Trail of Bits Blog

Menu

Skip to content
  • Home

Category Archives: Exploits

Introducing iVerify, the security toolkit for iPhone users November 14, 2019
Tethered jailbreaks are back September 27, 2019
Understanding Docker container escapes July 19, 2019
Avoiding Smart Contract “Gridlock” with Slither July 3, 2019
The Good, the Bad, and the Weird October 26, 2018
An accessible overview of Meltdown and Spectre, Part 2 March 22, 2018
“AMD Flaws” Technical Summary March 15, 2018
An accessible overview of Meltdown and Spectre, Part 1 January 30, 2018
Let’s talk about CFI: Microsoft Edition December 27, 2016
Let’s talk about CFI: clang edition October 17, 2016

Post navigation

← Older posts

About Us

Since 2012, Trail of Bits has helped secure some of the world’s most targeted organizations and products. We combine high-­end security research with a real­ world attacker mentality to reduce risk and fortify code.

Read more at www.trailofbits.com

Subscribe via RSS

RSS Feed RSS - Posts

Recent Posts

  • 64 Bits ought to be enough for anybody!
  • Introducing iVerify, the security toolkit for iPhone users
  • Announcing the Crytic $10k Research Prize
  • Everything You Ever Wanted To Know About Test-Case Reduction, But Didn’t Know to Ask
  • Security assessment techniques for Go projects
  • Two New Tools that Tame the Treachery of Files
  • Destroying x86_64 instruction decoders with differential fuzzing
  • How safe browsing fails to protect user privacy
  • Grace Hopper Celebration (GHC) 2019 Recap
  • Formal Analysis of the CBC Casper Consensus Algorithm with TLA+
  • Watch Your Language: Our First Vyper Audit
  • Multi-Party Computation on Machine Learning
  • TSC Frequency For All: Better Profiling and Benchmarking
  • Tethered jailbreaks are back
  • QueryCon 2019: A Turning Point for osquery

Yearly Archive

  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012

Categories

  • Apple (12)
  • Attacks (7)
  • Authentication (5)
  • Binary Ninja (10)
  • Blockchain (29)
  • Capture the Flag (10)
  • Compilers (19)
  • Conferences (24)
  • Containers (2)
  • Cryptography (22)
  • Cyber Grand Challenge (7)
  • DARPA (17)
  • Dynamic Analysis (12)
  • Education (13)
  • Empire Hacking (6)
  • Engineering Practice (9)
  • Events (5)
  • Exploits (19)
  • Fuzzing (22)
  • Go (2)
  • Guides (8)
  • Internship Projects (16)
  • iVerify (4)
  • Kubernetes (2)
  • Linux (1)
  • Malware (7)
  • Manticore (11)
  • McSema (11)
  • Meta (9)
  • Mitigations (9)
  • osquery (18)
  • Paper Review (10)
  • Press Release (19)
  • Privacy (7)
  • Products (5)
  • Program Analysis (14)
  • Research Practice (8)
  • Reversing (11)
  • Rust (3)
  • Sponsorships (12)
  • Static Analysis (20)
  • Symbolic Execution (12)
  • Training (1)
  • Year in Review (4)
My Tweets
Cancel