🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🏷️ Memory Tagging

ARM MTE, Spatial Safety, Use-after-free Detection, Hardware Security

Emulating aarch64 in software using JIT compilation and Rust
pitsidianak.is·13h·
Discuss: Lobsters, Hacker News, Hacker News, r/programming, r/rust
🦾ARM Assembly
Exploring Heap Memory and Garbage Collector Algorithm in Go Language
dev.to·1h·
Discuss: DEV
🧠Memory Allocators
Azure apparatchik shows custom silicon keeping everything locked down
theregister.com·53m
🔐HSM Integration
Put a ring on it: a lock-free MPMC ring buffer
h4x0r.org·7h·
Discuss: Lobsters, Hacker News, r/programming
⚡Hardware Transactional Memory
Athos Silicon: SoC with redundant UCIe chiplets for autonomous driving and more
heise.de·12h
⚡Nordic Processors
It takes 26 yottabytes of RAM to typecheck a union of Safe Integers
playfulprogramming.com·1d
🧪Binary Fuzzing
Research on smartphone image source identification based on PRNU features collected multivariate sampling strategy
sciencedirect.com·7h
👁️Perceptual Hashing
Using panic metadata to recover source code information from Rust binaries | cxiao.net
cxiao.net·7h
🦀Rust Macros
MSNav: Zero-Shot Vision-and-Language Navigation with Dynamic Memory and LLM Spatial Reasoning
arxiv.org·17h
🌀Hyperbolic Geometry
Sony’s Triple Seven
leadedsolder.com·21h
🕹️Retro Gaming
Block unsafe prompts targeting your LLM endpoints with Firewall for AI
blog.cloudflare.com·7h
🛡️CLI Security
home server to host an ARK: Survival Ascended cluster, Minecraft server, and a NAS
reddit.com·4h·
Discuss: r/homelab
🏠HomeLab
How to spot high-activity devices & stop scaled abuse in its tracks
fingerprint.com·23h
🎯Threat Hunting
Evaluation of Hashing Algorithms Ascon, SHA256, SHA512 and BLAKE3 on a Cortex M7
aa55.dev·2d·
Discuss: Hacker News
🦾ARM Cortex-M
Intel's Core i5-14600K hits an all-time low of $149, with Battlefield 6 and other software included
tomshardware.com·1d
🧲RISC-V Archaeology
Explanation of the Linux-Kernel Memory Consistency Model
raw.githubusercontent.com·2d·
Discuss: Lobsters, Hacker News, r/programming
⚡Cache Coherence
Researchers Discover a Cyber-Physical Bank Heist Powered by A 4G Raspberry Pi Implant
bastille.net·6h
📡Network Monitoring
Formal Methods for Stellar DeFi: Verifying Lending Protocol with Certora Sunbeam Prover
blog.positive.com·9h
✅Format Verification
Making MCP Tool Use Feel Natural with Context-Aware Tools
ragie.ai·3h·
Discuss: Hacker News
🔗Constraint Handling
The AI-Native OS: Rethinking the Operating System from First Principles
medium.com·1h·
Discuss: Hacker News
🔌Operating system internals
Loading...Loading more...
AboutBlogChangelogRoadmap