Trail of Bits Blog

Menu

Skip to content
  • Home

Category Archives: Manticore

Watch Your Language: Our First Vyper Audit October 24, 2019
Announcing Manticore 0.3.0 June 7, 2019
Performing Concolic Execution on Cryptographic Primitives April 1, 2019
Symbolic Path Merging in Manticore January 25, 2019
Fuzzing an API with DeepState (Part 2) January 23, 2019
Fuzzing an API with DeepState (Part 1) January 22, 2019
Fault Analysis on RSA Signing August 14, 2018
Hands on the Ethernaut CTF November 6, 2017
Magic with Manticore May 15, 2017
Manticore: Symbolic execution for humans April 27, 2017

Post navigation

← Older posts

About Us

Since 2012, Trail of Bits has helped secure some of the world’s most targeted organizations and products. We combine high-­end security research with a real­ world attacker mentality to reduce risk and fortify code.

Read more at www.trailofbits.com

Subscribe via RSS

RSS Feed RSS - Posts

Recent Posts

  • 64 Bits ought to be enough for anybody!
  • Introducing iVerify, the security toolkit for iPhone users
  • Announcing the Crytic $10k Research Prize
  • Everything You Ever Wanted To Know About Test-Case Reduction, But Didn’t Know to Ask
  • Security assessment techniques for Go projects
  • Two New Tools that Tame the Treachery of Files
  • Destroying x86_64 instruction decoders with differential fuzzing
  • How safe browsing fails to protect user privacy
  • Grace Hopper Celebration (GHC) 2019 Recap
  • Formal Analysis of the CBC Casper Consensus Algorithm with TLA+
  • Watch Your Language: Our First Vyper Audit
  • Multi-Party Computation on Machine Learning
  • TSC Frequency For All: Better Profiling and Benchmarking
  • Tethered jailbreaks are back
  • QueryCon 2019: A Turning Point for osquery

Yearly Archive

  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012

Categories

  • Apple (12)
  • Attacks (7)
  • Authentication (5)
  • Binary Ninja (10)
  • Blockchain (29)
  • Capture the Flag (10)
  • Compilers (19)
  • Conferences (24)
  • Containers (2)
  • Cryptography (22)
  • Cyber Grand Challenge (7)
  • DARPA (17)
  • Dynamic Analysis (12)
  • Education (13)
  • Empire Hacking (6)
  • Engineering Practice (9)
  • Events (5)
  • Exploits (19)
  • Fuzzing (22)
  • Go (2)
  • Guides (8)
  • Internship Projects (16)
  • iVerify (4)
  • Kubernetes (2)
  • Linux (1)
  • Malware (7)
  • Manticore (11)
  • McSema (11)
  • Meta (9)
  • Mitigations (9)
  • osquery (18)
  • Paper Review (10)
  • Press Release (19)
  • Privacy (7)
  • Products (5)
  • Program Analysis (14)
  • Research Practice (8)
  • Reversing (11)
  • Rust (3)
  • Sponsorships (12)
  • Static Analysis (20)
  • Symbolic Execution (12)
  • Training (1)
  • Year in Review (4)
My Tweets
Cancel