๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” FPGA Verification

Hardware Testing, Verilog Simulation, Property Checking, Digital Design

LASA: Enhancing SoC Security Verification with LLM-Aided Property Generation
arxiv.orgยท1d
๐Ÿ”งHardware Verification
Red Pitaya STEMlab 125-14 PRO Gen 2 is an AMD Zynq 7010/7020-based board for measurement, control, and signal processing
cnx-software.comยท1d
๐Ÿ”ŒSingle Board PC
Why Binary Won and Nothing Else Even Got Close
b0a04gl.siteยท22hยท
Discuss: Hacker News
๐ŸงฒRISC-V Archaeology
HackRF Pro Pre-Order: Frequency Range and RF Performance Improvements, USB-C, TCXO Added
rtl-sdr.comยท15h
๐Ÿ“žWebRTC
OpenELA Introduces Open-Source Verification Suite for Enterprise Linux
linuxiac.comยท7h
๐Ÿ”“Open Source Software
In which I write a library-quality B+ tree with the genies
tidyfirst.substack.comยท3hยท
Discuss: Substack
๐Ÿฆ€Rust Macros
Running shadow system tests in RISC-V
ikerexxe.github.ioยท11h
๐Ÿ‘‘RISC-V Privilege
Options for converting PC to rackmount node
reddit.comยท1hยท
Discuss: r/homelab
๐Ÿ HomeLab
What Is FIPS 140-3 and Why Does It Matter for Security Compliance?
securityscorecard.comยท3h
๐ŸŒณArchive Merkle Trees
PicoEMP: low-cost Electromagnetic Fault Injection (EMFI) tool
github.comยท15hยท
Discuss: Hacker News
โšกCircuit Archaeology
Shrinking the Generation-Verification Gap with Weak Verifiers
arxiv.orgยท1d
๐ŸงชCBOR Fuzzing
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.comยท6h
๐Ÿฆ Malware Analysis
Proving that every program halts
ntietz.comยท2d
๐Ÿ‘‘Isabelle
Coherent bunching of anyons and dissociation in an interference experiment
nature.comยท2h
โš›๏ธQuantum Channels
LLM-Aided Testbench Generation and Bug Detection for Finite-State Machines
arxiv.orgยท1d
๐Ÿ”งHardware Verification
How to Make Large-Scale Experiments Smarter and Cheaper with AI-Driven Proofs
dev.toยท3hยท
Discuss: DEV
โœ“Automated Theorem Proving
ICSA Colloquium Talk - 10/07/2025
informatics.ed.ac.ukยท7h
๐ŸงฒRISC-V Archaeology
My first experience with Formal Methods | ZipCPU
zipcpu.comยท6d
๐Ÿ”งHardware Verification
Keystroke Forensics 101: Extracting Secrets from USB Traffic
infosecwriteups.comยท10h
๐Ÿ”NTLM Forensics
Microcontrollers: Getting Started
youtube.comยท5d
๐Ÿ”ŒMicrocontrollers
Loading...Loading more...
AboutBlogChangelogRoadmap