Coco โ€“ Solving the Expression Problem in Standard OO (Java, C#, Scala, ..)
drops.dagstuhl.deยท1dยท
Discuss: Hacker News
๐Ÿ’งLiquid Types
Bypassing WAFs for Fun and JavaScript Injection with Parameter Pollution
blog.ethiack.comยท22hยท
Discuss: Hacker News
๐Ÿ›ก๏ธWASM Sandboxing
mpaland/printf
github.comยท9h
โœ…Format Verification
A Syzkaller Summer: Fixing False Positive Soft Lockups in net/sched Fuzzing
willsroot.ioยท1dยท
๐ŸงชRISC-V Fuzzing
We Rebuilt Our SQL Parser in Rust: 3.3x Faster with Zero-Copy and Better Errors
databend.comยท1dยท
Discuss: Hacker News
๐ŸŒณIncremental Parsing
Understanding Floating-Point Numbers
dennisforbes.caยท18mยท
Discuss: Hacker News
๐Ÿ“Arithmetic Precision
MetaRAG: Metamorphic Testing for Hallucination Detection in RAG Systems
arxiv.orgยท7h
๐ŸŒ€Brotli Internals
9 Best Practices for API Security โš”๏ธ
newsletter.systemdesign.oneยท2h
โšกgRPC
When Middleware Lies: The Dark Pattern of Fake Liquidity Bridges
hackernoon.comยท6h
๐ŸŒณArchive Merkle Trees
Cracking Forensics CTFs 1.0 โ€” picoCTF
infosecwriteups.comยท5h
๐Ÿ”Binary Forensics
The bloat of edge-case first libraries
43081j.comยท2dยท
๐Ÿ”—Topological Sorting
August 2025 Detection Highlights: 9 New VTIs, 20+ YARA Rules, and More Advanced Malware Insights
vmray.comยท1d
๐Ÿฆ Malware Analysis
Recon2012: Reverse engineering of binary programs for custom virtual machines
recon.cxยท3hยท
Discuss: Hacker News
๐Ÿ”ฌBinary Analysis
All You Need Is MCP โ€“ LLMs Solving a DEF Con CTF Finals Challenge
wilgibbs.comยท1dยท
Discuss: Hacker News
๐Ÿ”งBinary Parsing
Defeating Nondeterminism in LLM Inference โ€“ Thinking Machines Lab
jmason.ieยท19h
๐Ÿ’ปLocal LLMs
CEFS: Finally Solving CE's Mount(ing) Problems
xania.orgยท13h
๐Ÿ”—Archive Combinators
Show HN: TurboStitchGif new version 1.1 (alternative to giflib)
news.ycombinator.comยท18mยท
Discuss: Hacker News
๐Ÿ—œ๏ธLZW Variants
Signed and Dangerous: BYOVD Attacks on Secure Boot
binarly.ioยท1d
๐Ÿ”’Secure Boot