Lazy Backup (2006)
📁File Systems
Flag this post
AWS DynamoDB Outage Analysis
🔭Tracing
Flag this post
eBPF Tutorial by Example: Monitoring GPU Driver Activity with Kernel Tracepoints
📊Profiling Tools
Flag this post
Reflections on Trusting Trust (1984)
🏷️Memory Tagging
Flag this post
Quantum-Powered Privacy: Securing the IoT with Decentralized Anomaly Detection
⚛️Quantum Computing
Flag this post
Automated Anomaly Detection in Surgical Instrument Tracking Using Federated Learning
🧠Machine Learning
Flag this post
Defending AI Email Assistants Against Prompt Injection: A Forensic-First Framework
🛡️AI Security
Flag this post
Russian spies pack custom malware into hidden VMs on Windows machines
🔓Binary Exploitation
Flag this post
Linux 6.19 To Support Additional Arm Mali & Vivante Graphics Hardware
phoronix.com·16h
🐧Linux Kernel
Flag this post
Civilization Heartbeat Sentinel
🔭Tracing
Flag this post
A Friendly Tour of Process Memory on Linux
📋Zero-Copy
Flag this post
ShadowLogic: Backdoors in Any Whitebox LLM
arxiv.org·2d
🛡️AI Security
Flag this post
D2-UC: A Distributed-Distributed Quantum-Classical Framework for Unit Commitment
arxiv.org·2h
⚛️Quantum Computing
Flag this post
Loading...Loading more...