Explore >> Select a destination


You are here

blog.drorgluska.com
| | artem.krylysov.com
19.6 parsecs away

Travel
| |
| | prog.world
17.0 parsecs away

Travel
| | [AI summary] The article discusses the use of Intel Processor Trace (PT) technology to capture code traces from the System Management Mode (SMM) in a computer's BIOS. The authors detail the process of creating a backdoor to access SMM, modifying the SMI dispatcher to redirect execution to a custom shellcode, and using tools like WinIPT and ptxed to analyze the trace data. They also mention challenges such as synchronization issues and the need for cross-platform compatibility, and conclude that this method provides an efficient way to investigate SMM code for vulnerabilities.
| | fa.bianp.net
20.2 parsecs away

Travel
| | Profiling Python extensions has not been a pleasant experience for me, so I made my own package to do the job. Existing alternatives were either hard to use, forcing you to recompile with custom flags like gprofile or desperately slow like valgrind/callgrind. The package I'll talk about is called ...
| | droettboom.com
35.0 parsecs away

Travel
| An early report on getting the scientific Python stack compiled to WebAssembly.