unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Cloud cryptography demystified: Google Cloud Platform
By Scott ArciszewskiThis post, the second in our series on cryptography in the c...
2024-8-5 21:0:3 | 阅读: 3 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
cloud
tink
kms
encryption
client
Our audit of Homebrew
By William WoodruffThis is a joint post with the Homebrew maintainers; read thei...
2024-7-30 21:0:34 | 阅读: 5 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
homebrew
brew
formula
tob
formulae
Our crypto experts answer 10 key questions
By Justin JacobCryptography is a fundamental part of electronics and the interne...
2024-7-25 21:0:36 | 阅读: 5 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
prover
elliptic
commitment
polynomial
shamir
Announcing AES-GEM (AES with Galois Extended Mode)
By Scott ArciszewskiToday, AES-GCM is one of two cipher modes used by TLS 1.3 (t...
2024-7-12 21:0:35 | 阅读: 3 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
gem
gcm
subkey
encryption
derivation
Trail of Bits named a leader in cybersecurity consulting services
Trail of Bits has been recognized as a leader in cybersecurity consulting service...
2024-7-9 19:0:45 | 阅读: 5 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
forrester
consulting
client
evaluation
Auditing the Ask Astro LLM Q&A app
Today, we present the second of our open-source AI security audits: a look at sec...
2024-7-5 21:0:28 | 阅读: 6 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
astro
database
rag
weaviate
poisoning
Quantum is unimportant to post-quantum
By Opal WrightYou might be hearing a lot about post-quantum (PQ) cryptography la...
2024-7-1 21:0:1 | 阅读: 5 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
discrete
subgroup
security
finite
factoring
Disarming Fiat-Shamir footguns
By Opal WrightThe Fiat-Shamir transform is an important building block in zero-k...
2024-6-24 21:0:38 | 阅读: 7 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
transcript
fiat
shamir
decree
inscribe
EuroLLVM 2024 trip report
By Marek Surovič and Henrich LaukoEuroLLVM is a developer meeting focused on pro...
2024-6-21 21:0:22 | 阅读: 12 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
mlir
analysis
machine
security
regions
Themes from Real World Crypto 2024
In March, Trail of Bits engineers traveled to the vibrant (and only slightly chil...
2024-6-18 21:0:27 | 阅读: 12 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
pqc
encryption
fhe
e2ee
Finding mispriced opcodes with fuzzing
By Max AmmannFuzzing—a testing technique that tries to find bugs by repeatedly e...
2024-6-17 21:0:43 | 阅读: 14 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
fuel
corpus
fuzzer
harness
libafl
Understanding Apple’s on-device and server foundations model release
By Artem DinaburgEarlier this week, at Apple’s WWDC, we finally witnessed Apple’...
2024-6-15 04:49:37 | 阅读: 11 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
adapters
vocabulary
adapter
inference
PCC: Bold step forward, not without flaws
By Adelin TraversEarlier this week, Apple announced Private Cloud Compute (or PC...
2024-6-15 03:46:48 | 阅读: 10 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
pcc
security
cloud
hardware
encryption
Announcing the Burp Suite Professional chapter in the Testing Handbook
By Maciej DomanskiBased on our security auditing experience, we’ve found that Bu...
2024-6-14 21:0:23 | 阅读: 8 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
burp
security
chapter
trail
Exploiting ML models with pickle file attacks: Part 2
By Boyan MilanovIn part 1, we introduced Sleepy Pickle, an attack that uses mali...
2024-6-11 23:0:17 | 阅读: 17 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
pickle
payload
malicious
python
bytecode
Exploiting ML models with pickle file attacks: Part 1
By Boyan MilanovWe’ve developed a new hybrid machine learning (ML) model exploit...
2024-6-11 21:0:36 | 阅读: 16 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
pickle
malicious
sleepy
payload
attacker
Announcing AI/ML safety and security trainings
By Michael D. BrownWe are offering AI/ML safety and security training in summer...
2024-6-7 21:0:41 | 阅读: 11 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
security
surfaces
equip
stacks
Understanding AddressSanitizer: Better memory safety for your code
By Dominik Klemba and Dominik CzarnotaThis post will guide you through using Add...
2024-5-16 21:0:57 | 阅读: 12 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
memory
asan
shadow
poisoned
granule
A peek into build provenance for Homebrew
By Joe Sweeney and William WoodruffLast November, we announced our collaboration...
2024-5-14 21:0:5 | 阅读: 9 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
homebrew
provenance
brew
bottle
github
Using benchmarks to speed up Echidna
By Ben SiraphobDuring my time as a Trail of Bits associate last summer, I worked...
2024-5-8 21:30:7 | 阅读: 9 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
memory
echidna
hevm
profiling
evm
Previous
2
3
4
5
6
7
8
9
Next