Trail of Bits Blog

Menu

Skip to content
  • Home

Category Archives: Exploits

Breaking Aave Upgradeability December 16, 2020
Smart (and simple) ways to prevent symlink attacks in Go November 24, 2020
Accidentally stepping on a DeFi lego August 5, 2020
Revisiting 2000 cuts using Binary Ninja’s new decompiler April 17, 2020
Manticore discovers the ENS bug March 3, 2020
Exploiting the Windows CryptoAPI Vulnerability January 16, 2020
Introducing iVerify, the security toolkit for iPhone users November 14, 2019
Tethered jailbreaks are back September 27, 2019
Understanding Docker container escapes July 19, 2019
Avoiding Smart Contract “Gridlock” with Slither July 3, 2019

Post navigation

← Older posts

About Us

Since 2012, Trail of Bits has helped secure some of the world’s most targeted organizations and products. We combine high-­end security research with a real­ world attacker mentality to reduce risk and fortify code.

Read more at www.trailofbits.com

Subscribe via RSS

RSS Feed RSS - Posts

Recent Posts

  • The Tao of Continuous Integration
  • Serving up zero-knowledge proofs
  • Confessions of a smart contract paper reviewer
  • PDF is Broken: a justCTF Challenge
  • Breaking Aave Upgradeability
  • Reverie: An optimized zero-knowledge proof system
  • High-fidelity build instrumentation with blight
  • Smart (and simple) ways to prevent symlink attacks in Go
  • Good idea, bad design: How the Diamond standard falls short
  • Efficient audits with machine learning and Slither-simil
  • Let’s build a high-performance fuzzer with GPUs!
  • Osquery: Using D-Bus to query systemd data
  • Detecting Iterator Invalidation with CodeQL
  • PrivacyRaven Has Left the Nest
  • Graphtage: A New Semantic Diffing Tool

Yearly Archive

  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012

Categories

  • Apple (13)
  • Attacks (7)
  • Audits (1)
  • Authentication (5)
  • Binary Ninja (11)
  • Blockchain (44)
  • Capture the Flag (11)
  • CodeQL (1)
  • Compilers (21)
  • Conferences (27)
  • Containers (2)
  • Cryptography (30)
  • Crytic (2)
  • Cyber Grand Challenge (7)
  • DARPA (19)
  • Dynamic Analysis (12)
  • Education (14)
  • Empire Hacking (7)
  • Engineering Practice (11)
  • Events (5)
  • Exploits (25)
  • Fuzzing (27)
  • Go (4)
  • Guides (9)
  • Internship Projects (24)
  • iVerify (4)
  • Kubernetes (2)
  • Linux (1)
  • Malware (7)
  • Manticore (14)
  • McSema (11)
  • Meta (10)
  • Mitigations (9)
  • osquery (21)
  • Paper Review (11)
  • Press Release (22)
  • Privacy (8)
  • Products (5)
  • Program Analysis (15)
  • Research Practice (12)
  • Reversing (12)
  • Rust (3)
  • SafeDocs (1)
  • Sinter (1)
  • Sponsorships (12)
  • Static Analysis (21)
  • Symbolic Execution (15)
  • Training (1)
  • Year in Review (4)
  • Zero Knowledge (1)
My Tweets
Trail of Bits Blog
Proudly powered by WordPress Theme: Everyday.