Trail of Bits Blog

Menu

Skip to content
  • Home

Category Archives: Reversing

Finding bugs in C code with Multi-Level IR and VAST June 15, 2023
Towards Practical Security Optimizations for Binaries March 25, 2022
Toward a Best-of-Both-Worlds Binary Disassembler January 5, 2022
Verifying Windows binaries, without Windows May 27, 2020
Destroying x86_64 instruction decoders with differential fuzzing October 31, 2019
Reverse Taint Analysis Using Binary Ninja August 29, 2019
Announcing Automated Reverse Engineering Trainings May 30, 2019
Vulnerability Modeling with Binary Ninja April 4, 2018
Use our suite of Ethereum security tools March 23, 2018
Devirtualizing C++ with Binary Ninja February 13, 2017

Post navigation

← Older posts

About Us

Since 2012, Trail of Bits has helped secure some of the world’s most targeted organizations and products. We combine high-­end security research with a real­ world attacker mentality to reduce risk and fortify code.

Read more at www.trailofbits.com

Subscribe via RSS

RSS feed RSS - Posts

Recent Posts

  • Don’t overextend your Oblivious Transfer
  • Security flaws in an SSO plugin for Caddy
  • Holy Macroni! A recipe for progressive language enhancement
  • Secure your Apollo GraphQL server with Semgrep
  • iVerify is now an independent company!
  • The Engineer’s Guide to Blockchain Finality
  • Can you pass the Rekt test?
  • Use our suite of eBPF libraries
  • A mistake in the bulletproofs paper could have led to the theft of millions of dollars
  • How AI will affect cybersecurity: What we told the CFTC
  • The future of Clang-based tooling
  • Announcing the Trail of Bits Testing Handbook
  • Fuzzing on-chain contracts with Echidna
  • Trail of Bits’s Response to OSTP National Priorities for AI RFI
  • Evaluating blockchain security maturity

Yearly Archive

  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012

Categories

  • Apple (13)
  • Attacks (12)
  • Audits (8)
  • Authentication (5)
  • Binary Ninja (14)
  • Blockchain (58)
  • Capture the Flag (11)
  • Careers (2)
  • CodeQL (3)
  • Compilers (26)
  • Conferences (30)
  • Containers (2)
  • Cryptography (45)
  • Crytic (4)
  • Cyber Grand Challenge (7)
  • DARPA (21)
  • Dynamic Analysis (13)
  • Ecosystem Security (1)
  • Education (16)
  • Empire Hacking (7)
  • Engineering Practice (15)
  • Events (7)
  • Exploits (30)
  • Fuzzing (33)
  • Go (5)
  • Guides (13)
  • Internship Projects (34)
  • iVerify (5)
  • Kubernetes (2)
  • Linux (2)
  • Machine Learning (11)
  • Malware (7)
  • Manticore (17)
  • McSema (11)
  • Meta (12)
  • Mitigations (11)
  • osquery (22)
  • Paper Review (11)
  • People (6)
  • Podcast (1)
  • Policy (9)
  • Press Release (29)
  • Privacy (9)
  • Products (8)
  • Program Analysis (18)
  • Recruitment (1)
  • Remote Work (1)
  • Research Practice (22)
  • Reversing (15)
  • Rust (4)
  • SafeDocs (1)
  • Semgrep (2)
  • Sinter (1)
  • Slither (3)
  • Sponsorships (12)
  • Static Analysis (29)
  • Symbolic Execution (18)
  • Training (2)
  • Uncategorized (33)
  • Windows (1)
  • Working at Trail of Bits (2)
  • Year in Review (5)
  • Zero Knowledge (10)
My Tweets
Trail of Bits Blog
Proudly powered by WordPress Theme: Everyday.
 

Loading Comments...