At&Df: Side-Channel Data Encoding Through Virtual MouseMvm(CursorHoppingEncoder)
zenodo.org·15h·
Discuss: Hacker News
🦠Malware Analysis
AI-Powered Shelf Price Verification: Matching Label Prices to POS Server Prices
blog.roboflow.com·10h·
Discuss: Hacker News
Proof Automation
Vibecoding a Cyberpunk 3D GUI for System Commissioning
blog.funcall.org·2h·
Discuss: Hacker News
🧩WASM Components
Nine HTTP Edge Cases Every API Developer Should Understand
blog.dochia.dev·9h·
Format Verification
WARMCOOKIE One Year Later: New Features and Fresh Insights
elastic.co·1d
🛡️eBPF Security
LLMs Are the Key to Mutation Testing and Better Compliance
engineering.fb.com·2d
🐛Fuzzing
Revisiting bsdiff as a tool for digital preservation
exponentialdecay.co.uk·4d
💿FLAC Archaeology
Security Engineers – a MCP audit checklist for you
semgrep.dev·1d·
Discuss: Hacker News
🧪Protocol Fuzzing
Trunk Flaky Test is out of beta
trunk.io·5h·
Discuss: Hacker News
🐛Fuzzing
blog.fsck.com·2d
⚔️Lean Tactics
A Puzzling Performance Puzzle
kodewerk.com·2d·
Discuss: Hacker News
🔢Bitwise Algorithms
The Anti-Truth Mandate: A Technical Flaw in Claude's Safety Architecture
github.com·1d·
Discuss: Hacker News
🎯Gradual Typing
Introducing RTEB: A New Standard for Retrieval Evaluation
huggingface.co·1d·
Discuss: Hacker News
🔍BitFunnel
Analyzing Latent Concepts in Code Language Models
arxiv.org·17h
🔢Denotational Semantics
A Beginner’s Guide to the Authenticated Byzantine Gossip Protocol
hackernoon.com·14h
🤝Consensus Algorithms
[Guest Diary] Comparing Honeypot Passwords with HIBP, (Wed, Oct 1st)
isc.sans.edu·1d
🔓Password Cracking
CTFs as a Rosetta Stone
bhmt.dev·2d·
Discuss: Hacker News
🔓Hacking
LLM Code Review vs. Deterministic SAST Security Tools
blog.fraim.dev·48m·
Discuss: Hacker News
Proof Automation
Issue 492
haskellweekly.news·9h·
Discuss: Hacker News
🔗Functional Compilers
Numeric Pager Code Encoder Tool (Look Alike Cipher)
fcsuper.blogspot.com·19h·
🔤Character Encoding