Back to Organizations
Trail Of Bits
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real-world attacker mentality to reduce risk and fortify code.
New York, USA
Employees: 60
Description
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real-world attacker mentality to reduce risk and fortify code. Our services include Software Assurance, where experts in systems software, blockchain, and cryptography help clients understand their security landscape. The Security Engineering team works with clients to build custom tools and remediate system vulnerabilities. As an industry leader in high-end security research, the team has a track record of discovering critical Internet vulnerabilities. Trail of Bits also offers expert training courses in reverse engineering, program analysis, penetration testing, and more. Their product, iVerify, helps secure mobile devices and online accounts.Technology & Skills
VULNERABILITY ANALYSIS
MEMORY MANAGEMENT
COMPILER
BINARY ANALYSIS
OPERATING SYSTEM INTERNALS
PROGRAM ANALYSIS
SECURE DEVELOPMENT
VULNERABILITIES
PENETRATION TESTING
VULNERABILITY SCANNING
SECURITY RESEARCH
VULNERABILITY ASSESSMENT
BLOCKCHAIN NODE
STATIC ANALYSIS
COSMOS
ROLLUP
TENDERMINT
NODE OPERATION
CROSS-CHAIN COMMUNICATION
PBFT
TOOL DEVELOPMENT
STATE CHANNEL
VALIDATOR NODE
SIDECHAIN
SECURITY ANALYSIS
FINALITY
DEPLOYMENT SECURITY
MEDUSA
AUTOMATED ANALYSIS
THREAT MODELING
SECURITY TESTING
SECURITY ASSESSMENT
PERFORMANCE TUNING
NETWORK SECURITY
DATA POISONING
JAX
ADVERSARIAL MACHINE LEARNING
MODEL POISONING
JAILBREAKING
ROBUSTNESS TESTING
INFERENCE SYSTEM
GPU OPTIMIZATION
VULNERABILITY DISCOVERY
ADVERSARIAL ATTACK
AI SAFETY
FOUNDATION MODEL
EXPLOIT DEVELOPMENT
ADVERSARIAL ROBUSTNESS
ADVERSARIAL AI
ROBUSTNESS
ADVERSARIAL EXAMPLE
JAILBREAK
KNOWLEDGE MANAGEMENT
WEB SCRAPING
REVERSE ENGINEERING
CLOUD SECURITY
APPLICATION SECURITY
SAST
DAST
DYNAMIC ANALYSIS
SECURE DEVELOPMENT LIFECYCLE
CONSULTING
API SECURITY
VULNERABILITY RESEARCH
ARCHITECTURAL REVIEW
MEMORY CORRUPTION
ARCHITECTURE REVIEW
EMAIL MARKETING
COMMUNITY BUILDING
DEMAND GENERATION
WEBINAR
ROI
WEBINARS
LANDING PAGES