IDfRA: Self-Verification for Iterative Design in Robotic Assembly
arxiv.orgยท1d
๐Ÿ”งHardware Verification
Program Optimisations via Hylomorphisms for Extraction of Executable Code
drops.dagstuhl.deยท1dยท
Discuss: Hacker News
๐Ÿ‘‘Coq Tactics
Broken Trust: Fixed Supermicro BMC Bug Gains a New Life in Two New Vulnerabilities
binarly.ioยท12h
๐Ÿ›ก๏ธRISC-V Security
AI Evals: Why Generic Metrics Hurt Your Product
decodingml.substack.comยท20hยท
Discuss: Substack
๐Ÿ“Code Metrics
Scaling Speculative Decoding with Lookahead Reasoning
hao-ai-lab.github.ioยท1d
๐Ÿ”งReed-Solomon Decoders
From Rust to Reality: The Hidden Journey of Fetch_max
questdb.comยท9hยท
๐Ÿฆ€Rust Macros
Success with the bench testing of the 1130 MRAM memory board finally
rescue1130.blogspot.comยท1dยท
โšกCircuit Archaeology
BYOVD to the next level (part 1) โ€” exploiting a vulnerable driver (CVE-2025-8061)
blog.quarkslab.comยท1d
๐Ÿ›ก๏ธRISC-V Security
Compositional Interface Refinement Through Subtyping in Probabilistic Session Types
arxiv.orgยท1d
๐Ÿ“žSession Types
The Point Is Addressing
cacm.acm.orgยท13hยท
Discuss: Hacker News
โšกHardware Transactional Memory
Verifying User Interfaces using SPARK Ada: A Case Study of the T34 Syringe Driver
arxiv.orgยท1d
โœ…Format Verification
Variation in Verification: Understanding Verification Dynamics in Large Language Models
arxiv.orgยท1d
๐ŸงชBinary Fuzzing
Proof Rules for MetaSMT
philipzucker.comยท2d
๐ŸงฎZ3 Solver
Walking around the compiler
bernsteinbear.comยท1dยท
๐Ÿ—๏ธCompiler Archaeology
GPT-5โ€™s Enhanced Reasoning Comes With a Steep Hidden Cost
thenewstack.ioยท15h
๐Ÿ”Concolic Testing
X Design Notes: Pattern Matching II
blog.polybdenum.comยท2d
๐Ÿ’ปProgramming languages
Diagnosing Violations of State-based Specifications in iCFTL
arxiv.orgยท1d
๐Ÿ›ก๏ธArchive Verification
VerilogMonkey: Exploring Parallel Scaling for Automated Verilog Code Generation with LLMs
arxiv.orgยท1d
๐Ÿ”FPGA Verification