Integer overflow checking with C23
blog.gnoack.orgยท1d
๐Live Variable Analysis
Flag this post
Build a Trust Zone Protected IoT Device (Trust Raspberry PI)
pixelstech.netยท1d
๐ท๏ธMemory Tagging
Flag this post
My first fifteen compilers (2019)
๐ฌNanopasses
Flag this post
AccessFix Update!
๐ฎLanguage Ergonomics
Flag this post
LLM-Driven Cost-Effective Requirements Change Impact Analysis
arxiv.orgยท5h
๐Code Migration
Flag this post
Automated Defect Prediction via Cross-Entropy Regularized Graph Neural Networks for Microservice Architectures
๐บ๏ธRegion Inference
Flag this post
Leakage-abuse Attack Against Substring-SSE with Partially Known Dataset
arxiv.orgยท5h
๐Hash Functions
Flag this post
New prompt injection papers: Agents Rule of Two and The Attacker Moves Second
๐ฌInteractive REPLs
Flag this post
How I Use Every Claude Code Feature
๐ฏ99-Line Tools
Flag this post
Defining Types for a Simple HTTP Server
mmhaskell.comยท1d
๐งAPI Design
Flag this post
A Systematic Literature Review of Code Hallucinations in LLMs: Characterization, Mitigation Methods, Challenges, and Future Directions for Reliable AI
arxiv.orgยท5h
๐Code Motion
Flag this post
How Transformer Models Detect Anomalies in System Logs
hackernoon.comยท16h
๐Log Parsers
Flag this post
cargo zigbuild
๐Cranelift Backend
Flag this post
Feeling the Vibes with Verifi
๐Cranelift IR
Flag this post
Loading...Loading more...