Paper Title | Venue | Publication Date |
---|---|---|
Slither: A Static Analysis Framework For Smart Contracts | WETSEB 2019 | May 2019 |
Toward Smarter Vulnerability Discovery Using Machine Learning | AISec 2018 | October 2018 |
The Past, Present, and Future of Cyberdyne | IEEE S&P | April 2018 |
DeepState - Symbolic Unit Testing for C and C++ | BAR 2018 | February 2018 |
Cyber-Deception and Attribution in Capture-the-Flag Exercises | FOSINT-SI 2015 | July 2015 |
Presentation Title | Author(s) | Year |
---|---|---|
Going sicko mode on the Linux Kernel | William Woodruff | 2019 |
Vulnerability Modeling with Binary Ninja | Josh Watson | 2018 |
Be a binary rockstar | Sophia D'Antoine | 2017 |
Symbolic Execution for Humans | Mark Mossberg | 2017 |
The spirit of the 90s is still alive in Brooklyn | Ryan Stortz, Sophia D'Antoine | 2017 |
The dream of a static and dynamic analysis shootout | Ryan Stortz | 2016 |
Binary constraint solving for automatic exploit generation | Sophia D'Antoine | 2016 |
The Smart Fuzzer Revolution | Dan Guido | 2016 |
Making a scaleable automated hacking system | Artem Dinaburg | 2016 |
Cyberdyne - Automatic bug-finding at scale | Peter Goodman | 2016 |
McSema - Static translation of x86 instructions to LLVM IR | Andrew Ruef, Artem Dinaburg | 2014 |
Presentation Title | Author(s) | Year |
---|---|---|
SlithIR: High-Precision Security Analysis with an IR for Solidity | Josselin Feist | 2019 |
Slither: A Static Analysis Framework for Smart Contracts | Josselin Feist | 2019 |
What blockchain got right | Dan Guido | 2019 |
Property-testing of smart contracts | JP Smith | 2018 |
Anatomy of an unsafe programming language | Evan Sultanik | 2018 |
Contract upgrade risks and recommendations | Josselin Feist | 2018 |
Blackhat Ethereum | Ryan Stortz, Jay Little | 2018 |
Blockchain Autopsies - Analyzing Smart Contract Deaths | Jay Little | 2018 |
Rattle - an Ethereum EVM binary analysis framework | Ryan Stortz | 2018 |
Securing value on the Ethereum blockchain | Dan Guido | 2018 |
Binary analysis, meet the blockchain | Mark Mossberg | 2018 |
Automatic bug finding for the blockchain | Felipe Manzano, Josselin Feist | 2017 |
Presentation Title | Author(s) | Year |
---|---|---|
Analyzing the MD5 collision in Flame | Alex Sotirov | 2012 |
Presentation Title | Author(s) | Year |
---|---|---|
Getting started with osquery | Lauren Pearl, Andy Ying | 2018 |
osquery Super Features | Lauren Pearl | 2018 |
osquery Extension Skunkworks | Mike Myers | 2018 |
Build it Break it Fix it | Andrew Ruef | 2014 |
Presentation Title | Author(s) | Year |
---|---|---|
The Joy of Pwning | Sophia D'Antoine | 2017 |
How to CTF - Getting and using Other People's Computers (OPC) | Jay Little | 2014 |
Low-level Security | Andrew Ruef | 2014 |
Security and Your Business | Andrew Ruef | 2014 |
Bringing nothing to the party | Vincenzo Iozzo | 2013 |
From One Ivory Tower to Another | Vincenzo Iozzo | 2012 |
Presentation Title | Author(s) | Year |
---|---|---|
Swift Reversing | Ryan Stortz | 2016 |
Modern iOS Application Security | Sophia D'Antoine, Dan Guido | 2016 |
The Mobile Exploit Intelligence Project | Dan Guido | 2012 |
A Tale of Mobile Threats | Vincenzo Iozzo | 2012 |
Presentation Title | Author(s) | Year |
---|---|---|
Hardware side channels in virtualized environments | Sophia D'Antoine | 2015 |
Exploiting Out-of-Order Execution | Sophia D'Antoine | 2015 |
Presentation Title | Author(s) | Year |
---|---|---|
The Exploit Intelligence Project Revisited | Dan Guido | 2013 |
Workshop Title | Venue | Date |
---|---|---|
Manticore EVM Workshop | Devcon4 2018 | November 2018 |
DeepState: Bringing Vulnerability Detection Tools into the Dev Cycle | SecDev 2018 | October 2018 |
Smart Contract Security Automation Workshop | TruffleCon 2018 | October 2018 |
Smart Contract Security Automation Workshop | ETH Berlin 2018 | September 2018 |
Manticore EVM Workshop | EthCC 2018 | March 2018 |
Manticore Workshop | GreHack 2017 | October 2017 |