Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
Disassembling a binary: linear sweep and recursive traversal (nicolo.dev)
12 points by todsacerdoti 7 months ago | past | 1 comment
The Role of the Control Flow Graph in Static Analysis (nicolo.dev)
2 points by nicolodev on May 17, 2024 | past
The Role of the Control Flow Graph in Static Analysis (nicolo.dev)
6 points by nicolodev on Nov 19, 2023 | past | 1 comment
Static Analysis and Control Flow Graph: Identify Branches and Loops (nicolo.dev)
8 points by decodp on Nov 4, 2023 | past
The Role of the Control Flow Graph in Static Analysis (nicolo.dev)
5 points by btcstudente on Nov 1, 2023 | past
The Role of the Control Flow Graph in Static Analysis (nicolo.dev)
2 points by nicolodev on Oct 31, 2023 | past
Analysis of Obfuscation Techniques Found in Apple FairPlay (nicolo.dev)
200 points by univr on Aug 29, 2023 | past | 50 comments
Analysis of obfuscations found in Apple FairPlay (nicolo.dev)
28 points by nicolodev on Aug 28, 2023 | past | 8 comments
Reverse Engineering McAfee Virus Scan – Part I: The Installer (nicolo.dev)
3 points by nicolodev on Aug 22, 2023 | past
Pocket: Obfuscation Tool for Mixed Boolean Arithmetic Expressions (nicolo.dev)
10 points by nicolodev on July 26, 2023 | past | 1 comment
Introduction to Pocket: obfuscator for MBA expressions (nicolo.dev)
2 points by nicolodev on July 25, 2023 | past | 3 comments
Introduction to Pocket: obfuscator for MBA expressions (nicolo.dev)
5 points by nicolodev on July 24, 2023 | past | 1 comment
The Illusion of Parallelism (nicolo.dev)
14 points by nicolodev on May 15, 2022 | past | 4 comments
The problem of de-synchronized metronomes (nicolo.dev)
19 points by nicolodev on Jan 18, 2022 | past | 10 comments

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: