Evan is a principal computer security researcher based in Philadelphia working at Trail of Bits. He has a couple dozen academic publications, but most of them are related to distributed systems and combinatorial optimization, not security. He is also an editor of and frequent contributor to the offensive computer security journal Proof of Concept or GTFO.
Evanβs woefully out-of-date rΓ©sumΓ© is a PDF that is also a ZIP as well as an Nintendo Entertainment System ROM! Thatβs right: Evanβs rΓ©sumΓ© PDF is a valid NES ROM that you can emulate! Check the footnotes on the first page. If you don't have an NES emulator handy, you can actually emuluate the PDF in your browser. Evan also has an even more woefully out-of-date academic curriculum vitΓ¦.
Aside from when writing in a biographical format, Evan does not usually refer to himself in the third person.
The following are some of my selected projects.
Automated program instrumentation and bug-finding. This section is for general program analysis tools. Tools related to to Blockchain technology and smart contracts are in their own section, below.
An LLVM-based universal taint and data-flow analysis instrumentation framework. Can track up to 232 input bytes.
Symbolic execution engine for x86, ARM, and EVM.
Fickling is a decompiler, static analyzer, and bytecode rewriter for Python pickle object serializations.
Pickled Python objects are in fact bytecode that is interpreted by a stack-based virtual machine built into Python called the "Pickle Machine". Fickling can take pickled data streams and decompile them into human-readable Python code that, when executed, will deserialize to the original serialized object.
I do not prescribe any meaning to the βFβ in Fickling; it could stand for βfickle,β β¦ or something else. Divining its meaning is a personal journey in discretion and is left as an exercise to the reader.
Learn more about it in our blog post and DEF CON 2021 talk.
A lot of my recent work has been on developing examples of funky files that exploit buggy file formats and parsers (see the footnotes on the first page of my rΓ©sumΓ©, for example), as well as tools to make file formats and parsers safer.
A cleanroom, pure-Python implementation of libmagic that can identify files, is smart about polyglots (files that are
multiple types at the same time), can output an interactive HTML-based hex viewer, and recursively enumerate the
contents of a file (similar to binwalk
).
I created a PDF that is a git repository that, when cloned, contains its LaTeX source code and a copy of itself. The PDF contains an article describing how I did it.
I enjoy building generic command line utilities and libraries.
Graphtage is a command-line utility and underlying library for semantically comparing and merging tree-like structures, such as JSON, XML, HTML, YAML, plist, and CSS files. Its name is a portmanteau of βgraphβ and βgraftageββthe latter being the horticultural practice of joining two trees together such that they grow as one.
It-Depends is a tool to automatically build a dependency graph and Software Bill of Materials (SBOM) for packages and arbitrary source code repositories. You can use it to enumerate all third party dependencies for a software package, map those dependencies to known security vulnerabilities, as well as compare the similarity between two packages based on their dependencies.
Notify When Done (nwd
) is a utility for triggering alerts when a process finishes. Kicking off a long-running compile?
NWD can post a popup notification when it's done. Starting a job on a remote server? nwd
can send you an E-mail when
itβs done. Want to run a custom script once another finishes? nwd
can facilitate that, too.
A utility for finding the largest directories and/or files in a given directory hierarchy. Biggest supports pretty printed and colorized output to the terminal.
Despite dabbling in cryptography, I am not a cryptographer. Do not use this code to secure your secrets.
A proof-of-concept cryptosystem that provides provable plausibly deniable encryption. Lenticrypt can generate a single ciphertext file such that different plaintexts are generated depending on which key is used for decryption.
βCryptoβ π Means π Cryp π to π gra π phy!
I no longer own any cryptocurrency. I know too much about how the sausage is made.
The most ethical way I can contribute to that ecosystem is to build tools that at least make it safer for those who are willing to transact with it. The following are those tools.
Etheno is the Ethereum testing Swiss Army knife. Itβs a JSON RPC multiplexer, analysis tool wrapper, and test integration tool. It eliminates the complexity of setting up analysis tools like Manticore and Echidna on large, multi-contract projects. In particular, custom Manticore analysis scripts require less code, are simpler to write, and integrate with Truffle.
I am the creator of the original version of solc-select: A tool to quickly switch between Solidity compiler versions.
I am a contributor to Slither, a Solidity static analysis framework. It runs a suite of vulnerability detectors, prints visual information about contract details, and provides an API to easily write custom analyses. Slither enables developers to find vulnerabilities, enhance their code comprehension, and quickly prototype custom analyses.
This is a Docker container I built that is preconfigured and automatically updated with the latest Ethereum security tooling.
I am a contributor to Echidna, a fuzzer/property-based tester of Ethereum smarts contracts. It uses sophisticated grammar-based fuzzing campaigns based on a contract ABI to falsify user-defined predicates or Solidity assertions.