Trail of Bits Blog

Menu

Skip to content
  • Home

Category Archives: Attacks

Readline crime: exploiting a SUID logic bug February 16, 2023
Stranger Strings: An exploitable flaw in SQLite October 25, 2022
Towards Practical Security Optimizations for Binaries March 25, 2022
Detecting MISO and Opyn’s msg.value reuse vulnerability with Slither December 16, 2021
Using osquery for remote forensics May 31, 2019
Contract upgrade anti-patterns September 5, 2018
You could have invented that Bluetooth attack August 1, 2018
The DBIR’s ‘Forest’ of Exploit Signatures May 5, 2016
Writing Exploits with the Elderwood Kit (Part 2) May 20, 2013
Writing Exploits with the Elderwood Kit (Part 1) May 14, 2013

Post navigation

← Older posts

About Us

Since 2012, Trail of Bits has helped secure some of the world’s most targeted organizations and products. We combine high-­end security research with a real­ world attacker mentality to reduce risk and fortify code.

Read more at www.trailofbits.com

Subscribe via RSS

RSS feed RSS - Posts

Recent Posts

  • Codex (and GPT-4) can’t beat humans on smart contract audits
  • Circomspect has more passes!
  • We need a new way to measure AI security
  • Reusable properties for Ethereum contracts
  • Escaping well-configured VSCode extensions (for profit)
  • Escaping misconfigured VSCode extensions
  • Readline crime: exploiting a SUID logic bug
  • cURL audit: How a joke led to significant findings
  • Harnessing the eBPF Verifier
  • Introducing RPC Investigator
  • Announcing a stable release of sigstore-python
  • Keeping the wolves out of wolfSSL
  • Another prolific year of open-source contributions
  • How to share what you’ve learned from our audits
  • Fast and accurate syntax searching for C and C++

Yearly Archive

  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012

Categories

  • Apple (13)
  • Attacks (11)
  • Audits (5)
  • Authentication (5)
  • Binary Ninja (14)
  • Blockchain (53)
  • Capture the Flag (11)
  • Careers (2)
  • CodeQL (3)
  • Compilers (24)
  • Conferences (28)
  • Containers (2)
  • Cryptography (42)
  • Crytic (4)
  • Cyber Grand Challenge (7)
  • DARPA (21)
  • Dynamic Analysis (12)
  • Education (16)
  • Empire Hacking (7)
  • Engineering Practice (14)
  • Events (6)
  • Exploits (29)
  • Fuzzing (32)
  • Go (4)
  • Guides (12)
  • Internship Projects (33)
  • iVerify (4)
  • Kubernetes (2)
  • Linux (2)
  • Machine Learning (8)
  • Malware (7)
  • Manticore (17)
  • McSema (11)
  • Meta (12)
  • Mitigations (9)
  • osquery (22)
  • Paper Review (11)
  • People (1)
  • Podcast (1)
  • Press Release (28)
  • Privacy (9)
  • Products (7)
  • Program Analysis (17)
  • Recruitment (1)
  • Remote Work (1)
  • Research Practice (20)
  • Reversing (14)
  • Rust (4)
  • SafeDocs (1)
  • Sinter (1)
  • Slither (3)
  • Sponsorships (12)
  • Static Analysis (28)
  • Symbolic Execution (18)
  • Training (2)
  • Uncategorized (26)
  • Working at Trail of Bits (2)
  • Year in Review (5)
  • Zero Knowledge (10)
My Tweets
Trail of Bits Blog
Proudly powered by WordPress Theme: Everyday.
 

Loading Comments...