Disassembling Terabytes of Random Data with Zig and Capstone to Prove a Point
๐Binary Exploitation
Flag this post
Security Audit of intel ICE Driver for e810 Network Interface Card
arxiv.orgยท10h
๐eBPF
Flag this post
An introduction to program synthesis (Part II) - Automatically generating features for machine learning
๐ญProgram Synthesis
Flag this post
[Research] Cross-Stage Vulnerabilities in Large Language Model Architectures
๐ก๏ธAI Security
Flag this post
Lowering in Reverse
๐ฅDataFusion
Flag this post
[Talk] Improving the Incremental System in the Rust Compiler
blog.goose.loveยท20h
๐จIncremental Compilation
Flag this post
Gen AI Grows Up: Building Production-Ready Agents on the JVM โข Rod Johnson โข GOTO 2025
youtube.comยท2h
๐ฑEdge AI
Flag this post
PAINT25 Invited Talk transcript: โNotational Freedom via Self-Raising Diagramsโ
programmingmadecomplicated.wordpress.comยท1d
๐คLanguage Design
Flag this post
Quantum-Resistant Federated Learning: Implementing Post-Quantum Cryptography for Secure Model Aggregation in Cross-Silo Envir...
๐ขHomomorphic Encryption
Flag this post
Creating Lisp Systems
๐ญCode Generation
Flag this post
We found embedding indexing bottleneck in the least expected place: JSON parsing
โกFastAPI
Flag this post
Using eBPF to attribute packet drops to netfilter rules
developers.redhat.comยท2d
๐eBPF
Flag this post
Loading...Loading more...