Insights & Research

Blog

Technical writings, security research findings, and selected company news from our team of experts.

Latest Posts

Fuzzing Minimal LLM-based fuzz harness generator
18th Febuary, 2025

Minimal LLM-based fuzz harness generator

Fuzzing Fuzz Introspector: enabling rapid fuzz introspection tool development
14th Febuary, 2025

Fuzz Introspector: enabling rapid fuzz introspection tool development

Security Audit LLVM Fuzzing Audit
1st March, 2024

LLVM Fuzzing Audit

Security Audit Kyverno security audit 2023 findings and report
4th December, 2023

Kyverno security audit 2023 findings and report

Research Structured results for OpenSSF Scorecard - An enabler for custom policies
6th November, 2023

Structured results for OpenSSF Scorecard - An enabler for custom policies

Security Audit Crossplane security audit 2023 findings and report
27th July, 2023

Crossplane security audit 2023 findings and report

Security Audit Notation security audit 2023 findings and report
11th July, 2023

Notation security audit 2023 findings and report

Fuzzing Improving continuous fuzzing of Liblouis
23rd June, 2023

Improving continuous fuzzing of Liblouis

Security Audit Vitess security security audit 2023 findings and report
5th June, 2023

Vitess security security audit 2023 findings and report

Security Audit Presenting the findings of Ciliums fuzzing and security audits
13th February, 2023

Presenting the findings of Ciliums fuzzing and security audits

Security Audit Istio service mesh security audit
30th January, 2023

Istio service mesh security audit

Security Audit Jackson-core and Jackson-databind security audit
2nd November, 2022

Jackson-core and Jackson-databind security audit

Fuzzing Ada Logics sets up continuous fuzzing for Cluster API
20th July, 2022

Ada Logics sets up continuous fuzzing for Cluster API

Security Audit Argo security audit 2022
18th July, 2022

Argo security audit 2022

Security Audit KubeEdge holistic security audit engagement
11th July, 2022

KubeEdge holistic security audit engagement

Security Audit CRI-O holistic security audit engagement
6th June, 2022

CRI-O holistic security audit engagement

Fuzzing Cloud Native Fuzzing: Istio - 40 crashes and high-severity CVE
22rd February, 2022

Cloud Native Fuzzing: Istio - 40 crashes and high-severity CVE

Fuzzing Structure-aware Go fuzzing: How to fuzz with complex types
11th February, 2022

Structure-aware Go fuzzing: How to fuzz with complex types

Security Audit
11th November, 2021

FluxCD Security Audit

Extract text

Fuzzing Fuzzing 100+ open source projects with OSS-Fuzz - lessons learned.
31st August, 2021

Fuzzing 100+ open source projects with OSS-Fuzz - lessons learned.

In this blog post we will describe our efforts of integrating continuous fuzzing into more than 100 open source projects...

Security Audit Case study: Oxford University Cyber Security CDT using Ada Logics training for electives
16th August, 2021

Case study: Oxford University Cyber Security CDT using Ada Logics training for electives

In spring 2021 Ada Logics engaged with Oxford University Centre for Doctoral Training in Cyber Security to deliver three...

Security Audit Integrating continuous security analysis into Linkerd2-proxy and dependencies
28th May, 2021

Integrating continuous security analysis into Linkerd2-proxy and dependencies

This post covers how Ada Logics integrated continuous security analysis into a state-of-the-art network proxy.

Fuzzing The importance of continuity in fuzzing - CVE-2020-28362
17th February, 2021

The importance of continuity in fuzzing - CVE-2020-28362

In this blogpost we highlight the importance of continuity in fuzzing based on a recent experience with a security criti...

Fuzzing Securing Open Source: Fuzzing integration, vulnerability analysis and bug fixing of Fluent Bit
15th December, 2020

Securing Open Source: Fuzzing integration, vulnerability analysis and bug fixing of Fluent Bit

Fluent Bit is an open source log processor and part of the Cloud Native Computing Foundation. This fall the Linux Founda...

Fuzzing Getting started with go-fuzz
30th October 2020

Getting started with go-fuzz

In this article we will get started with go-fuzz, which is a popular open source fuzzing engine for Go applications. Fuz...

Research Symbolic execution with KLEE: From installation and introduction to bug-finding in open source software.
21st August 2020

Symbolic execution with KLEE: From installation and introduction to bug-finding in open source software.

In this post we present four videos that cover the KLEE tool. KLEE is a symbolic execution engine that can be used to au...

Research Comparison of the LLVM IR generated by three binary-to-llvm translators
17th september 2019

Comparison of the LLVM IR generated by three binary-to-llvm translators

In this blog post we share some brief insights into the code produced three popular binary-to-llvm translators. We do so...

Research The state of advanced code injections
13th august 2019

The state of advanced code injections

In the last few years there has been a significant interest in code injection techniques from both attackers and defende...

Research Building a custom malware sandbox with PANDA - Part 1
8th august 2019

Building a custom malware sandbox with PANDA - Part 1

In the last decade there has been many improvements in fine-grained analysis techniques that focus on automating reverse...