Trail of Bits Blog

Menu

Skip to content
  • Home

Category Archives: Program Analysis

Two New Tools that Tame the Treachery of Files November 1, 2019
Siderophile: Expose your Crate’s Unsafety July 1, 2019
Performing Concolic Execution on Cryptographic Primitives April 1, 2019
The Good, the Bad, and the Weird October 26, 2018
Protecting Software Against Exploitation with DARPA’s CFAR September 10, 2018
Rattle – an Ethereum EVM binary analysis framework September 6, 2018
Optimizing Lifted Bitcode with Dead Store Elimination July 6, 2018
State Machine Testing with Echidna May 3, 2018
Vulnerability Modeling with Binary Ninja April 4, 2018
Use our suite of Ethereum security tools March 23, 2018

Post navigation

← Older posts

About Us

Since 2012, Trail of Bits has helped secure some of the world’s most targeted organizations and products. We combine high-­end security research with a real­ world attacker mentality to reduce risk and fortify code.

Read more at www.trailofbits.com

Subscribe via RSS

RSS Feed RSS - Posts

Recent Posts

  • 64 Bits ought to be enough for anybody!
  • Introducing iVerify, the security toolkit for iPhone users
  • Announcing the Crytic $10k Research Prize
  • Everything You Ever Wanted To Know About Test-Case Reduction, But Didn’t Know to Ask
  • Security assessment techniques for Go projects
  • Two New Tools that Tame the Treachery of Files
  • Destroying x86_64 instruction decoders with differential fuzzing
  • How safe browsing fails to protect user privacy
  • Grace Hopper Celebration (GHC) 2019 Recap
  • Formal Analysis of the CBC Casper Consensus Algorithm with TLA+
  • Watch Your Language: Our First Vyper Audit
  • Multi-Party Computation on Machine Learning
  • TSC Frequency For All: Better Profiling and Benchmarking
  • Tethered jailbreaks are back
  • QueryCon 2019: A Turning Point for osquery

Yearly Archive

  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012

Categories

  • Apple (12)
  • Attacks (7)
  • Authentication (5)
  • Binary Ninja (10)
  • Blockchain (29)
  • Capture the Flag (10)
  • Compilers (19)
  • Conferences (24)
  • Containers (2)
  • Cryptography (22)
  • Cyber Grand Challenge (7)
  • DARPA (17)
  • Dynamic Analysis (12)
  • Education (13)
  • Empire Hacking (6)
  • Engineering Practice (9)
  • Events (5)
  • Exploits (19)
  • Fuzzing (22)
  • Go (2)
  • Guides (8)
  • Internship Projects (16)
  • iVerify (4)
  • Kubernetes (2)
  • Linux (1)
  • Malware (7)
  • Manticore (11)
  • McSema (11)
  • Meta (9)
  • Mitigations (9)
  • osquery (18)
  • Paper Review (10)
  • Press Release (19)
  • Privacy (7)
  • Products (5)
  • Program Analysis (14)
  • Research Practice (8)
  • Reversing (11)
  • Rust (3)
  • Sponsorships (12)
  • Static Analysis (20)
  • Symbolic Execution (12)
  • Training (1)
  • Year in Review (4)
My Tweets
Cancel