3PokéWalker hacking: A complete device takeover and ROM dump using infrared (opens in new tab)(dmitry.gr)149beefhash5y ago16
4Baby Sharks: Injecting small order points to threshold EdDSA (opens in new tab)(medium.com)1beefhash5y ago0
6J2 open processor: a clean-room open-source processor using the SuperH ISA (opens in new tab)(j-core.org)2beefhash5y ago0
9Whalescan: A vulnerability scanner for Windows containers (opens in new tab)(github.com)2beefhash5y ago0
11Reviving 20 year old web forum software (2019) (opens in new tab)(virtuallyfun.com)3beefhash5y ago0
14The Sound of Silence: Mining Security Vulns from Secret Integration Channels (opens in new tab)(arxiv.org)2beefhash5y ago0