blog.trailofbits.comTrail of Bits Blog

blog.trailofbits.com Profile

Blog.trailofbits.com is a subdomain of Trailofbits.com, which was created on 2008-05-08,making it 16 years ago.

Discover blog.trailofbits.com website stats, rating, details and status online.Use our online tools to find owner and admin contact info. Find out where is server located.Read and write reviews or vote to improve it ranking. Check alliedvsaxis duplicates with related css, domain relations, most used words, social networks references. Go to regular site

blog.trailofbits.com Information

HomePage size: 331.243 KB
Page Load Time: 0.031668 Seconds
Website IP Address: 192.0.78.12

blog.trailofbits.com Similar Website

Bits of Everything Blog
blog.bitsofeverything.com
BITSAA Blog | BITS Alumni Association Blog
blog.bitsaa.org
Bits Blog - Bits And Pieces - Buy Jigsaw Puzzles, Puzzle Accessories, Holiday Gifts & Decor
blog.bitsandpieces.com
BITS BLOG ✴ Ashley Blewer ·
bits.ashleyblewer.com
Honda Trail - CT90 & CT110 Forum - The place where fans of the Honda Trail CT-90's & CT-110's help e
hondatrailcts.yuku.com
Motorbike Parts NI - Motorbike parts, motorbike bits, motorbike spares, honda, yamaha, kawasaki, suz
motorbikepartsni.weebly.com
Tennessee Trail Riders - A social network of avid trail riders and horse enthusiasts
tennesseetrails.ning.com
Trail's End Campground - Family Camping & Cabins in the Adirondack Foothills - Trail's End
m.trailend.com
Get Photo Mechanic - Camera Bits, Inc. Camera Bits, Inc.
store.camerabits.com
Bits from Debian - Blog from the Debian Project
bits.debian.org
Mincon Dth Hammers and Button Bits, Rock Drill Dth Hammers, Rock well Drilling Bits, Reverce Circula
mincondthhammers.dthrotarydrilling.com
Best Trail Camera For Home Security – Best Trail Camera For Home Security
best-trail-camera-for-home-security.grgprod.com
Blog - Bits of Gold - Blog
blog.bitsofgold.net
San Francisco Bay Trail – A 500-Mile Trail Around the
archive.baytrail.org
New Work Trucks and Vans for Sale in Indian Trail, NC | Crossroads Ford of Indian Trail,
worktrucks.crossroadsfordindiantrail.com

blog.trailofbits.com Httpheader

Server: nginx
Date: Sun, 12 May 2024 22:04:11 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Strict-Transport-Security: max-age=31536000
Vary: Accept-Encoding, accept, content-type, cookie
Last-Modified: Sat, 11 May 2024 14:09:28 GMT
Cache-Control: max-age=240, must-revalidate
X-nananana: Batcache-Hit
X-hacker: Want root? Visit join.a8c.com and mention this header.
Host-Header: WordPress.com
Link: https://blog.trailofbits.com/wp-json/; rel="https://api.w.org/"
X-ac: 1.bur _atomic_bur STALE
Alt-Svc: h3=":443"; ma=86400

blog.trailofbits.com Meta Info

charset="utf-8"/
content="width=device-width" name="viewport"/
content="max-image-preview:large" name="robots"/
content="Lbyyor8qrpJf-6qi1ql45JDKAmXUIcc3N0mFeVNwUok" name="google-site-verification"/
content="website" property="og:type"/
content="Trail of Bits Blog" property="og:title"/
content="https://blog.trailofbits.com/" property="og:url"/
content="Trail of Bits Blog" property="og:site_name"/
content="https://blog.trailofbits.com/wp-content/uploads/2020/07/cropped-android-chrome-512x512-1.png" property="og:image"/
content="512" property="og:image:width"/
content="512" property="og:image:height"/
content="" property="og:image:alt"/
content="en_US" property="og:locale"/
content="@trailofbits" name="twitter:creator"/
content="@trailofbits" name="twitter:site"/
content="https://blog.trailofbits.com/wp-content/uploads/2020/07/cropped-android-chrome-512x512-1-270x270.png" name="msapplication-TileImage"/

blog.trailofbits.com Ip Information

Ip Country: United States
City Name: San Francisco
Latitude: 37.7506
Longitude: -122.4121

