unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Announcing the Trail of Bits and Semgrep partnership
At Trail of Bits, we aim to share and develop tools and resources used in our sec...
2024-9-19 21:0:30 | 阅读: 8 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
semgrep
security
trail
handbook
broader
Inside DEF CON: Michael Brown on how AI/ML is revolutionizing cybersecurity
At DEF CON, Michael Brown, Principal Security Engineer at Trail of Bits, sat down...
2024-9-17 21:0:8 | 阅读: 8 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
security
software
aixcc
Friends don’t let friends reuse nonces
By Joe DoyleIf you’ve encountered cryptography software, you’ve probably heard t...
2024-9-13 21:0:54 | 阅读: 10 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
tux
alice
noise
reuse
Sanitize your C++ containers: ASan annotations step-by-step
By Dominik Klemba and Dominik CzarnotaAddressSanitizer (ASan) is a compiler plug...
2024-9-10 21:0:42 | 阅读: 15 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
memory
annotations
asan
annotate
contiguous
“Unstripping” binaries: Restoring debugging information in GDB with Pwndbg
By Jason AnGDB loses significant functionality when debugging binaries that lack...
2024-9-6 21:0:21 | 阅读: 10 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
pwndbg
dumping
structs
stripped
What would you do with that old GPU?
read file error: read notes: is a directory...
2024-9-5 21:0:11 | 阅读: 13 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
gpus
analysis
datalog
Provisioning cloud infrastructure the wrong way, but faster
By Artem DinaburgToday we’re going to provision some cloud infrastructure the Ma...
2024-8-27 21:0:6 | 阅读: 9 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
claude
cloud
chatgpt
passwords
coded
“YOLO” is not a valid hash construction
By Opal WrightAmong the cryptographic missteps we see at Trail of Bits, “let’s b...
2024-8-21 21:0:51 | 阅读: 8 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
alice
memory
yolomac
k1
compute
We wrote the code, and the code won
By Tjaden HessEarlier this week, NIST officially announced three standards speci...
2024-8-15 19:50:31 | 阅读: 7 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
dsa
slh
transition
codebase
pqc
Trail of Bits Advances to AIxCC Finals
Trail of Bits has qualified for the final round of DARPA’s AI Cyber Challenge (AI...
2024-8-13 07:23:13 | 阅读: 25 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
aixcc
competition
darpa
buttercup
Trail of Bits’ Buttercup heads to DARPA’s AIxCC
With DARPA’s AI Cyber Challenge (AIxCC) semifinal starting today at DEF CON 2024,...
2024-8-9 21:10:29 | 阅读: 38 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
buttercup
competition
aixcc
Beyond the best: A new era of recommendations
By Josiah DykstraWe continuously aim to question assumptions and challenge conve...
2024-8-7 21:0:41 | 阅读: 9 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
advice
readers
phrase
thoughtful
integrating
Cloud cryptography demystified: Google Cloud Platform
By Scott ArciszewskiThis post, the second in our series on cryptography in the c...
2024-8-5 21:0:3 | 阅读: 7 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
cloud
tink
kms
encryption
client
Our audit of Homebrew
By William WoodruffThis is a joint post with the Homebrew maintainers; read thei...
2024-7-30 21:0:34 | 阅读: 10 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
homebrew
brew
formula
tob
formulae
Our crypto experts answer 10 key questions
By Justin JacobCryptography is a fundamental part of electronics and the interne...
2024-7-25 21:0:36 | 阅读: 9 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
prover
elliptic
commitment
polynomial
shamir
Announcing AES-GEM (AES with Galois Extended Mode)
By Scott ArciszewskiToday, AES-GCM is one of two cipher modes used by TLS 1.3 (t...
2024-7-12 21:0:35 | 阅读: 7 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
gem
gcm
subkey
encryption
derivation
Trail of Bits named a leader in cybersecurity consulting services
Trail of Bits has been recognized as a leader in cybersecurity consulting service...
2024-7-9 19:0:45 | 阅读: 23 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
forrester
consulting
client
evaluation
Auditing the Ask Astro LLM Q&A app
Today, we present the second of our open-source AI security audits: a look at sec...
2024-7-5 21:0:28 | 阅读: 10 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
astro
database
rag
weaviate
poisoning
Quantum is unimportant to post-quantum
By Opal WrightYou might be hearing a lot about post-quantum (PQ) cryptography la...
2024-7-1 21:0:1 | 阅读: 9 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
discrete
subgroup
security
finite
factoring
Disarming Fiat-Shamir footguns
By Opal WrightThe Fiat-Shamir transform is an important building block in zero-k...
2024-6-24 21:0:38 | 阅读: 13 |
收藏
|
Trail of Bits Blog - blog.trailofbits.com
transcript
fiat
shamir
decree
inscribe
Previous
4
5
6
7
8
9
10
11
Next