|
|
| | The Shape of Software Security (cyber-itl.org) | | 1 point by juliend2 on May 15, 2020 | past | 1 comment | |
| | Evolution of Android Binary Hardening (cyber-itl.org) | | 1 point by bauc on Dec 16, 2019 | past | |
| | Binary Hardening in IoT Products (cyber-itl.org) | | 1 point by gsreenivas on Oct 15, 2019 | past | |
| | Binary Hardening in IoT Products (cyber-itl.org) | | 2 points by sp332 on Aug 26, 2019 | past | |
| | Fortify Source: A Deeper Dive into Function Hardening on Linux and OS X (cyber-itl.org) | | 4 points by ievans on Aug 20, 2019 | past | |
| | A look at home routers, and a surprising bug in Linux/MIPS (cyber-itl.org) | | 140 points by walterbell on Dec 15, 2018 | past | 79 comments | |
| | Build Safety of Software in 28 Popular Home Routers (Dec 2018) [pdf] (cyber-itl.org) | | 3 points by walterbell on Dec 15, 2018 | past | |
| | A look at home routers, and a surprising bug in Linux/MIPS (cyber-itl.org) | | 4 points by walterbell on Dec 15, 2018 | past | 2 comments | |
| | Software Application Risks on the OS X Continuum (2016) (cyber-itl.org) | | 1 point by walterbell on March 23, 2018 | past | |
| | How risky is the software you use? (shmooncon18 slides) [pdf] (cyber-itl.org) | | 1 point by 68c12c16 on Jan 21, 2018 | past | |
| | Fortify Source: A Deeper Dive into Function Hardening on Linux and OS X (cyber-itl.org) | | 1 point by _qc3o on Dec 11, 2016 | past | |
|

Consider applying for YC's Summer 2026 batch! Applications are open till May 4
Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact
|