Hardware Testing, Instruction Validation, Security Research, Open Architecture

Interfacing assembly with BASIC via DEFUSR, part 7
subethasoftware.com·1d
🔧RISC-V Assembler
Flag this post
Old Linux Kernel flaw CVE-2024-1086 resurfaces in ransomware attacks
securityaffairs.com·1h
🔓Hacking
Flag this post
Scalable Phase-Change Memory Array Reliability Prediction via Bayesian Neural Networks
dev.to·12h·
Discuss: DEV
Cache Coherence
Flag this post
Show HN: Fast-posit, sw implementation of posit arithmetic in Rust
github.com·1d·
Discuss: Hacker News
🦀Rust Verification
Flag this post
Well-Typed.Com: Case Study: Debugging a Haskell space leak
well-typed.com·20h
🔓Decompilation
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.com·5h
🛡️eBPF Security
Flag this post
exploits.club Weekly Newsletter 91 - Patch-gapping Browsers, Ubuntu LPEs, Bluetooth Int Underflows, And More
blog.exploits.club·3h
🔓Hacking
Flag this post
Building a Rules Engine from First Principles
towardsdatascience.com·1d
🔗Combinatory Logic
Flag this post
When Federico Faggin left Intel
dfarq.homeip.net·9h
🧲RISC-V Archaeology
Flag this post
From Bottleneck to Breakthrough: AI in Chip Verification
spectrum.ieee.org·1d
🔧Hardware Verification
Flag this post
What to do when you have a crash in the runtime control flow guard check
devblogs.microsoft.com·2d
🛡️Error Boundaries
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.com·13h
🔐Hash Functions
Flag this post
OpenBSD proposes BPF socket filtering to enhance daemon security
discoverbsd.com·11h
🛡️eBPF Security
Flag this post
Today I Learned: Binfmt_misc
dfir.ch·10h·
Discuss: Hacker News
🐚Nordic Shell
Flag this post
The Arduino Uno Q is a weird hybrid SBC
jeffgeerling.com·6h·
Discuss: Hacker News
🔌Single Board PC
Flag this post
Vulnerabilities in LUKS2 disk encryption for confidential VMs
blog.trailofbits.com·1d
🦠Parasitic Storage
Flag this post
Evaluating YARA Rules for macOS Malware Hunting in Spectra Analyze
reversinglabs.com·1d
🦠Malware Analysis
Flag this post
Stochastic computing
scottlocklin.wordpress.com·3h
🏴󠁧󠁢󠁳󠁣󠁴󠁿Scottish Computing
Flag this post
Fil-C: A memory-safe C implementation
lwn.net·2d·
Discuss: Hacker News
🧠Separation Logic
Flag this post