🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🧪 Hardware Fuzzing

CPU Testing, Instruction Fuzzing, Hardware Bugs, Silicon Validation

Automated Code Repair for C/C++ Static Analysis Alerts
arxiv.org·1d
📊Static Analysis
Over 100 Dell models exposed to critical ControlVault3 firmware bugs
securityaffairs.com·3h
🔒Secure Boot
CoreMark Benchmark of the APM32F402
hackster.io·3h
🖥️Modern CPU
(Not) Strange Bedfellows – Samsung’s Rubin & Digital Wellbeing
thebinaryhick.blog·11h
🔒Secure Boot
I may be building a new system soon, but not "cutting edge"
forums.anandtech.com·12h
🧲RISC-V Archaeology
Automated Test Failures in CICD – what is true cost?
news.ycombinator.com·2h·
Discuss: Hacker News
📏Code Metrics
Transaction Healing: Scaling Optimistic Concurrency Control on Multicores
muratbuffalo.blogspot.com·22h·
Discuss: www.blogger.com
⚡Hardware Transactional Memory
Cloth (?) fiber in Xeon socket causing memory issues?
i.redd.it·15h·
Discuss: r/homelab
🛠️Greaseweazle
Reverse-Engineering Game Boy Advance Games (and General Advice)
nytpu.com·1d
🎮Game Decompilation
Intel Struggles With Key Manufacturing Process For Next PC Chip
hardware.slashdot.org·1d
🔧Hardware Verification
The Amaranth hardware description language
amaranth-lang.org·1d·
Discuss: Hacker News
🔍FPGA Verification
Good news - humans are getting better at spotting malware...but we're still pretty bad at it
techradar.com·17h
🦠Malware Analysis
I Migrated My VirtualBox Project to Linux and Everything Broke. Here’s How an AI and I Fixed It.
dev.to·1h·
Discuss: DEV
🧲RISC-V Archaeology
Talk Highlights: Documenting the Design of the Linux Kernel – Chuck Wolber, The Boeing Company; Kate Stewart, The Linux Foundation; Gabriele Paoloni, Red Hat
elisa.tech·1d
📜Proof Carrying Code
Avoid Python SAST scanners based on AI
nocomplexity.com·2h
🧪Protocol Fuzzing
Experience report: Implementing High Volume Automated Testing system
mirekdlugosz.com·18h
🧪Property-Based Testing
New Infection Chain and ConfuserEx-Based Obfuscation for DarkCloud Stealer
unit42.paloaltonetworks.com·35m
🔓Hacking
Part 1: A Deep Dive into Rust and C Memory Interoperability
notashes.me·2d·
Discuss: Hacker News, r/programming
🔩Systems Programming
Get Started with the Seeed Meshtastic Case Design Challenge
hackster.io·1h
🎮Switch Archaeology
Ada on RP2350
synack.me·1d
🎯Emulation Accuracy
Loading...Loading more...
AboutBlogChangelogRoadmap