vulnerability with Slither
December 16, 2021
Using osquery for remote forensics
May 31, 2019
Contract upgrade anti-patterns
September 5, 2018
You could have invented that Bluetooth attack
August 1, 2018
The DBIR’s ‘Forest’ of Exploit Signatures
May 5, 2016
Writing Exploits with the Elderwood Kit (Part 2)
May 20, 2013
Writing Exploits with the Elderwood Kit (Part 1)
May 14, 2013
Elderwood and the Department of Labor Hack
May 13, 2013
Post navigation
Loading Comments...
Write a Comment...
Email (Required)
Name (Required)
Website