Rigorous Evaluation of Microarchitectural Side-Channels with Statistical Model Checking
arxiv.org·2d
🔧Hardware Verification
QA.tech 1.0 – A New Way of AI Testing for Developers
qa.tech·1h·
Discuss: Hacker News
👁️System Observability
Tips for C Programming from Nic Barker
hackaday.com·7h
🔩Systems Programming
How we trained an ML model to detect DLL hijacking
securelist.com·2d
🔗Binary Similarity
The Chip That Spoke Lisp
jxself.org·21h
🤖Lisp Machines
The Next Computing Revolution: Bringing Processing Inside Memory
computer.org·1d·
Discuss: Hacker News
Hardware Transactional Memory
Arcade Hardware Hacking: Part III
zdziarski.com·7h
🕹️Retro Gaming
Latency vs. Accuracy for LLM Apps — How to Choose and How a Memory Layer Lets You Win Both
dev.to·22h·
Discuss: DEV
Performance Mythology
Evading the Watchful Eye: A Red Teamer’s Guide to EDR Bypass Techniques
medium.com·1d
🔐Cryptographic Archaeology
We built a CUDA emulator that profiles GPU code with zero hardware
rightnowai.co·1d·
Discuss: Hacker News
🎯Emulator Accuracy
Streamlining Vulnerability Research with the idalib Rust Bindings for IDA 9.2
hex-rays.com·18h
🦀Rust Macros
I think I've finally figured out Microsoft's Windows strategy
forums.anandtech.com·1h
🔌Operating system internals
M900 - 10FLS00P00 - Not utilising Cores, seems throttled.
reddit.com·1d·
Discuss: r/homelab
🔌Operating system internals
Google Chrome RCE (No Sandbox) via CanonicalEquality:EqualValueType()
ssd-disclosure.com·2d·
Discuss: Hacker News
🛡️WASM Security
Beating the L1 cache with value speculation (2021)
mazzo.li·1d·
CPU Microarchitecture
Googles CodeMender is designed to automatically find and fix security flaws in software
the-decoder.com·18h
🧮Z3 Solver
Adversary TTP Simulation Lab
infosecwriteups.com·1d
🏠Homelab Pentesting
Memory leaks: the forgotten side of web performance (2022)
nolanlawson.com·16h·
Discuss: Hacker News
🧠Memory Forensics
The Legacy Code Survival Guide: Add Features Without Fear
understandlegacycode.com·22h
🔓Decompilation