Reverse Engineering, Binary Analysis, Control Flow Recovery, Disassembly

How we trained an ML model to detect DLL hijacking
securelist.com·2h
🏷️Memory Tagging
Automated Verification of Code Logic & Security Vulnerabilities via Hyperdimensional Semantic Analysis
dev.to·6h·
Discuss: DEV
🌳Pattern Match Compilation
rblhost: Exploring Rust’s Role in Embedded Development Tools
mcuoneclipse.com·16h
🏗️Cranelift
The Inverse Matrix problem
talesfrom.dev·10h
🚂Error Propagation
Google Chrome RCE (No Sandbox) via CanonicalEquality:EqualValueType()
ssd-disclosure.com·15h·
Discuss: Hacker News
🛡️Stack Safety
Nix pills
nixos.org·1d
🏗️Build Systems
Are Software Registries Inherently Insecure?
developers.slashdot.org·9h
🛡️Security Type Systems
ROCm/TheRock
github.com·8h
🔄Cross-Compilation
The Best Performance Optimization Is Sometimes Changing Your Architecture
reddit.com·23h·
Discuss: r/webdev
🚀Code Motion
Automatic Building Code Review: A Case Study
arxiv.org·6h
📦Dependency Analysis
Codie's Cognitive Chronicals
dev.to·7h·
Discuss: DEV
🏺Code Archeology
Tape Library and Show Off
i.redd.it·11h·
Discuss: r/homelab
🔄Deduplication
Souvenir
deprogrammaticaipsum.com·7h
🔗Weak References
🔐Back to the Roots: Nostalgic Journey to University CTF Battles of the Early 2010s
dev.to·6h·
Discuss: DEV
🛡️Security Type Systems
Smart Specs: Automating Engineering Standards for Error-Free Design
vibe.forem.com·1d·
Discuss: DEV
Configuration Validation
🔗 The basics of a release branching strategy
yellowduck.be·2h
🔪Program Slicing
Recurse Checkins
404wolf.com·9h
🔄Bootstrapping
A Primer on Memory Consistency and Cache Coherence, Second Edition
link.springer.com·17h·
Discuss: r/programming
🧠Memory Models
Property-based testing of batch-invariant operations
mmaaz.ca·11h·
Discuss: Hacker News
🎲Property Testing
6th October – Threat Intelligence Report
research.checkpoint.com·1h
🛡️Security Type Systems