Trail of Bits Blog

Menu

Skip to content
  • Home

Category Archives: McSema

Rewriting Functions in Compiled Binaries September 2, 2019
How McSema Handles C++ Exceptions January 21, 2019
Protecting Software Against Exploitation with DARPA’s CFAR September 10, 2018
Optimizing Lifted Bitcode with Dead Store Elimination July 6, 2018
Heavy lifting with McSema 2.0 January 23, 2018
McSema: I’m liftin’ it March 14, 2017
How We Fared in the Cyber Grand Challenge July 15, 2015
Close Encounters with Symbolic Execution (Part 2) December 4, 2014
Close Encounters with Symbolic Execution November 25, 2014
McSema is Officially Open Source! August 7, 2014

Post navigation

← Older posts

About Us

Since 2012, Trail of Bits has helped secure some of the world’s most targeted organizations and products. We combine high-­end security research with a real­ world attacker mentality to reduce risk and fortify code.

Read more at www.trailofbits.com

Subscribe via RSS

RSS feed RSS - Posts

Recent Posts

  • Harnessing the eBPF Verifier
  • Introducing RPC Investigator
  • Announcing a stable release of sigstore-python
  • Keeping the wolves out of wolfSSL
  • Another prolific year of open-source contributions
  • How to share what you’ve learned from our audits
  • Fast and accurate syntax searching for C and C++
  • What child is this?
  • How I gave ManticoreUI a makeover
  • Manticore GUIs made easy
  • Hybrid fuzzing: Sharpening the spikes of Echidna
  • Specialized Zero-Knowledge Proof failures
  • ABI compatibility in Python: How hard could it be?
  • We’re streamers now
  • Look out! Divergent representations are everywhere!

Yearly Archive

  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012

Categories

  • Apple (13)
  • Attacks (10)
  • Audits (3)
  • Authentication (5)
  • Binary Ninja (14)
  • Blockchain (50)
  • Capture the Flag (11)
  • Careers (2)
  • CodeQL (3)
  • Compilers (24)
  • Conferences (28)
  • Containers (2)
  • Cryptography (42)
  • Crytic (3)
  • Cyber Grand Challenge (7)
  • DARPA (21)
  • Dynamic Analysis (12)
  • Education (15)
  • Empire Hacking (7)
  • Engineering Practice (13)
  • Events (6)
  • Exploits (27)
  • Fuzzing (31)
  • Go (4)
  • Guides (11)
  • Internship Projects (33)
  • iVerify (4)
  • Kubernetes (2)
  • Linux (1)
  • Machine Learning (6)
  • Malware (7)
  • Manticore (17)
  • McSema (11)
  • Meta (12)
  • Mitigations (9)
  • osquery (22)
  • Paper Review (11)
  • People (1)
  • Podcast (1)
  • Press Release (27)
  • Privacy (9)
  • Products (6)
  • Program Analysis (17)
  • Recruitment (1)
  • Remote Work (1)
  • Research Practice (20)
  • Reversing (14)
  • Rust (4)
  • SafeDocs (1)
  • Sinter (1)
  • Slither (3)
  • Sponsorships (12)
  • Static Analysis (28)
  • Symbolic Execution (18)
  • Training (2)
  • Uncategorized (25)
  • Working at Trail of Bits (2)
  • Year in Review (5)
  • Zero Knowledge (10)
My Tweets
Trail of Bits Blog
Proudly powered by WordPress Theme: Everyday.
 

Loading Comments...