Trail of Bits Blog

Menu

Skip to content
  • Home

Category Archives: Program Analysis

Detecting Bad OpenSSL Usage May 29, 2020
Two New Tools that Tame the Treachery of Files November 1, 2019
Siderophile: Expose your Crate’s Unsafety July 1, 2019
Performing Concolic Execution on Cryptographic Primitives April 1, 2019
The Good, the Bad, and the Weird October 26, 2018
Protecting Software Against Exploitation with DARPA’s CFAR September 10, 2018
Rattle – an Ethereum EVM binary analysis framework September 6, 2018
Optimizing Lifted Bitcode with Dead Store Elimination July 6, 2018
State Machine Testing with Echidna May 3, 2018
Vulnerability Modeling with Binary Ninja April 4, 2018

Post navigation

← Older posts

About Us

Since 2012, Trail of Bits has helped secure some of the world’s most targeted organizations and products. We combine high-­end security research with a real­ world attacker mentality to reduce risk and fortify code.

Read more at www.trailofbits.com

Subscribe via RSS

RSS feed RSS - Posts

Recent Posts

  • libmagic: The Blathering
  • A Typical Day as a Trail of Bits Engineer-Consultant
  • The Trail of Bits Hiring Process
  • Managing risk in blockchain deployments
  • Are blockchains decentralized?
  • Announcing the new Trail of Bits podcast
  • Themes from PyCon US 2022
  • Interactive decompilation with rellic-xref
  • Themes from Real World Crypto 2022
  • Improving the state of go-fuzz
  • Amarna: Static analysis for Cairo programs
  • The Frozen Heart vulnerability in PlonK
  • The Frozen Heart vulnerability in Bulletproofs
  • The Frozen Heart vulnerability in Girault’s proof of knowledge
  • Coordinated disclosure of vulnerabilities affecting Girault, Bulletproofs, and PlonK

Yearly Archive

  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012

Categories

  • Apple (13)
  • Attacks (9)
  • Audits (1)
  • Authentication (5)
  • Binary Ninja (12)
  • Blockchain (47)
  • Capture the Flag (11)
  • Careers (1)
  • CodeQL (2)
  • Compilers (23)
  • Conferences (28)
  • Containers (2)
  • Cryptography (34)
  • Crytic (2)
  • Cyber Grand Challenge (7)
  • DARPA (21)
  • Dynamic Analysis (12)
  • Education (14)
  • Empire Hacking (7)
  • Engineering Practice (11)
  • Events (5)
  • Exploits (27)
  • Fuzzing (29)
  • Go (4)
  • Guides (9)
  • Internship Projects (27)
  • iVerify (4)
  • Kubernetes (2)
  • Linux (1)
  • Machine Learning (1)
  • Malware (7)
  • Manticore (15)
  • McSema (11)
  • Meta (12)
  • Mitigations (9)
  • osquery (21)
  • Paper Review (11)
  • People (1)
  • Podcast (1)
  • Press Release (25)
  • Privacy (8)
  • Products (5)
  • Program Analysis (15)
  • Recruitment (1)
  • Remote Work (1)
  • Research Practice (16)
  • Reversing (14)
  • Rust (4)
  • SafeDocs (1)
  • Sinter (1)
  • Slither (1)
  • Sponsorships (12)
  • Static Analysis (24)
  • Symbolic Execution (17)
  • Training (1)
  • Uncategorized (20)
  • Working at Trail of Bits (1)
  • Year in Review (4)
  • Zero Knowledge (1)
My Tweets
Trail of Bits Blog
Proudly powered by WordPress Theme: Everyday.
 

Loading Comments...