Trail of Bits Blog

Menu

Skip to content
  • Home

Category Archives: Binary Ninja

2000 cuts with Binary Ninja June 3, 2016

Post navigation

Newer posts →

About Us

Since 2012, Trail of Bits has helped secure some of the world’s most targeted organizations and products. We combine high-­end security research with a real­ world attacker mentality to reduce risk and fortify code.

Read more at www.trailofbits.com

Subscribe via RSS

RSS Feed RSS - Posts

Recent Posts

  • Breaking Aave Upgradeability
  • Reverie: An optimized zero-knowledge proof system
  • High-fidelity build instrumentation with blight
  • Smart (and simple) ways to prevent symlink attacks in Go
  • Good idea, bad design: How the Diamond standard falls short
  • Efficient audits with machine learning and Slither-simil
  • Let’s build a high-performance fuzzer with GPUs!
  • Osquery: Using D-Bus to query systemd data
  • Detecting Iterator Invalidation with CodeQL
  • PrivacyRaven Has Left the Nest
  • Graphtage: A New Semantic Diffing Tool
  • Using Echidna to test a smart contract library
  • Sinter: New user-mode security enforcement for macOS
  • Accidentally stepping on a DeFi lego
  • Contract verification made easier

Yearly Archive

  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012

Categories

  • Apple (13)
  • Attacks (7)
  • Audits (1)
  • Authentication (5)
  • Binary Ninja (11)
  • Blockchain (43)
  • Capture the Flag (10)
  • CodeQL (1)
  • Compilers (21)
  • Conferences (27)
  • Containers (2)
  • Cryptography (29)
  • Crytic (2)
  • Cyber Grand Challenge (7)
  • DARPA (19)
  • Dynamic Analysis (12)
  • Education (13)
  • Empire Hacking (7)
  • Engineering Practice (11)
  • Events (5)
  • Exploits (25)
  • Fuzzing (26)
  • Go (4)
  • Guides (8)
  • Internship Projects (24)
  • iVerify (4)
  • Kubernetes (2)
  • Linux (1)
  • Malware (7)
  • Manticore (14)
  • McSema (11)
  • Meta (10)
  • Mitigations (9)
  • osquery (21)
  • Paper Review (11)
  • Press Release (22)
  • Privacy (8)
  • Products (5)
  • Program Analysis (15)
  • Research Practice (11)
  • Reversing (12)
  • Rust (3)
  • SafeDocs (1)
  • Sinter (1)
  • Sponsorships (12)
  • Static Analysis (21)
  • Symbolic Execution (15)
  • Training (1)
  • Year in Review (4)
My Tweets