Research & Development
Sienna Locomotive brings fuzzing and crash triage to developers who lack detailed knowledge of vulnerabilities, how fuzzers work, and how to configure them. It works on Windows, was built on open-source software, and incorporates new research in crash triage to make fuzzing easy and effective.
Leveraging the Analog Domain for Security (LADS)
As a performer in DARPA's Leveraging the Analog Domain for Security program, we're writing program analysis tools to help protect low-resource systems from advanced cyber threats, such as RowHammer, which allow individual bits to get flipped in arbitrary program memory. The automated program analyzer we're engineering is built on Manticore, our Python symbolic execution platform.
Manticore unlocks the power of symbolic execution for security researchers. It's pure Python with minimal dependencies that can operate on x86, x64, and ARM binaries. Anyone with experience in exploitation or reversing can use the API to create specialized binary analysis or software security tools.
CTF Field Guide
Capture the flag (CTF) competitions provide an ideal platform for students to learn to think like attackers. And yet most schools and colleges lack the expertise to form and train CTF teams for competition. This guide closes the gap, and addresses the larger skills gap in the cybersecurity industry.
Control Flow Integrity
Software would be more secure if more developers took advantage of Control Flow Integrity (CFI). But adoption of this exploit mitigation technology has been limited. We’re changing that with a series of practical analyses and working examples derived from our research.
In the Press
From our Blog
Trail of Bits joins the Enterprise Ethereum Alliance
We’re proud to announce that Trail of Bits has joined the Enterprise Ethereum Alliance (EEA), the world’s largest open source blockchain initiative. As the first information security company to join, and currently one …