๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”’ Hardware Security

Secure Enclaves, TPM, Hardware Wallets, Side-Channel Attacks

Faculty and Students Present at USENIX Security Symposium
cylab.cmu.eduยท17h
๐ŸงฎHomomorphic Encryption
System Register Hijacking: Compromising Kernel Integrity By Turning System Registers Against the System
usenix.orgยท1d
๐Ÿ”งMLIR
AMD and Intel plug numerous security holes
heise.deยท14h
๐Ÿ”งMLIR
I Secured My Laptop Before Heading Back to Schoolโ€”Here's What I Did
makeuseof.comยท17h
๐Ÿ”—Crypto
OOMProf - Take a heap profile just before OOMkill using eBPF
polarsignals.comยท19hยท
Discuss: Lobsters, Hacker News, r/golang
๐Ÿ”งMLIR
Navigating the modern security stack
techradar.comยท3h
๐ŸงฎHomomorphic Encryption
Compliance Gaps Expose B2B Payments to Escalating Cyber Threats
pymnts.comยท1h
๐Ÿ“œSmart Contracts
Show HN: Guardian Protocol โ€“ Open-Source Ethereum Security Framework
github.comยท1dยท
Discuss: Hacker News
๐Ÿ“œSmart Contracts
The Critical Role of Pre-Silicon Security Verification with Secure-ICโ€™s Laboryzrโ„ข Platform
semiwiki.comยท2d
๐ŸงฎHomomorphic Encryption
Perfect Implementation Isnโ€™t Enough: Four Ways an ASI Moratorium Could Fail
lesswrong.comยท16h
๐Ÿ”„Protocol Design
Reverse Engineering Pokรฉmon Go Plus (2018)
tinyhack.comยท10hยท
Discuss: Hacker News
๐Ÿ”—Crypto
Real-Time eBPF Intrusion Detection via Dynamic Kernel Graph Pruning & Anomaly Scoring
dev.toยท4hยท
Discuss: DEV
๐ŸงฎHomomorphic Encryption
Linux Security Hardening and Other Tweaks
vez.mrsk.meยท20hยท
Discuss: Hacker News
๐Ÿ”งMLIR
In-depth analysis on Valorant's Guarded Regions
reversing.infoยท1dยท
Discuss: Hacker News
๐Ÿ”งMLIR
Intriguing Properties of GPT-OSS Jailbreaks
xlabaisecurity.comยท13hยท
Discuss: Hacker News
๐Ÿ”—Crypto
The WETC Double-Spend
blog.verichains.ioยท1d
๐Ÿ“œSmart Contracts
Heracles: Chosen Plaintext Attack on AMD SEV-SNP
packetstorm.newsยท1d
๐Ÿ”—Crypto
The Root(ing) Of All Evil: Security Holes That Could Compromise Your Mobile Device
zimperium.comยท20h
๐Ÿ”Zero-Knowledge Proofs
Atomic I/O letters column #139
dansdata.comยท1d
๐Ÿ”„Protocol Design
Intriguing Properties of gpt-oss Jailbreaks
lesswrong.comยท14h
๐ŸงฎHomomorphic Encryption
Loading...Loading more...
AboutBlogChangelogRoadmap