Trail of Bits Blog

Menu

Skip to content
  • Home

Category Archives: Capture the Flag

What do La Croix, octonions, and Second Life have in common? January 2, 2019
CSAW CTF Crypto Challenge: Breaking DSA December 17, 2018
Hands on the Ethernaut CTF November 6, 2017
An extra bit of analysis for Clemency July 30, 2017
Magic with Manticore May 15, 2017
2000 cuts with Binary Ninja June 3, 2016
Why we give so much to CSAW October 30, 2015
Flare-On Reversing Challenges 2015 September 9, 2015
Closing the Windows Gap May 13, 2015
Trail of Bits Releases Capture the Flag Field Guide May 20, 2014

Post navigation

About Us

Since 2012, Trail of Bits has helped secure some of the world’s most targeted organizations and products. We combine high-­end security research with a real­ world attacker mentality to reduce risk and fortify code.

Read more at www.trailofbits.com

Subscribe via RSS

RSS Feed RSS - Posts

Recent Posts

  • Good idea, bad design: How the Diamond standard falls short
  • Efficient audits with machine learning and Slither-simil
  • Let’s build a high-performance fuzzer with GPUs!
  • Osquery: Using D-Bus to query systemd data
  • Detecting Iterator Invalidation with CodeQL
  • PrivacyRaven Has Left the Nest
  • Graphtage: A New Semantic Diffing Tool
  • Using Echidna to test a smart contract library
  • Sinter: New user-mode security enforcement for macOS
  • Accidentally stepping on a DeFi lego
  • Contract verification made easier
  • Advocating for change
  • Upgradeable contracts made safer with Crytic
  • ECDSA: Handle with Care
  • How to check if a mutex is locked in Go

Yearly Archive

  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012

Categories

  • Apple (13)
  • Attacks (7)
  • Audits (1)
  • Authentication (5)
  • Binary Ninja (11)
  • Blockchain (42)
  • Capture the Flag (10)
  • CodeQL (1)
  • Compilers (20)
  • Conferences (27)
  • Containers (2)
  • Cryptography (28)
  • Crytic (2)
  • Cyber Grand Challenge (7)
  • DARPA (19)
  • Dynamic Analysis (12)
  • Education (13)
  • Empire Hacking (7)
  • Engineering Practice (11)
  • Events (5)
  • Exploits (23)
  • Fuzzing (26)
  • Go (3)
  • Guides (8)
  • Internship Projects (23)
  • iVerify (4)
  • Kubernetes (2)
  • Linux (1)
  • Malware (7)
  • Manticore (14)
  • McSema (11)
  • Meta (10)
  • Mitigations (9)
  • osquery (21)
  • Paper Review (11)
  • Press Release (22)
  • Privacy (8)
  • Products (5)
  • Program Analysis (15)
  • Research Practice (10)
  • Reversing (12)
  • Rust (3)
  • SafeDocs (1)
  • Sinter (1)
  • Sponsorships (12)
  • Static Analysis (21)
  • Symbolic Execution (15)
  • Training (1)
  • Year in Review (4)
My Tweets