Trail of Bits Blog

Menu

Skip to content
  • Home

Category Archives: DARPA

Two New Tools that Tame the Treachery of Files November 1, 2019
The Good, the Bad, and the Weird October 26, 2018
Protecting Software Against Exploitation with DARPA’s CFAR September 10, 2018
McSema: I’m liftin’ it March 14, 2017
The Smart Fuzzer Revolution February 16, 2017
Shin GRR: Make Fuzzing Fast Again November 2, 2016
A fuzzer and a symbolic executor walk into a cloud August 2, 2016
Your tool works better than mine? Prove it. August 1, 2016
The Problem with Dynamic Program Analysis March 9, 2016
How We Fared in the Cyber Grand Challenge July 15, 2015

Post navigation

← Older posts

About Us

Since 2012, Trail of Bits has helped secure some of the world’s most targeted organizations and products. We combine high-­end security research with a real­ world attacker mentality to reduce risk and fortify code.

Read more at www.trailofbits.com

Subscribe via RSS

RSS Feed RSS - Posts

Recent Posts

  • 64 Bits ought to be enough for anybody!
  • Introducing iVerify, the security toolkit for iPhone users
  • Announcing the Crytic $10k Research Prize
  • Everything You Ever Wanted To Know About Test-Case Reduction, But Didn’t Know to Ask
  • Security assessment techniques for Go projects
  • Two New Tools that Tame the Treachery of Files
  • Destroying x86_64 instruction decoders with differential fuzzing
  • How safe browsing fails to protect user privacy
  • Grace Hopper Celebration (GHC) 2019 Recap
  • Formal Analysis of the CBC Casper Consensus Algorithm with TLA+
  • Watch Your Language: Our First Vyper Audit
  • Multi-Party Computation on Machine Learning
  • TSC Frequency For All: Better Profiling and Benchmarking
  • Tethered jailbreaks are back
  • QueryCon 2019: A Turning Point for osquery

Yearly Archive

  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012

Categories

  • Apple (12)
  • Attacks (7)
  • Authentication (5)
  • Binary Ninja (10)
  • Blockchain (29)
  • Capture the Flag (10)
  • Compilers (19)
  • Conferences (24)
  • Containers (2)
  • Cryptography (22)
  • Cyber Grand Challenge (7)
  • DARPA (17)
  • Dynamic Analysis (12)
  • Education (13)
  • Empire Hacking (6)
  • Engineering Practice (9)
  • Events (5)
  • Exploits (19)
  • Fuzzing (22)
  • Go (2)
  • Guides (8)
  • Internship Projects (16)
  • iVerify (4)
  • Kubernetes (2)
  • Linux (1)
  • Malware (7)
  • Manticore (11)
  • McSema (11)
  • Meta (9)
  • Mitigations (9)
  • osquery (18)
  • Paper Review (10)
  • Press Release (19)
  • Privacy (7)
  • Products (5)
  • Program Analysis (14)
  • Research Practice (8)
  • Reversing (11)
  • Rust (3)
  • Sponsorships (12)
  • Static Analysis (20)
  • Symbolic Execution (12)
  • Training (1)
  • Year in Review (4)
My Tweets
Cancel