Disassembling Terabytes of Random Data with Zig and Capstone to Prove a Point
🔓Binary Exploitation
Flag this post
Security Audit of intel ICE Driver for e810 Network Interface Card
arxiv.org·5h
🔍eBPF
Flag this post
Lowering in Reverse
buttondown.com·1d
🔥DataFusion
Flag this post
[Research] Cross-Stage Vulnerabilities in Large Language Model Architectures
🛡️AI Security
Flag this post
Reverse Engineering Googles BotGuard
🔓Binary Exploitation
Flag this post
[Talk] Improving the Incremental System in the Rust Compiler
blog.goose.love·14h
🔨Incremental Compilation
Flag this post
PAINT25 Invited Talk transcript: “Notational Freedom via Self-Raising Diagrams”
programmingmadecomplicated.wordpress.com·22h
🔤Language Design
Flag this post
Thoughts on "Static Retrival Revisited"
curiouscoding.nl·1d
#️⃣Hash Tables
Flag this post
Quantum-Resistant Federated Learning: Implementing Post-Quantum Cryptography for Secure Model Aggregation in Cross-Silo Envir...
🔢Homomorphic Encryption
Flag this post
Creating Lisp Systems
🏭Code Generation
Flag this post
Using eBPF to attribute packet drops to netfilter rules
developers.redhat.com·2d
🔍eBPF
Flag this post
You can use anti-trojan-source to defend (or detect) against the Glassworm Invisible Chars malware
🔓Binary Exploitation
Flag this post
Beyond Scarcity: How LLM-Driven Synthetic Data Generation is Reshaping AI
pub.towardsai.net·5h
💬Prompt Engineering
Flag this post
ShadowLogic: Backdoors in Any Whitebox LLM
arxiv.org·1d
🛡️AI Security
Flag this post
Loading...Loading more...