๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” FPGA Verification

Hardware Testing, Verilog Simulation, Property Checking, Digital Design

LASA: Enhancing SoC Security Verification with LLM-Aided Property Generation
arxiv.orgยท1d
๐Ÿ”งHardware Verification
Red Pitaya STEMlab 125-14 PRO Gen 2 is an AMD Zynq 7010/7020-based board for measurement, control, and signal processing
cnx-software.comยท1d
๐Ÿ”ŒSingle Board PC
Why Binary Won and Nothing Else Even Got Close
b0a04gl.siteยท1dยท
Discuss: Hacker News
๐ŸงฒRISC-V Archaeology
Ultimate Lab Resource for VCF 9.0
williamlam.comยท1h
๐Ÿ HomeLab
HackRF Pro Pre-Order: Frequency Range and RF Performance Improvements, USB-C, TCXO Added
rtl-sdr.comยท20h
๐Ÿ“žWebRTC
OpenELA Introduces Open-Source Verification Suite for Enterprise Linux
linuxiac.comยท12h
๐Ÿ”“Open Source Software
My AI Workflow for Understanding Any Codebase
steipete.meยท12h
โšกProof Automation
What Inflection AI Learned Porting Its LLM Inference Stack from NVIDIA to Intel Gaudi
thenewstack.ioยท4h
๐ŸงฎCompute Optimization
In which I write a library-quality B+ tree with the genies
tidyfirst.substack.comยท7hยท
Discuss: Substack
๐Ÿฆ€Rust Macros
What Is FIPS 140-3 and Why Does It Matter for Security Compliance?
securityscorecard.comยท7h
๐ŸŒณArchive Merkle Trees
PicoEMP: low-cost Electromagnetic Fault Injection (EMFI) tool
github.comยท19hยท
Discuss: Hacker News
โšกCircuit Archaeology
Shrinking the Generation-Verification Gap with Weak Verifiers
arxiv.orgยท1d
๐ŸงชCBOR Fuzzing
Options for converting PC to rackmount node
reddit.comยท5hยท
Discuss: r/homelab
๐Ÿ HomeLab
Proving that every program halts
ntietz.comยท2d
๐Ÿ‘‘Isabelle
Coherent bunching of anyons and dissociation in an interference experiment
nature.comยท6h
โš›๏ธQuantum Channels
Running shadow system tests in RISC-V
ikerexxe.github.ioยท15h
๐Ÿ‘‘RISC-V Privilege
Keystroke Forensics 101: Extracting Secrets from USB Traffic
infosecwriteups.comยท14h
๐Ÿ”NTLM Forensics
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.comยท10h
๐Ÿฆ Malware Analysis
Donkey Kong Country 2 and Open Bus
jsgroth.devยท5h
๐ŸŽฎGameBoy Architecture
LLM-Aided Testbench Generation and Bug Detection for Finite-State Machines
arxiv.orgยท1d
๐Ÿ”งHardware Verification
Loading...Loading more...
AboutBlogChangelogRoadmap