Binary Protocol Testing, Security Validation, Parser Robustness, Format Security

Balance between refactoring and inheritance in your code
github.com·25m·
Discuss: Hacker News
Format Verification
Fortress AI: Shielding Collaborative Models with Zero-Knowledge Verification
dev.to·4h·
Discuss: DEV
🤐Secure Multiparty
Eternal-Tux: Crafting a Linux Kernel KSMBD 0-Click RCE Exploit from N-Days
willsroot.io·1d·
🛡️eBPF Security
A Dumb Introduction to z3. Exploring the world of constraint solvers with very simple examples.
asibahi.github.io·15h·
🧮Z3 Solver
Shiny tools, shallow checks: how the AI hype opens the door to malicious MCP servers
securelist.com·2h
🔓Hacking
IETF Draft: Authenticated Transfer Repo and Sync Specification
ietf.org·1h·
Discuss: Hacker News
🌳Archive Merkle Trees
Test state, not interactions
rednafi.com·1d·
Discuss: Hacker News
🐛Fuzzing
It actually is a snap?
lambdacreate.com·1d
❄️Nix Flakes
The State of Adversarial Prompts
blog.securitybreak.io·1d
🎯Threat Hunting
Sound Statistical Model Checking for Probabilities and Expected Rewards (extended version)
arxiv.org·8h
🎯Performance Proofs
Claude Code
michal.sapka.pl·1d
🦀Rust Macros
Optimized Modbus RTU Data Validation via Hybrid Markov & Bayesian Filtering
dev.to·2h·
Discuss: DEV
🔧Hardware Verification
A simple way to automate RHEL VM creation
marcin.juszkiewicz.com.pl·1d
🔌Operating system internals
ISO C++ committee has a new chief sheep herder
shape-of-code.com·14h
📜Proof Carrying Code
Back from Open Source Summit Europe 2025: talks from Bootlin
bootlin.com·2h
⚙️Operating System Design
CI for Libvirt/Bhyve on FreeBSD
empt1e.blogspot.com·10h·
Discuss: Hacker News
❄️Nix Flakes
You can't test if quantum uses complex numbers
algassert.com·24m·
Discuss: Hacker News
🔐Quantum Security
netcrypt: Secure Socket Communication & Encrypted Tunneling for Python
dev.to·18h·
Discuss: DEV
🌐NetworkProtocols
ELA-1516-1 imagemagick security update
freexian.com·18h
💣ZIP Vulnerabilities