unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
The Trail of Bits Hiring Process
When engineers apply to Trail of Bits, they’re often surprised by how straightfor...
2022-6-28 21:0:10 | 阅读: 23 |
收藏
|
blog.trailofbits.com
trail
onboarding
letter
development
joining
Managing risk in blockchain deployments
Do you need a blockchain? And if so, what kind?Trail of Bits has released an ope...
2022-6-24 21:0:9 | 阅读: 26 |
收藏
|
blog.trailofbits.com
blockchain
security
trail
blockchains
hardware
Are blockchains decentralized?
A new Trail of Bits research report examines unintended centralities in distribut...
2022-6-21 17:0:39 | 阅读: 19 |
收藏
|
blog.trailofbits.com
blockchains
network
trail
blockchain
darpa
Announcing the new Trail of Bits podcast
Trail of Bits has launched a podcast. The first five-episode season is now availa...
2022-6-21 10:0:42 | 阅读: 14 |
收藏
|
blog.trailofbits.com
trail
software
episode
guido
dan
Themes from PyCon US 2022
After two long years of lockdowns, virtual meetups, quarantines, and general chao...
2022-6-9 19:0:19 | 阅读: 14 |
收藏
|
blog.trailofbits.com
python
pep
pypi
annotations
Interactive decompilation with rellic-xref
By Francesco BertolacciniRellic is a framework for analyzing and decompiling LLV...
2022-5-17 19:0:9 | 阅读: 15 |
收藏
|
blog.trailofbits.com
rellic
passes
refinement
refined
decompiled
Themes from Real World Crypto 2022
By William WoodruffLast week, over 500 cryptographers from around the world gath...
2022-5-3 19:0:4 | 阅读: 28 |
收藏
|
blog.trailofbits.com
attacker
presenters
security
victim
elgamal
Improving the state of go-fuzz
By Christian Presa SchnellDuring my winternship, I used the findings from recent...
2022-4-26 19:0:18 | 阅读: 35 |
收藏
|
blog.trailofbits.com
homedir
mutation
filemode
dep
fuzzer
Amarna: Static analysis for Cairo programs
By Filipe CasalWe are open-sourcing Amarna, our new static analyzer and linter f...
2022-4-20 19:0:4 | 阅读: 35 |
收藏
|
blog.trailofbits.com
cairo
prover
sqr
felt
memory
The Frozen Heart vulnerability in PlonK
By Jim MillerIn part 1 of this blog post, we disclosed critical vulnerabilities...
2022-4-18 19:0:1 | 阅读: 32 |
收藏
|
blog.trailofbits.com
prover
plonk
verifier
polynomial
heart
The Frozen Heart vulnerability in Bulletproofs
By Jim MillerIn part 1 of this series, we disclosed critical vulnerabilities tha...
2022-4-15 19:0:52 | 阅读: 36 |
收藏
|
blog.trailofbits.com
t1
t2
commitment
shamir
The Frozen Heart vulnerability in Girault’s proof of knowledge
By Jim MillerIn part 1 of this series, we disclosed critical vulnerabilities th...
2022-4-14 19:0:32 | 阅读: 23 |
收藏
|
blog.trailofbits.com
frozen
heart
girault
shamir
fiat
Part 1: Coordinated Disclosure of Vulnerabilities Affecting Girault, Bulletproofs, and PlonK
By Jim MillerTrail of Bits is publicly disclosing critical vulnerabilities that...
2022-4-13 19:0:0 | 阅读: 19 |
收藏
|
blog.trailofbits.com
shamir
fiat
frozen
heart
Towards Practical Security Optimizations for Binaries
By Michael D. Brown, Senior Security EngineerTo be thus is nothing, but to be sa...
2022-3-25 20:58:54 | 阅读: 24 |
收藏
|
blog.trailofbits.com
behaviors
security
passes
attacker
Optimizing a smart contract fuzzer
By Sam AlwsDuring my winternship, I applied code analysis tools, such as GHC’s H...
2022-3-2 20:0:33 | 阅读: 24 |
收藏
|
blog.trailofbits.com
echidna
haskell
statechange
memory
Maat: Symbolic execution made easy
By Boyan MilanovWe have released Maat, a cross-architecture, multi-purpose, and...
2022-2-23 20:0:8 | 阅读: 27 |
收藏
|
blog.trailofbits.com
maat
symbolic
analysis
ghidra
Part 2: Improving crypto code in Rust using LLVM’s optnone
By Henrik BrodinLet’s implement crypto!Welcome to the second part of our posts...
2022-2-1 20:0:25 | 阅读: 24 |
收藏
|
blog.trailofbits.com
i32
optimize
i1
rustc
noinline
Part 1: The life of an optimization barrier
By Fredrik DahlgrenMany engineers choose Rust as their language of choice for i...
2022-1-26 20:0:35 | 阅读: 23 |
收藏
|
blog.trailofbits.com
i32
barrier
memory
turbofan
timing
C your data structures with rellic-headergen
By Francesco BertolacciniHave you ever wondered how a compiler sees your data st...
2022-1-19 20:0:12 | 阅读: 28 |
收藏
|
blog.trailofbits.com
rellic
headergen
bitcode
structs
dw
Finding unhandled errors using CodeQL
By Fredrik DahlgrenOne of your developers finds a bug in your codebase—an unhand...
2022-1-11 20:0:58 | 阅读: 41 |
收藏
|
blog.trailofbits.com
dataflow
codebase
taint
predicate
Previous
9
10
11
12
13
14
15
16
Next