Trail of Bits Blog

Menu

Skip to content
  • Home

Category Archives: Compilers

Security assessment techniques for Go projects November 7, 2019
Use constexpr for faster, smaller, and safer code June 27, 2019
Creating an LLVM Sanitizer from Hopes and Dreams June 25, 2019
Leaves of Hash June 17, 2019
How McSema Handles C++ Exceptions January 21, 2019
Protecting Software Against Exploitation with DARPA’s CFAR September 10, 2018
An accessible overview of Meltdown and Spectre, Part 2 March 22, 2018
An accessible overview of Meltdown and Spectre, Part 1 January 30, 2018
Heavy lifting with McSema 2.0 January 23, 2018
A walk down memory lane April 14, 2017

Post navigation

← Older posts

About Us

Since 2012, Trail of Bits has helped secure some of the world’s most targeted organizations and products. We combine high-­end security research with a real­ world attacker mentality to reduce risk and fortify code.

Read more at www.trailofbits.com

Subscribe via RSS

RSS Feed RSS - Posts

Recent Posts

  • 64 Bits ought to be enough for anybody!
  • Introducing iVerify, the security toolkit for iPhone users
  • Announcing the Crytic $10k Research Prize
  • Everything You Ever Wanted To Know About Test-Case Reduction, But Didn’t Know to Ask
  • Security assessment techniques for Go projects
  • Two New Tools that Tame the Treachery of Files
  • Destroying x86_64 instruction decoders with differential fuzzing
  • How safe browsing fails to protect user privacy
  • Grace Hopper Celebration (GHC) 2019 Recap
  • Formal Analysis of the CBC Casper Consensus Algorithm with TLA+
  • Watch Your Language: Our First Vyper Audit
  • Multi-Party Computation on Machine Learning
  • TSC Frequency For All: Better Profiling and Benchmarking
  • Tethered jailbreaks are back
  • QueryCon 2019: A Turning Point for osquery

Yearly Archive

  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012

Categories

  • Apple (12)
  • Attacks (7)
  • Authentication (5)
  • Binary Ninja (10)
  • Blockchain (29)
  • Capture the Flag (10)
  • Compilers (19)
  • Conferences (24)
  • Containers (2)
  • Cryptography (22)
  • Cyber Grand Challenge (7)
  • DARPA (17)
  • Dynamic Analysis (12)
  • Education (13)
  • Empire Hacking (6)
  • Engineering Practice (9)
  • Events (5)
  • Exploits (19)
  • Fuzzing (22)
  • Go (2)
  • Guides (8)
  • Internship Projects (16)
  • iVerify (4)
  • Kubernetes (2)
  • Linux (1)
  • Malware (7)
  • Manticore (11)
  • McSema (11)
  • Meta (9)
  • Mitigations (9)
  • osquery (18)
  • Paper Review (10)
  • Press Release (19)
  • Privacy (7)
  • Products (5)
  • Program Analysis (14)
  • Research Practice (8)
  • Reversing (11)
  • Rust (3)
  • Sponsorships (12)
  • Static Analysis (20)
  • Symbolic Execution (12)
  • Training (1)
  • Year in Review (4)
My Tweets
Cancel