If a function is ever called
Published:
Given a large C project and I want to know if a vulnerable function is ever being used by the test cases, how to find it?
Published:
Given a large C project and I want to know if a vulnerable function is ever being used by the test cases, how to find it?
Published:
In this post, we explore how the -finstrument-functions flag and a custom GCC plugin can be used to intercept function entry and exit at compile time. We then examine a less obvious case: what happens when the function we want to instrument is not defined in the main binary, but instead lives in a shared library.
Published:
In this post, We will explore three monitor modes supported by perf_event_open() to monitor events.
Published:
How to set up Docker image on TSEL(Flatcar Container Linux)
Published:
In this post series, We will explore the hardware performance counter in X86 architectures.
Published:
How to Use USB Armory Mk II (Part 4: GoTEE + Bear Metal Execution + Cache management)
Published:
My explanation and thoughts on proof by contradiction.
Published:
Proof of Modular division uniqueness and non uniqueness.
Published:
Here’s what I’ve learned about double spending in Bitcoin, particularly from the perspective of an attacker — what they expect to happen and how they might attempt to succeed.
Published:
OpenTimer is a static timing analysis tool and it is a part of the OpenROAD suite of tools. But today we will use OpenTimer standalone.
Published:
This is the first post in the VLSIDesignChain series using free open source VLSI design tools as well as proprietary tools interleaved.
Published:
How to set Ghidra Analyzer Option in Headless mode
Published:
Published:
This post is about PIC and GOT of shared libraries’ global variables and functions. Original post here
Published:
Articles and instructions on rooting Amazon Fire HD10 7th generation with Fire OS 5.7.1.
Published:
Published:
This post is about running Deepseek Inference on Raspberry Pi 4.
Published:
Useful Linux commands and tricks to solve common problems
Published:
My explanation to all the details of linking process and their terms
Published:
Published:
Published:
Published:
Articles I read and will read in the future. Most recent update: 2025-02-04
Published:
Published:
How to Use USB Armory Mk II (Part 3: Bare-Metal Execution)
Published:
Most recent update: 2025-02-01
Published:
How to use USB Armory MkII (Part 1 Boot the device)
Published:
Automating USB Kernel Module Loading with Udev and MODALIAS in Linux
Published:
udev rule for my USB driver on Raspberry Pi 4
Published:
Here’s what I’ve learned about double spending in Bitcoin, particularly from the perspective of an attacker — what they expect to happen and how they might attempt to succeed.
Published:
This post is about running Deepseek Inference on Raspberry Pi 4.
Published:
My explanation and thoughts on proof by contradiction.
Published:
In this post, we explore how the -finstrument-functions flag and a custom GCC plugin can be used to intercept function entry and exit at compile time. We then examine a less obvious case: what happens when the function we want to instrument is not defined in the main binary, but instead lives in a shared library.
Published:
In this post, we explore how the -finstrument-functions flag and a custom GCC plugin can be used to intercept function entry and exit at compile time. We then examine a less obvious case: what happens when the function we want to instrument is not defined in the main binary, but instead lives in a shared library.
Published:
How to set Ghidra Analyzer Option in Headless mode
Published:
This post is about running Deepseek Inference on Raspberry Pi 4.
Published:
Proof of Modular division uniqueness and non uniqueness.
Published:
In this post, We will explore three monitor modes supported by perf_event_open() to monitor events.
Published:
In this post series, We will explore the hardware performance counter in X86 architectures.
Published:
My explanation and thoughts on proof by contradiction.
Published:
This post is about running Deepseek Inference on Raspberry Pi 4.
Published:
How to Use USB Armory Mk II (Part 4: GoTEE + Bear Metal Execution + Cache management)
Published:
Articles and instructions on rooting Amazon Fire HD10 7th generation with Fire OS 5.7.1.
Published:
Published:
How to Use USB Armory Mk II (Part 3: Bare-Metal Execution)
Published:
Most recent update: 2025-02-01
Published:
How to use USB Armory MkII (Part 1 Boot the device)
Published:
Automating USB Kernel Module Loading with Udev and MODALIAS in Linux
Published:
udev rule for my USB driver on Raspberry Pi 4
Published:
Given a large C project and I want to know if a vulnerable function is ever being used by the test cases, how to find it?
Published:
OpenTimer is a static timing analysis tool and it is a part of the OpenROAD suite of tools. But today we will use OpenTimer standalone.
Published:
This is the first post in the VLSIDesignChain series using free open source VLSI design tools as well as proprietary tools interleaved.