Back to Organizations
Trail Of Bits
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real-world attacker mentality to reduce risk and fortify code.
New York, USA
Employees: 60
Description
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real-world attacker mentality to reduce risk and fortify code. Our services include Software Assurance, where experts in systems software, blockchain, and cryptography help clients understand their security landscape. The Security Engineering team works with clients to build custom tools and remediate system vulnerabilities. As an industry leader in high-end security research, the team has a track record of discovering critical Internet vulnerabilities. Trail of Bits also offers expert training courses in reverse engineering, program analysis, penetration testing, and more. Their product, iVerify, helps secure mobile devices and online accounts.Technology & Skills
VULNERABILITY ANALYSIS
COMPILER
BINARY ANALYSIS
OPERATING SYSTEM INTERNALS
PROGRAM ANALYSIS
SECURE DEVELOPMENT
VULNERABILITIES
VULNERABILITY SCANNING
SECURITY RESEARCH
COSMOS
ROLLUP
TENDERMINT
NODE OPERATION
CROSS-CHAIN COMMUNICATION
PBFT
STATE CHANNEL
VALIDATOR NODE
SIDECHAIN
SECURITY ANALYSIS
FINALITY
DEPLOYMENT SECURITY
MEDUSA
AUTOMATED ANALYSIS
THREAT MODELING
SECURITY ASSESSMENT
DATA POISONING
JAX
ADVERSARIAL MACHINE LEARNING
MODEL POISONING
JAILBREAKING
ROBUSTNESS TESTING
INFERENCE SYSTEM
GPU OPTIMIZATION
VULNERABILITY DISCOVERY
ADVERSARIAL ATTACK
AI SAFETY
FOUNDATION MODEL
EXPLOIT DEVELOPMENT
ADVERSARIAL ROBUSTNESS
ADVERSARIAL AI
ROBUSTNESS
ADVERSARIAL EXAMPLE
JAILBREAK
DEMAND GENERATION
WEBINARS
LANDING PAGES
POST-MORTEM
BOARD PRESENTATION
WRITING
PROGRAM MANAGEMENT
AUTOMATION
AI
ACCOUNTABILITY
AFTER-ACTION REVIEW
EOS
REVERSE ENGINEERING
LOW-LEVEL PROGRAMMING
CODE ANALYSIS
DEBUGGER
CRYPTANALYSIS
CRYPTOGRAPHY
SOLIDITY
GO
HASKELL
SYSTEMS PROGRAMMING
CLOUD-NATIVE
JAVASCRIPT
RUST
DEBUGGING
OCAML
SOFTWARE SECURITY ASSESSMENT
LOW-LEVEL SOFTWARE
CLOUD-NATIVE SOFTWARE