Research & Development
Leveraging the Analog Domain for Security (LADS)
As a performer in DARPA's Leveraging the Analog Domain for Security program, we're writing program analysis tools to help protect low-resource systems from advanced cyber threats, such as RowHammer, which allow individual bits to get flipped in arbitrary program memory. The automated program analyzer we're engineering is built on Manticore, our Python symbolic execution platform.
Manticore unlocks the power of symbolic execution for security researchers. It's pure Python with minimal dependencies that can operate on x86, x64, and ARM binaries. Anyone with experience in exploitation or reversing can use the API to create specialized binary analysis or software security tools.
CTF Field Guide
Capture the flag (CTF) competitions provide an ideal platform for students to learn to think like attackers. And yet most schools and colleges lack the expertise to form and train CTF teams for competition. This guide closes the gap, and addresses the larger skills gap in the cybersecurity industry.
McSema is a novel software framework that allows for the reverse engineering of binary code with tools built to analyze source code. It’s now much simpler for software engineers to analyze and transform applications in complex ways.
Cyber Reasoning System (CRS)
Recognized as the second-most effective entrant in DARPA’s Cyber Grand Challenge (CGC) qualifying event, our CRS automatically detects software vulnerabilities on par with more complex systems, but requires half the code and easily integrates new analysis tools. Our CRS delivers effectiveness without compromising on simplicity or extensibility.
In the Press
From our Blog
A walk down memory lane
Admit it. Every now and then someone does something, and you think: “I also had that idea!” You feel validated — a kindred spirit has had the same intuitions, the same insights, and even drawn the same conclusions…