unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Inside DEF CON: Michael Brown on how AI/ML is revolutionizing cybersecurity
At DEF CON, Michael Brown, Principal Security Engineer at Trail of Bits, sat down...
2024-9-17 21:0:8 | 阅读: 2 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
security
software
aixcc
Friends don’t let friends reuse nonces
By Joe DoyleIf you’ve encountered cryptography software, you’ve probably heard t...
2024-9-13 21:0:54 | 阅读: 4 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
tux
alice
noise
reuse
Sanitize your C++ containers: ASan annotations step-by-step
By Dominik Klemba and Dominik CzarnotaAddressSanitizer (ASan) is a compiler plug...
2024-9-10 21:0:42 | 阅读: 6 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
memory
annotations
asan
annotate
contiguous
“Unstripping” binaries: Restoring debugging information in GDB with Pwndbg
By Jason AnGDB loses significant functionality when debugging binaries that lack...
2024-9-6 21:0:21 | 阅读: 6 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
pwndbg
dumping
structs
stripped
What would you do with that old GPU?
read file error: read notes: is a directory...
2024-9-5 21:0:11 | 阅读: 7 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
gpus
analysis
datalog
Provisioning cloud infrastructure the wrong way, but faster
By Artem DinaburgToday we’re going to provision some cloud infrastructure the Ma...
2024-8-27 21:0:6 | 阅读: 4 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
claude
cloud
chatgpt
passwords
coded
“YOLO” is not a valid hash construction
By Opal WrightAmong the cryptographic missteps we see at Trail of Bits, “let’s b...
2024-8-21 21:0:51 | 阅读: 4 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
alice
memory
yolomac
k1
compute
We wrote the code, and the code won
By Tjaden HessEarlier this week, NIST officially announced three standards speci...
2024-8-15 19:50:31 | 阅读: 3 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
dsa
slh
transition
codebase
pqc
Trail of Bits Advances to AIxCC Finals
Trail of Bits has qualified for the final round of DARPA’s AI Cyber Challenge (AI...
2024-8-13 07:23:13 | 阅读: 21 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
aixcc
competition
darpa
buttercup
Trail of Bits’ Buttercup heads to DARPA’s AIxCC
With DARPA’s AI Cyber Challenge (AIxCC) semifinal starting today at DEF CON 2024,...
2024-8-9 21:10:29 | 阅读: 31 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
buttercup
competition
aixcc
Beyond the best: A new era of recommendations
By Josiah DykstraWe continuously aim to question assumptions and challenge conve...
2024-8-7 21:0:41 | 阅读: 2 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
advice
readers
phrase
thoughtful
integrating
Cloud cryptography demystified: Google Cloud Platform
By Scott ArciszewskiThis post, the second in our series on cryptography in the c...
2024-8-5 21:0:3 | 阅读: 3 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
cloud
tink
kms
encryption
client
Our audit of Homebrew
By William WoodruffThis is a joint post with the Homebrew maintainers; read thei...
2024-7-30 21:0:34 | 阅读: 5 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
homebrew
brew
formula
tob
formulae
Our crypto experts answer 10 key questions
By Justin JacobCryptography is a fundamental part of electronics and the interne...
2024-7-25 21:0:36 | 阅读: 5 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
prover
elliptic
commitment
polynomial
shamir
Announcing AES-GEM (AES with Galois Extended Mode)
By Scott ArciszewskiToday, AES-GCM is one of two cipher modes used by TLS 1.3 (t...
2024-7-12 21:0:35 | 阅读: 3 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
gem
gcm
subkey
encryption
derivation
Trail of Bits named a leader in cybersecurity consulting services
Trail of Bits has been recognized as a leader in cybersecurity consulting service...
2024-7-9 19:0:45 | 阅读: 5 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
forrester
consulting
client
evaluation
Auditing the Ask Astro LLM Q&A app
Today, we present the second of our open-source AI security audits: a look at sec...
2024-7-5 21:0:28 | 阅读: 6 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
astro
database
rag
weaviate
poisoning
Quantum is unimportant to post-quantum
By Opal WrightYou might be hearing a lot about post-quantum (PQ) cryptography la...
2024-7-1 21:0:1 | 阅读: 5 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
discrete
subgroup
security
finite
factoring
Disarming Fiat-Shamir footguns
By Opal WrightThe Fiat-Shamir transform is an important building block in zero-k...
2024-6-24 21:0:38 | 阅读: 7 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
transcript
fiat
shamir
decree
inscribe
EuroLLVM 2024 trip report
By Marek Surovič and Henrich LaukoEuroLLVM is a developer meeting focused on pro...
2024-6-21 21:0:22 | 阅读: 8 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
mlir
analysis
machine
security
regions
Previous
1
2
3
4
5
6
7
8
Next