Trail of Bits Blog

Menu

Skip to content
  • Home

Category Archives: Cryptography

Reverie: An optimized zero-knowledge proof system December 14, 2020
ECDSA: Handle with Care June 11, 2020
Detecting Bad OpenSSL Usage May 29, 2020
Verifying Windows binaries, without Windows May 27, 2020
Reinventing Vulnerability Disclosure using Zero-knowledge Proofs May 21, 2020
Themes from Real World Crypto 2020 January 23, 2020
Exploiting the Windows CryptoAPI Vulnerability January 16, 2020
How safe browsing fails to protect user privacy October 30, 2019
Multi-Party Computation on Machine Learning October 4, 2019
Crypto 2019 Takeaways September 11, 2019

Post navigation

← Older posts

About Us

Since 2012, Trail of Bits has helped secure some of the world’s most targeted organizations and products. We combine high-­end security research with a real­ world attacker mentality to reduce risk and fortify code.

Read more at www.trailofbits.com

Subscribe via RSS

RSS Feed RSS - Posts

Recent Posts

  • Breaking Aave Upgradeability
  • Reverie: An optimized zero-knowledge proof system
  • High-fidelity build instrumentation with blight
  • Smart (and simple) ways to prevent symlink attacks in Go
  • Good idea, bad design: How the Diamond standard falls short
  • Efficient audits with machine learning and Slither-simil
  • Let’s build a high-performance fuzzer with GPUs!
  • Osquery: Using D-Bus to query systemd data
  • Detecting Iterator Invalidation with CodeQL
  • PrivacyRaven Has Left the Nest
  • Graphtage: A New Semantic Diffing Tool
  • Using Echidna to test a smart contract library
  • Sinter: New user-mode security enforcement for macOS
  • Accidentally stepping on a DeFi lego
  • Contract verification made easier

Yearly Archive

  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012

Categories

  • Apple (13)
  • Attacks (7)
  • Audits (1)
  • Authentication (5)
  • Binary Ninja (11)
  • Blockchain (43)
  • Capture the Flag (10)
  • CodeQL (1)
  • Compilers (21)
  • Conferences (27)
  • Containers (2)
  • Cryptography (29)
  • Crytic (2)
  • Cyber Grand Challenge (7)
  • DARPA (19)
  • Dynamic Analysis (12)
  • Education (13)
  • Empire Hacking (7)
  • Engineering Practice (11)
  • Events (5)
  • Exploits (25)
  • Fuzzing (26)
  • Go (4)
  • Guides (8)
  • Internship Projects (24)
  • iVerify (4)
  • Kubernetes (2)
  • Linux (1)
  • Malware (7)
  • Manticore (14)
  • McSema (11)
  • Meta (10)
  • Mitigations (9)
  • osquery (21)
  • Paper Review (11)
  • Press Release (22)
  • Privacy (8)
  • Products (5)
  • Program Analysis (15)
  • Research Practice (11)
  • Reversing (12)
  • Rust (3)
  • SafeDocs (1)
  • Sinter (1)
  • Sponsorships (12)
  • Static Analysis (21)
  • Symbolic Execution (15)
  • Training (1)
  • Year in Review (4)
My Tweets
Trail of Bits Blog
Proudly powered by WordPress Theme: Everyday.