blog.trailofbits.com Html To Plain Text

Home Using benchmarks to speed up Echidna Post May 8, 2024 Leave a comment By Ben Siraphob During my time as a Trail of Bits associate last summer, I worked on optimizing the performance of Echidna , Trail of Bits’ open-source smart contract fuzzer, written in Haskell. Through extensive use of profilers and other tools, I was able to pinpoint and debug a massive space leak in one of Echidna’s dependencies, hevm . Now that this problem has been fixed, Echidna and hevm can both expect to use several gigabytes less memory on some test cases compared to before. In this blog post, I’ll show how I used profiling to identify this deep performance issue in hevm and how we fixed it, improving Echidna’s performance. Overview of Echidna Suppose we are keeping track of a fixed supply pool. Users can transfer tokens among themselves or burn tokens as needed. A desirable property of this pool might be that supply never grows; it only stays the same or decreases as tokens are transferred or burned. How might we go about ensuring this property holds? We can try to write up some test scenarios or try to prove it by hand… or we can fuzz the code with Echidna! How Echidna works Echidna takes in smart contracts and assertions about their behavior that should always be true, both written in Solidity. Then, using information extracted from the contracts themselves, such as method names and constants, Echidna starts generating random transaction sequences and replaying them over the contracts. It keeps generating longer and new sequences from old ones, such as by splitting them up at random points or changing the parameters in the method calls. How do we know that these generations of random sequences are covering enough of the code to eventually find a bug? Echidna uses coverage-guided fuzzing —that is, it keeps track of how much code is actually executed from the smart contract and prioritizes sequences that reach more code in order to create new ones. Once it finds a transaction sequence that violates our desired property, Echidna then proceeds to shrink it to try to minimize it. Echidna then dumps all the information into a file for further inspection. Overview of profiling The Glasgow Haskell Compiler (GHC) provides various tools and flags that programmers can use to understand performance at various levels of granularity. Here are two: Compiling with profiling: This modifies the compilation process to add a profiling system that adds costs to cost centers. Costs are annotations around expressions that completely measure the computational behavior of those expressions. Usually, we are interested in top-level declarations, essentially functions and values that are exported from a module. Collecting runtime statistics: Adding +RTS -s to a profiled Haskell program makes it show runtime statistics . It’s more coarse than profiling, showing only aggregate statistics about the program, such as total bytes allocated in the heap or bytes copied during garbage collection. After enabling profiling, one can also use the -hT option, which breaks down the heap usage by closure type. Both of these options can produce human- and machine-readable output for further inspection. For instance, when we compile a program with profiling, we can output JSON that can be displayed in a flamegraph viewer like speedscope . This makes it easy to browse around the data and zoom in to relevant time slices. For runtime statistics, we can use eventlog2html to visualize the heap profile. Looking at the flamegraph below and others like it led me to conclude that at least from an initial survey, Echidna wasn’t terribly bloated in terms of its memory usage. Indeed, various changes over time have targeted performance directly. (In fact, a Trail of Bits wintern from 2022 found performance issues with its coverage, which were then fixed.) However, notice the large blue regions? That’s hevm, which Echidna uses to evaluate the candidate sequences. Given that Echidna spends the vast majority of its fuzzing time on this task, it makes sense that hevm would take up a lot of computational power. That’s when I turned my attention to looking into performance issues with hevm. The time use of functions and call stacks in Echidna Profilers can sometimes be misleading Profiling is useful, and it helped me find a bug in hevm whose fix led to improved performance in Echidna (which we get to in the next section), but you should also know that it can be misleading. For example, while profiling hevm, I noticed something unusual. Various optics-related operators (getters and setters) were dominating CPU time and allocations. How could this be? The reason was that the optics library was not properly inlining some of its operators . As a result, if you run this code with profiling enabled, you would see that the % operator takes up the vast majority of allocations and time instead of the increment function, which is actually doing the computation. This isn’t observed when running an optimized binary though, since GHC must have decided to inline the operator anyway. I wrote up this issue in detail and it helped the optics library developers close an issue that was opened last year! This little aside made me realize that I should compile programs with and without profiling enabled going forward to ensure that profiling stays faithful to real-world usage. Finding my first huge memory leak in hevm Consider the following program. It repeatedly hashes a number, starting with 0, and writes the hashes somewhere in memory (up to address m ). It does this n times. contract A { mapping (uint256 = uint256) public map; function myFunction(uint256 n, uint256 m) public { uint256 h = 0; for (uint i = 0; in; i++) { uint256 x = h; h = uint256(keccak256(abi.encode(h))); map[x % m] = h; } } } What should we expect the program to do as we vary the value of n and m ? If we hold m fixed and continue increasing the value of n , the memory block up to m should be completely filled. So we should expect that no more memory would be used. This is visualized below: Holding m fixed and increasing n should eventually fill up m. Surprisingly, this is not what I observed. The memory used by hevm went up linearly as a function of n and m . So, for some reason, hevm continued to allocate memory even though it should have been reusing it. In fact, this program used so much memory that it could use hundreds of gigabytes of RAM. I wrote up the issue here . A graph showing allocations growing rapidly I figured that if this memory issue affects hevm, it would surely affect Echidna as well. Don’t just measure once, measure N times! Profiling gives you data about time and space for a single run, but that isn’t enough to understand what happens as the program runs longer. For example, if you profiled Python’s insertionSort function on arrays with lengths of less than length 20, you might conclude that it’s faster than quickSort when asymptotically we know that’s not the case. Similarly, I had some intuition about how "expensive" (from hevm’s viewpoint) different Ethereum programs would be, but I didn’t know for sure until I measured the performance of smart contracts running on the EVM. Here’s a brief overview of what smart contracts can do and how they interact with the EVM. The EVM consists of a stack , memory , and storage . The stack is limited to 1024 items. The memory and storage are all initialized to 0 and are indexed by an unsigned 256-bit integer. Memory is transient and its lifetime is limited to the scope of a transaction, whereas storage persists across transactions. Contracts can allocate memory in either memory or storage. While writing to storage (persistent blockchain data) is significantly more expensive gas-wise than memory (transient memory per transaction), when we’re running a local node we shouldn’t expect any performance differences between the two storage types. I wrote up eight simple smart contracts that would stress these various...

blog.trailofbits.com Whois

Domain Name: TRAILOFBITS.COM Registry Domain ID: 1467563981_DOMAIN_COM-VRSN Registrar WHOIS Server: whois.1api.net Registrar URL: http://www.1api.net Updated Date: 2024-05-08T07:47:49Z Creation Date: 2008-05-08T03:30:33Z Registry Expiry Date: 2025-05-08T03:30:33Z Registrar: 1API GmbH Registrar IANA ID: 1387 Registrar Abuse Contact Email: abuse@1api.net Registrar Abuse Contact Phone: +49.68949396850 Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited Name Server: NS1.DNSIMPLE.COM Name Server: NS2.DNSIMPLE-EDGE.NET Name Server: NS3.DNSIMPLE.COM Name Server: NS4.DNSIMPLE-EDGE.ORG DNSSEC: unsigned >>> Last update of whois database: 2024-05-17T16:57:54Z <<<