How we trained an ML model to detect DLL hijacking
securelist.comยท13h
๐Ÿท๏ธMemory Tagging
Automated Verification of Code Logic & Security Vulnerabilities via Hyperdimensional Semantic Analysis
dev.toยท17hยท
Discuss: DEV
๐ŸŒณPattern Match Compilation
rblhost: Exploring Rustโ€™s Role in Embedded Development Tools
mcuoneclipse.comยท1d
๐Ÿ—๏ธCranelift
These are the tools we use to build and maintain our precious tech, and they're on sale for Amazon Prime Day
tomshardware.comยท4h
๐ŸฐCapability Machines
The Inverse Matrix problem
talesfrom.devยท21h
๐Ÿš‚Error Propagation
9 ReSharper Features Every .NET Developer Should Know
blog.jetbrains.comยท6h
๐ŸŽฎLanguage Ergonomics
Google Chrome RCE (No Sandbox) via CanonicalEquality:EqualValueType()
ssd-disclosure.comยท1dยท
Discuss: Hacker News
๐Ÿ›ก๏ธStack Safety
Nix pills
nixos.orgยท1d
๐Ÿ—๏ธBuild Systems
LLM Optimization Notes: Memory, Compute and Inference Techniques
gaurigupta19.github.ioยท5hยท
Discuss: Hacker News
๐Ÿ—บ๏ธRegion Inference
Are Software Registries Inherently Insecure?
developers.slashdot.orgยท20h
๐Ÿ›ก๏ธSecurity Type Systems
Evading the Watchful Eye: A Red Teamerโ€™s Guide to EDR Bypass Techniques
medium.comยท9h
๐Ÿท๏ธMemory Tagging
ROCm/TheRock
github.comยท19h
๐Ÿ”„Cross-Compilation
Algorithms For Black-Box, Physical-to-DRAM Address-Mapping Recovery (Georgia Tech, CNRS, Et Al.)
semiengineering.comยท42m
๐Ÿท๏ธMemory Tagging
WASM in the Kernel: Tales of Triumph and Trouble
riptides.ioยท7hยท
Discuss: Hacker News
๐ŸŒWASM Runtimes
Introducing OpenZL: An Open Source Format-Aware Compression Framework
engineering.fb.comยท5hยท
๐Ÿ“ฆCompression Algorithms
The Best Performance Optimization Is Sometimes Changing Your Architecture
reddit.comยท1dยท
Discuss: r/webdev
๐Ÿš€Code Motion
Automatic Building Code Review: A Case Study
arxiv.orgยท17h
๐Ÿ“ฆDependency Analysis
Codie's Cognitive Chronicals
dev.toยท18hยท
Discuss: DEV
๐ŸบCode Archeology
Souvenir
deprogrammaticaipsum.comยท18h
๐Ÿ”—Weak References