Active
Recent
Comments
Search
Login
Login
people.csail.mit.edu: 32 stories from 24 submitters
4
PACMAN: Attacking ARM Pointer Authentication with Speculative Execution
pdf
security
people.csail.mit.edu
via
lattera
8 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
13
On relational compilation
compilers
formalmethods
plt
people.csail.mit.edu
via
brendan
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
7 comments
7
18
Design and Implementation of a 256-Core BrainFuck Computer
pdf
hardware
programming
people.csail.mit.edu
via
imode
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
9
Going from Bad to Worse: From Internet Voting to Blockchain Voting
☶
pdf
cryptography
security
people.csail.mit.edu
via
mjec
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
2
Automated lost language deciphering using Phonetic Prior
pdf
ai
people.csail.mit.edu
via
inactive-user
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
8
The SIEUFERD Project
databases
people.csail.mit.edu
via
alexkorban
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
21
Introduction to Program Synthesis
education
plt
people.csail.mit.edu
via
zxtx
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
7
Advanced Scheme: Some Naughty Bits
education
lisp
people.csail.mit.edu
via
zge
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Safecracker: Leaking Secrets through Compressed Caches
pdf
security
people.csail.mit.edu
via
fro
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
Systems for Collective Human Curation of Online Discussion
pdf
culture
web
people.csail.mit.edu
via
enkiv2
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
Sound and Robust Solid Modeling via Exact Real Arithmetic and Continuity
☶
pdf
formalmethods
hardware
plt
people.csail.mit.edu
via
nickpsecurity
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
5
Kendo: Efficient, Deterministic Multithreading in Software (2009)
☶
pdf
c
c++
compsci
linux
people.csail.mit.edu
via
nickpsecurity
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Configuration Synthesis for Programmable Analog Devices with Arco
pdf
compilers
hardware
people.csail.mit.edu
via
Forty-Bot
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors
pdf
security
people.csail.mit.edu
via
fro
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
7
Algebra and the Lambda Calculus
math
programming
people.csail.mit.edu
via
nickpsecurity
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
8
Log(Graph): A Near-Optimal High-Performance Graph Representation
☶
pdf
compsci
performance
programming
people.csail.mit.edu
via
nickpsecurity
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
2
Targeted Automatic Integer Overflow Discovery Using Goal-Directed Conditional Branch Enforcement
☶
pdf
programming
people.csail.mit.edu
via
fcbsd
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Algorand: Scaling Byzantine Agreements for Cryptocurrencies (2017)
☶
pdf
merkle-trees
people.csail.mit.edu
via
atondwal
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
Speculative Buffer Overflows: Attacks and Defenses
pdf
security
people.csail.mit.edu
via
lattera
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
A Brief Introduction to Adversarial Examples
ai
people.csail.mit.edu
via
mjn
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
7
The Scalable Commutativity Rule: Designing Scalable Software for Multicore Processors
pdf
scaling
people.csail.mit.edu
via
jtfmumm
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
7
Give in to Procrastination and Stop Prefetching
pdf
networking
programming
people.csail.mit.edu
via
beyang
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
6 comments
6
6
Systematic Synthesis of Elliptic Curve Cryptography Implementations
☶
pdf
assembly
cryptography
people.csail.mit.edu
via
pushcx
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
4
How to Design (Declarative) Programming Languages [2003]
compilers
programming
people.csail.mit.edu
via
sebastien
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
15
50,000,000,000 Instructions Per Second: Design and Implementation of a 256-Core BrainFuck Computer
pdf
assembly
hardware
people.csail.mit.edu
via
calvin
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
Page 2 >>