Deep dive through the manufacturing process of CPUs and what are the challenges related to it
An overview of the steps involved in emulating diverse architectures and the challenges encountered throughout the process.
An overview of the steps involved in emulating diverse architectures and the challenges encountered throughout the process.
In this article, we’ll see how to write a simple file system
A dive into the evolution of Linux as a gaming platform over the years, and the technical challenges that were overcome to make gaming viable on the open-source OS.
Perf is a performance analysis tool for Linux. It instrumentalizes events setup by the kernel to monitor applications. While it makes sense that kernel events are available to a tool implemented inside the kernel, how can perf know about CPU metrics, such as the number of instructions a program executed?
2024-11-14
1359 words
7 minutes
No tag
Eve Gresse
This article is about device communication in embedded systems. It will compare and explain the different types of device communication in embedded systems (I2C, UART, SPI, CAN) to beginners who want to learn how device communication works and which one to use.
This article aims to give an in depth description on EUCLEAK, an attack that was discovered by NinjaLab. Focusing on how side-channels attacks were used to exploit a vulnerability found in ECDSA implementation in YubiKey 5 Series and to reverse engineer the ECDSA algorithm.
Introduction to USB keyboard protocol
This article describes the implementation of collision avoidance algorithms in real-time autonomous vehicles.