unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
We wrote the code, and the code won
By Tjaden HessEarlier this week, NIST officially announced three standards speci...
2024-8-15 19:50:31 | 阅读: 8 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
dsa
slh
transition
codebase
pqc
Trail of Bits Advances to AIxCC Finals
Trail of Bits has qualified for the final round of DARPA’s AI Cyber Challenge (AI...
2024-8-13 07:23:13 | 阅读: 25 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
aixcc
competition
darpa
buttercup
Trail of Bits’ Buttercup heads to DARPA’s AIxCC
With DARPA’s AI Cyber Challenge (AIxCC) semifinal starting today at DEF CON 2024,...
2024-8-9 21:10:29 | 阅读: 40 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
buttercup
competition
aixcc
Beyond the best: A new era of recommendations
By Josiah DykstraWe continuously aim to question assumptions and challenge conve...
2024-8-7 21:0:41 | 阅读: 13 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
advice
readers
phrase
thoughtful
integrating
Cloud cryptography demystified: Google Cloud Platform
By Scott ArciszewskiThis post, the second in our series on cryptography in the c...
2024-8-5 21:0:3 | 阅读: 8 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
cloud
tink
kms
encryption
client
Our audit of Homebrew
By William WoodruffThis is a joint post with the Homebrew maintainers; read thei...
2024-7-30 21:0:34 | 阅读: 12 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
homebrew
brew
formula
tob
formulae
Our crypto experts answer 10 key questions
By Justin JacobCryptography is a fundamental part of electronics and the interne...
2024-7-25 21:0:36 | 阅读: 9 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
prover
elliptic
commitment
polynomial
shamir
Announcing AES-GEM (AES with Galois Extended Mode)
By Scott ArciszewskiToday, AES-GCM is one of two cipher modes used by TLS 1.3 (t...
2024-7-12 21:0:35 | 阅读: 9 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
gem
gcm
subkey
encryption
derivation
Trail of Bits named a leader in cybersecurity consulting services
Trail of Bits has been recognized as a leader in cybersecurity consulting service...
2024-7-9 19:0:45 | 阅读: 26 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
forrester
consulting
client
evaluation
Auditing the Ask Astro LLM Q&A app
Today, we present the second of our open-source AI security audits: a look at sec...
2024-7-5 21:0:28 | 阅读: 11 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
astro
database
rag
weaviate
poisoning
Quantum is unimportant to post-quantum
By Opal WrightYou might be hearing a lot about post-quantum (PQ) cryptography la...
2024-7-1 21:0:1 | 阅读: 12 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
discrete
subgroup
security
finite
factoring
Disarming Fiat-Shamir footguns
By Opal WrightThe Fiat-Shamir transform is an important building block in zero-k...
2024-6-24 21:0:38 | 阅读: 13 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
transcript
fiat
shamir
decree
inscribe
EuroLLVM 2024 trip report
By Marek Surovič and Henrich LaukoEuroLLVM is a developer meeting focused on pro...
2024-6-21 21:0:22 | 阅读: 20 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
mlir
analysis
machine
security
regions
Themes from Real World Crypto 2024
In March, Trail of Bits engineers traveled to the vibrant (and only slightly chil...
2024-6-18 21:0:27 | 阅读: 17 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
pqc
encryption
fhe
e2ee
Finding mispriced opcodes with fuzzing
By Max AmmannFuzzing—a testing technique that tries to find bugs by repeatedly e...
2024-6-17 21:0:43 | 阅读: 19 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
fuel
corpus
fuzzer
harness
libafl
Understanding Apple’s on-device and server foundations model release
By Artem DinaburgEarlier this week, at Apple’s WWDC, we finally witnessed Apple’...
2024-6-15 04:49:37 | 阅读: 17 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
adapters
vocabulary
adapter
inference
PCC: Bold step forward, not without flaws
By Adelin TraversEarlier this week, Apple announced Private Cloud Compute (or PC...
2024-6-15 03:46:48 | 阅读: 19 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
pcc
security
cloud
hardware
encryption
Announcing the Burp Suite Professional chapter in the Testing Handbook
By Maciej DomanskiBased on our security auditing experience, we’ve found that Bu...
2024-6-14 21:0:23 | 阅读: 19 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
burp
security
chapter
trail
Exploiting ML models with pickle file attacks: Part 2
By Boyan MilanovIn part 1, we introduced Sleepy Pickle, an attack that uses mali...
2024-6-11 23:0:17 | 阅读: 22 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
pickle
payload
malicious
python
bytecode
Exploiting ML models with pickle file attacks: Part 1
By Boyan MilanovWe’ve developed a new hybrid machine learning (ML) model exploit...
2024-6-11 21:0:36 | 阅读: 23 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
pickle
malicious
sleepy
payload
attacker
Previous
6
7
8
9
10
11
12
13
Next