A Deep Dive into the Morris Worm
📡Side-Channel Attacks
Flag this post
The Algebraic CheapLunch: Extending FreeLunch Attacks on Arithmetization-Oriented Primitives Beyond CICO-1
eprint.iacr.org·2d
🔐Zero-Knowledge Proofs
Flag this post
The Same Feature That Makes a Component Powerful Can Also Make It Dangerous
📡Side-Channel Attacks
Flag this post
Disassembling Terabytes of Random Data with Zig and Capstone to Prove a Point
📡Side-Channel Attacks
Flag this post
A Security Model for Systemd
📡Side-Channel Attacks
Flag this post
Protecting Against Open-Source Malicious Packages: What Doesn't Work
📡Side-Channel Attacks
Flag this post
Show HN: Kumi – a portable, declarative, functional core for business logic
✅Formal Methods
Flag this post
AI Slop vs. OSS Security
📡Side-Channel Attacks
Flag this post
Breaking and Fixing MacaKey
eprint.iacr.org·2d
🔒Cryptography
Flag this post
GTIG AI Threat Tracker: Advances in Threat Actor Usage of AI Tools
📡Side-Channel Attacks
Flag this post
Mathematical exploration and discovery at scale
🦀Rust
Flag this post
Dive into Systems
✅Formal Methods
Flag this post
Firefox and Chromium
📡Side-Channel Attacks
Flag this post
Flatpak Happenings
📡Side-Channel Attacks
Flag this post
Low-Level Hacks
📡Side-Channel Attacks
Flag this post
Loading...Loading more...