Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
Trend Micro
Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
SUBSCRIBE
Blog post
Clang Checkers and CodeQL Queries for Detecting Untrusted Pointer Derefs and Tainted Loop Conditions
February 23, 2022
Taint Analysis
,
MySQL
Blog post
Static Taint Analysis using Binary Ninja: A Case Study of MySQL Cluster Vulnerabilities
February 15, 2022
Binary Ninja
,
Taint Analysis
,
MySQL
Blog post
MindShaRE: When MySQL Cluster Encounters Taint Analysis
February 10, 2022
MindshaRE
,
MySQL
,
Taint Analysis