🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
⚖️ RISC-V Verification

ISA Formal Methods, Hardware Proofs, Instruction Semantics, Open Architecture

A Wide Reduction Trick (2022)
words.filippo.io·41m·
Discuss: Lobsters, Hacker News
🌳Archive Merkle Trees
Computer Architecture: A quantitative approach
ikerexxe.github.io·2d
🖥️Hardware Architecture
Heterogeneous Dynamic Logic: Provability Modulo Program Theories
arxiv.org·2d
🧠Computational Logic
Trigon: exploiting coprocessors for fun and for profit (part 2)
alfiecg.uk·1d
🎮Switch Archaeology
Understanding Registers and Data Movement in x86-64 Assembly
blog.codingconfessions.com·15h
🔧RISC-V Assembler
Security-Focused Homelab
reddit.com·1h·
Discuss: r/homelab
🏠HomeLab
How we automated GitHub Actions Runner updates with Claude
dev.to·2h·
Discuss: DEV
🧲RISC-V Preservation
Google Wifi Pro: Glitching from Root to EL3: Part 1 - Characterization
raelize.com·1d·
Discuss: Lobsters, Hacker News
🛡️eBPF Security
FSM Library for Embedded C Projects
hackster.io·3d
🦀Embedded Rust
Passionate enthusiast builds a fully functional processor out of old memory chips — hand-solders every wire, writes 1800 lines of assembler code, and makes it p...
tomshardware.com·2d
🧲RISC-V Archaeology
CVE-2025-4919: Corruption via Math Space in Mozilla Firefox
thezdi.com·1d
🦀Rust Verification
How I Doubled My Lookup Performance with a Bitwise Trick
maltsev.space·1d
🔢Bitwise Algorithms
Turbocharged Storage: MinIO, KIOXIA, and AMD team up to take on AI
blog.min.io·4h
🧲RISC-V Preservation
WiSec 2025 Spotlight: Security in the Inaudible World
esat.kuleuven.be·14h
📡Bluetooth Archaeology
Machine Code Isn't Scary
jimmyhmiller.github.io·2d
🔤Character Encoding
Canonical and ESWIN announces EBC77 RISC-V SBC with Ubuntu 24.04 support
cnx-software.com·16h
🔌Operating system internals
AwesomeAssertions/AwesomeAssertions
github.com·12h
✅Format Verification
Functional Abstract Interpretation
simon.peytonjones.org·2d·
Discuss: Hacker News
🔗Functional Compilers
Reflecting on PLDI 2025
people.csail.mit.edu·3d·
Discuss: Hacker News
🌐Protocol Synthesis
How to reason from first principles
caseyhandmer.wordpress.com·8h
🎯Proof Tactics
Loading...Loading more...
AboutBlogChangelogRoadmap