🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🦀 Rust Verification

Memory Safety Proofs, Linear Types, Borrow Checker, Systems Verification

The Generativity Pattern in Rust
arhan.sh·13h·
Discuss: Lobsters, Hacker News, r/programming
🦀Rust Macros
Relative Completeness of Incorrectness Separation Logic
arxiv.org·3h
🧠Separation Logic
I bombed a memory management question in an interview, so I built a testing lab to understand what really happens when Rust and C allocators collide!
reddit.com·23h·
Discuss: r/rust
🦀Rust Borrowing
How Rust powers Proton Authenticator
proton.me·12h
🦀Rust Borrowing
An Easy Problem Made Hard: Rust & Binary Trees
mmhaskell.com·22h·
Discuss: Hacker News
🔒Linear Types
Part 1: A Deep Dive into Rust and C Memory Interoperability
notashes.me·16h·
Discuss: Hacker News, r/programming
🔩Systems Programming
Semantic Refinement/Dependent Typing for Knuckledragger/SMTLIB Pt 1
philipzucker.com·1d·
Discuss: Hacker News
💧Liquid Types
Detection Engineering: Practicing Detection-as-Code – Validation – Part 3
blog.nviso.eu·16m
✅Archive Validation
PQCSA: A Gentle Introduction to Code Based PKE
esat.kuleuven.be·20h
⚗️Algebraic Coding
Testing races with a synchronizing Decorator
blog.ploeh.dk·23h
🔄Sync Engine
Automating Boundary Filling in Cubical Type Theories
arxiv.org·1d
🔶Cubical Type Theory
Vibe coding complex changes in Rust
youtube.com·3d
🦀Rust Macros
Week 31 Status
blogs.gnome.org·8h
🎯Gradual Typing
Generalizing over mutability in Rust
alexsaveau.dev·6d
🦀Rust Macros
Prisma ORM Without Rust: Latest Performance Benchmarks
prisma.io·14h·
Discuss: Hacker News
🦀Rust Borrowing
Abhinav Sarkar: A Bytecode VM for Arithmetic: The Parser
abhinavsarkar.net·3d
🔗Functional Compilers
04 – eBPF Uprobes: Tracing gRPC Headers by Unpacking Go Function Internals
dev.to·1d·
Discuss: DEV
🔧Binary Parsing
In Support Of Shitty Types
lucumr.pocoo.org·12h·
Discuss: Lobsters, Hacker News
🎯Gradual Typing
Josh Lockhart & Phil Sturgeon
deprogrammaticaipsum.com·1d
🦀Rusty Databases
Simple Methods Defend RAG Systems Well Against Real-World Attacks
arxiv.org·3h
🔐Systems Hardening
Loading...Loading more...
AboutBlogChangelogRoadmap