A Deep Dive into the Morris Worm
๐กSide-Channel Attacks
Flag this post
The Algebraic CheapLunch: Extending FreeLunch Attacks on Arithmetization-Oriented Primitives Beyond CICO-1
eprint.iacr.orgยท2d
๐Zero-Knowledge Proofs
Flag this post
The Same Feature That Makes a Component Powerful Can Also Make It Dangerous
๐กSide-Channel Attacks
Flag this post
Disassembling Terabytes of Random Data with Zig and Capstone to Prove a Point
๐กSide-Channel Attacks
Flag this post
A Security Model for Systemd
๐กSide-Channel Attacks
Flag this post
Show HN: Kumi โ a portable, declarative, functional core for business logic
โ
Formal Methods
Flag this post
AI Slop vs. OSS Security
๐กSide-Channel Attacks
Flag this post
Show HN: Polyglot standard library HTTP client C/C++/Rust/Python and benchmarks
๐ฆRust
Flag this post
Breaking and Fixing MacaKey
eprint.iacr.orgยท2d
๐Cryptography
Flag this post
GTIG AI Threat Tracker: Advances in Threat Actor Usage of AI Tools
๐กSide-Channel Attacks
Flag this post
Dive into Systems
โ
Formal Methods
Flag this post
Firefox and Chromium
๐กSide-Channel Attacks
Flag this post
Low-Level Hacks
๐กSide-Channel Attacks
Flag this post
Flatpak Happenings
๐กSide-Channel Attacks
Flag this post
Randomness Testing Guide
๐Cryptography
Flag this post
Loading...Loading more...