unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Why fuzzing over formal verification?
By Tarun Bansal, Gustavo Grieco, and Josselin FeistWe recently introduced our ne...
2024-3-22 21:0:28 | 阅读: 10 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
formal
invariant
asset
echidna
invariants
Streamline your static analysis triage with SARIF Explorer
By Vasco FrancoToday, we’re releasing SARIF Explorer, the VSCode extension that...
2024-3-20 21:30:45 | 阅读: 13 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
sarif
weaudit
vscode
github
classify
Read code like a pro with our weAudit VSCode extension
By Filipe CasalToday, we’re releasing weAudit, the collaborative code-reviewing...
2024-3-19 21:30:0 | 阅读: 10 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
weaudit
vscode
codebase
bookmarks
github
Releasing the Attacknet: A new tool for finding bugs in blockchain nodes using chaos testing
By Benjamin Samuels (@thebensams)Today, Trail of Bits is publishing Attacknet,...
2024-3-18 21:0:59 | 阅读: 9 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
network
attacknet
faults
client
blockchain
Secure your blockchain project from the start
Systemic security issues in blockchain projects often appear early in development...
2024-3-13 21:0:45 | 阅读: 5 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
security
stage
development
identify
tailored
DARPA awards $1 million to Trail of Bits for AI Cyber Challenge
By Michael D. BrownWe’re excited to share that Trail of Bits has been selected a...
2024-3-12 01:46:31 | 阅读: 17 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
aixcc
crs
llms
competition
Out of the kernel, into the tokens
By Max Ammann and Emilio LópezOur application security team leaves no stone untu...
2024-3-8 22:0:48 | 阅读: 7 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
jose
kaslr
bypass
syslog
encryption
Cryptographic design review of Ockam
By Marc Ilunga, Jim Miller, Fredrik Dahlgren, and Joop van de PolIn October 2023...
2024-3-5 22:0:38 | 阅读: 10 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
ockam
security
identities
guarantees
modeling
Relishing new Fickling features for securing ML systems
By Suha S. HussainWe’ve added new features to Fickling to offer enhanced threat...
2024-3-4 22:0:44 | 阅读: 14 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
pytorch
fickling
polyglot
pickle
analysis
How we applied advanced fuzzing techniques to cURL
By Shaun MiraniNear the end of 2022, Trail of Bits was hired by the Open Source...
2024-3-1 22:30:25 | 阅读: 9 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
fuzzer
hsts
curlopt
tlv
security
When try, try, try again leads to out-of-order execution bugs
By Troy SargentHave you ever wondered how a rollup and its base chain—the chain...
2024-3-1 20:0:42 | 阅读: 7 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
retryable
rewards
l2
gaslimit
Our response to the US Army’s RFI on developing AIBOM tools
By Michael Brown and Adelin TraversThe US Army’s Program Executive Office for In...
2024-2-29 00:30:5 | 阅读: 9 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
aibom
security
proposed
hardware
Circomspect has been integrated into the Sindri CLI
By Jim MillerOur tool Circomspect is now integrated into the Sindri command-line...
2024-2-26 22:0:2 | 阅读: 8 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
circomspect
sindri
circuits
developers
circom
Continuously fuzzing Python C extensions
By Matt SchwagerDeserializing, decoding, and processing untrusted input are tell...
2024-2-23 22:30:3 | 阅读: 17 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
cbor2
python
python3
atheris
asan
Breaking the shared key in threshold signature schemes
By Fredrik DahlgrenToday we are disclosing a denial-of-service vulnerability tha...
2024-2-20 22:30:37 | 阅读: 2 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
dkg
frost
shamir
pedersen
A few notes on AWS Nitro Enclaves: Images and attestation
By Paweł Płatek (GrosQuildu)AWS Nitro Enclaves are locked-down virtual machines...
2024-2-16 22:30:32 | 阅读: 12 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
nitro
eif
enclave
pcr
enclaves
Cloud cryptography demystified: Amazon Web Services
By Scott ArciszewskiThis post, part of a series on cryptography in the cloud, pr...
2024-2-14 22:0:6 | 阅读: 5 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
encryption
kms
database
client
cloud
Why Windows can’t follow WSL symlinks
By Yarden ShafirDid you know that symbolic links (or symlinks) created through W...
2024-2-12 22:30:25 | 阅读: 10 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
windows
symlinks
targetfile
junction
filetest
Master fuzzing with our new Testing Handbook chapter
Our latest addition to the Trail of Bits Testing Handbook is a comprehensive guid...
2024-2-9 22:0:13 | 阅读: 8 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
chapter
trail
developers
fuzzers
handbook
Binary type inference in Ghidra
By Ian SmithTrail of Bits is releasing BTIGhidra, a Ghidra extension that helps...
2024-2-7 22:0:39 | 阅读: 6 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
btighidra
inference
ghidra
constraints
decompiler
Previous
3
4
5
6
7
8
9
10
Next