We crypto now

Building and using cryptographic libraries is notoriously difficult. Even when each component of the system has been implemented correctly (quite difficult to do), improperly combining these pieces… | Continue reading


@blog.trailofbits.com | 5 years ago

How contract migration works

Smart contracts can be compromised: they can have bugs, the owner’s wallet can be stolen, or they can be trapped due to an incorrect setting. If you develop a smart contract for your business, you … | Continue reading


@blog.trailofbits.com | 5 years ago

A Guide to Post-Quantum Cryptography

For many high-assurance applications such as TLS traffic, medical databases, and blockchains, forward secrecy is absolutely essential. It is not sufficient to prevent an attacker from immediately d… | Continue reading


@blog.trailofbits.com | 5 years ago

Slither – a Solidity static analysis framework

Slither is the first open-source static analysis framework for Solidity. Slither is fast and precise; it can find real vulnerabilities in a few seconds without user intervention. It is highly custo… | Continue reading


@blog.trailofbits.com | 5 years ago

Introduction to verifiable delay functions

Finding randomness on the blockchain is hard. A classic mistake developers make when trying to acquire a random value on-chain is to use quantities like future block hashes, block difficulty, or ti… | Continue reading


@blog.trailofbits.com | 5 years ago

How to Spot Good Fuzzing Research

Of the nearly 200 papers on software fuzzing that have been published in the last three years, most of them—even some from high-impact conferences—are academic clamor. Fuzzing research suffers from… | Continue reading


@blog.trailofbits.com | 5 years ago

Effortless security feature detection with Winchecksec

We’re proud to announce the release of Winchecksec, a new open-source tool that detects security features in Windows binaries. Developed to satisfy our analysis and research needs, Wincheckse… | Continue reading


@blog.trailofbits.com | 5 years ago

Protecting software against exploitation with DARPA's CFAR

Today, we’re going to talk about a hard problem that we are working on as part of DARPA’s Cyber Fault-Tolerant Attack Recovery (CFAR) program: automatically protecting software from 0-day exploits,… | Continue reading


@blog.trailofbits.com | 5 years ago

An ethereum EVM binary analysis framework – Rattle

Most smart contracts have no verified source code, but people still trust them to protect their cryptocurrency. What’s more, several large custodial smart contracts have had security incidents. The… | Continue reading


@blog.trailofbits.com | 5 years ago

How smart contract upgrades fail in practice

A popular trend in smart contract design is to promote the development of upgradable contracts. At Trail of Bits, we have reviewed many upgradable contracts and believe that this trend is going in … | Continue reading


@blog.trailofbits.com | 5 years ago

Introducing windows-acl: Working with ACLs in Rust

Access Control Lists (ACLs) are an integral part of the Microsoft Windows security model. In addition to controlling access to secured resources, they are also used in sandboxing, event auditing, a… | Continue reading


@blog.trailofbits.com | 5 years ago

You could have invented that Bluetooth attack

A serious bluetooth bug has received quite a bit of attention lately. It’s a great find by Biham and Newman. Given BLE’s popularity in the patch-averse IoT world, the bug has serious implications. … | Continue reading


@blog.trailofbits.com | 5 years ago

Optimizing Lifted Bitcode with Dead Store Elimination

Tim Alberdingk Thijm As part of my Springternship at Trail of Bits, I created a series of data-flow-based optimizations that eliminate most “dead” stores that emulate writes to machine code registe… | Continue reading


@blog.trailofbits.com | 5 years ago