unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
The life and times of an Abstract Syntax Tree
By Francesco BertolacciniYou’ve reached computer programming nirvana. Your journ...
2024-5-2 21:0:6 | 阅读: 12 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
memory
rhs
lhs
binexpr
intconstant
Curvance: Invariants unleashed
By Nat ChinWelcome to our deep dive into the world of invariant development with...
2024-4-30 21:30:43 | 阅读: 12 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
curvance
echidna
invariants
corpus
codebase
Announcing two new LMS libraries
By Will SongThe Trail of Bits cryptography team is pleased to announce the open-...
2024-4-26 21:0:32 | 阅读: 11 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
lms
schemes
stateful
security
5 reasons to strive for better disclosure processes
By Max AmmannThis blog showcases five examples of real-world vulnerabilities tha...
2024-4-15 21:0:53 | 阅读: 7 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
github
security
library
vec
mmkv
Introducing Ruzzy, a coverage-guided Ruby fuzzer
By Matt SchwagerTrail of Bits is excited to introduce Ruzzy, a coverage-guided f...
2024-3-29 21:30:44 | 阅读: 19 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
ruzzy
harness
libfuzzer
tracer
gems
Why fuzzing over formal verification?
By Tarun Bansal, Gustavo Grieco, and Josselin FeistWe recently introduced our ne...
2024-3-22 21:0:28 | 阅读: 10 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
formal
invariant
asset
echidna
invariants
Streamline your static analysis triage with SARIF Explorer
By Vasco FrancoToday, we’re releasing SARIF Explorer, the VSCode extension that...
2024-3-20 21:30:45 | 阅读: 13 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
sarif
weaudit
vscode
github
classify
Read code like a pro with our weAudit VSCode extension
By Filipe CasalToday, we’re releasing weAudit, the collaborative code-reviewing...
2024-3-19 21:30:0 | 阅读: 10 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
weaudit
vscode
codebase
bookmarks
github
Releasing the Attacknet: A new tool for finding bugs in blockchain nodes using chaos testing
By Benjamin Samuels (@thebensams)Today, Trail of Bits is publishing Attacknet,...
2024-3-18 21:0:59 | 阅读: 9 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
network
attacknet
faults
client
blockchain
Secure your blockchain project from the start
Systemic security issues in blockchain projects often appear early in development...
2024-3-13 21:0:45 | 阅读: 5 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
security
stage
development
identify
tailored
DARPA awards $1 million to Trail of Bits for AI Cyber Challenge
By Michael D. BrownWe’re excited to share that Trail of Bits has been selected a...
2024-3-12 01:46:31 | 阅读: 17 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
aixcc
crs
llms
competition
Out of the kernel, into the tokens
By Max Ammann and Emilio LópezOur application security team leaves no stone untu...
2024-3-8 22:0:48 | 阅读: 7 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
jose
kaslr
bypass
syslog
encryption
Cryptographic design review of Ockam
By Marc Ilunga, Jim Miller, Fredrik Dahlgren, and Joop van de PolIn October 2023...
2024-3-5 22:0:38 | 阅读: 10 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
ockam
security
identities
guarantees
modeling
Relishing new Fickling features for securing ML systems
By Suha S. HussainWe’ve added new features to Fickling to offer enhanced threat...
2024-3-4 22:0:44 | 阅读: 14 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
pytorch
fickling
polyglot
pickle
analysis
How we applied advanced fuzzing techniques to cURL
By Shaun MiraniNear the end of 2022, Trail of Bits was hired by the Open Source...
2024-3-1 22:30:25 | 阅读: 9 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
fuzzer
hsts
curlopt
tlv
security
When try, try, try again leads to out-of-order execution bugs
By Troy SargentHave you ever wondered how a rollup and its base chain—the chain...
2024-3-1 20:0:42 | 阅读: 7 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
retryable
rewards
l2
gaslimit
Our response to the US Army’s RFI on developing AIBOM tools
By Michael Brown and Adelin TraversThe US Army’s Program Executive Office for In...
2024-2-29 00:30:5 | 阅读: 9 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
aibom
security
proposed
hardware
Circomspect has been integrated into the Sindri CLI
By Jim MillerOur tool Circomspect is now integrated into the Sindri command-line...
2024-2-26 22:0:2 | 阅读: 8 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
circomspect
sindri
circuits
developers
circom
Continuously fuzzing Python C extensions
By Matt SchwagerDeserializing, decoding, and processing untrusted input are tell...
2024-2-23 22:30:3 | 阅读: 17 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
cbor2
python
python3
atheris
asan
Breaking the shared key in threshold signature schemes
By Fredrik DahlgrenToday we are disclosing a denial-of-service vulnerability tha...
2024-2-20 22:30:37 | 阅读: 2 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
dkg
frost
shamir
pedersen
Previous
3
4
5
6
7
8
9
10
Next