continue…
Related to
End-to-end formal ISA verification of RISC-V processors with riscv-formal
Die Lauschprogramme der Geheimdienste
56 min
hacking disaster
35 min
Everything you want to know about x86 microcode, but…
57 min