Stranger Strings: An exploitable flaw in SQLite

Porting the Solana eBPF JIT Compiler to ARM64

Are blockchains decentralized: New Trail of Bits research report examines

Themes from Real World Crypto 2022

Vulnerabilities Affecting Girault, Bulletproofs, and PlonK

Seriously, Stop Using RSA

Part 2 of 2: Implementing constant-time crypto using LLVM’s optnone

The Life of an Optimization Barrier

Disclosing Shamir’s Secret Sharing vulnerabilities and announcing ZKDocs

MUI: Visualizing symbolic execution with Manticore and Binary Ninja

A Year in the Life of a Compiler Fuzzing Campaign

Un-bee-lievable Performance: Fast Coverage-guided Fuzzing with Honeybee and Intel Processor Trace

Exploiting machine learning Pickle files

The Tao of Continuous Integration

Serving up zero-knowledge proofs

PDF is Broken: a justCTF Challenge

Reverie: An optimized zero-knowledge proof system

Seriously, Stop Using RSA

Efficient smart contract security audits with machine learning and slither-simil

Let’s build a high-performance fuzzer with GPUs

Graphtage: A New Semantic Diffing Tool

Sinter: New user-mode security enforcement for macOS

ECDSA: Handle with Care

Breaking the Solidity Compiler with a Fuzzer

Verifying Windows binaries, without Windows

Bug Hunting in Smart Contracts with Crytic

The Zeek Agent

Manticore: Symbolic execution for humans

Symbolically Executing WebAssembly in Manticore

Exploiting the Windows Cryptoapi Vulnerability

More →