How perf(1) works, or asking my CPU about their feelings.

Perf is a performance analysis tool for Linux. It instrumentalizes events setup by the kernel to monitor applications. While it makes sense that kernel events are available to a tool implemented inside the kernel, how can perf know about CPU metrics, such as the number of instructions a program executed?

Device communication in embedded systems

This article is about device communication in embedded systems. It will compare and explain the different types of device communication in embedded systems (I2C, UART, SPI, CAN) to beginners who want to learn how device communication works and which one to use.

EUCLEAK : Using side-channel attack to extract secret key from YubiKey 5 Series

This article aims to give an in depth description on EUCLEAK, an attack that was discovered by NinjaLab. Focusing on how side-channels attacks were used to exploit a vulnerability found in ECDSA implementation in YubiKey 5 Series and to reverse engineer the ECDSA algorithm.

The USB keyboard protocol

Introduction to USB keyboard protocol

Implementation of collision avoidance algorithms in real time autonomous vehicles

This article describes the implementation of collision avoidance algorithms in real-time autonomous vehicles.

Chip binning : why your CPU is most likely broken (partially)?

CPU manufacturing is so complex that the chips often have imperfections. Some cores do not work or must run at lower speeds. Manufacturers test them and sell based on performance.

Evolution of GPU Architectures and Hardware Graphics Pipeline through Nintendo Consoles - Part 1

This article goes over the evolution of the hardware graphics pipeline on GPUs across the different game console generations.

Optimizing regular expressions

This article will explain in detail how to optimize regular expressions. It will explore various techniques to reduce backtracking and improve speed, enabling the writing of more efficient and high-performance regex.

Learning a program's behaviour without looking at its code using active learning

This article explains a machine learning method that makes it possible to reproduce in finite time the complete behaviour of any program that behaves like a black box, without ever having access to its code.

Starlink et l'internet par satellite

Une brève introduction au monde de l’internet par satellite avec une présentation des spécificités de la société Starlink