In the optic to enhance our embedded system’s security, having a compiler plugin feature is fundamental to add new features at compilation time without having to modify the compiler itself (and with minimum knowledge of compiler internals!) This article addresses GCC versions 9 and above on Ubuntu 20.04 LTS. I hope the guide can be enjoyed for other OS/GCC Version.| Gabriele Serra’s Webpage
Our last post on our "German Strings" has received tremendous attention. We want to follow up on some of your comments and dive deeper into the reasons behind some of our string optimizations.| CedarDB - The All-In-One-Database
Part 1 of the x86_64 assembly crash course for people looking to learn how to reverse engineer, read assembly, and understand how exploits work.| Reverse Engineering
Aleph One’s excellent Smashing the Stack for Fun and Profit article from 1996 has long been the go-to for anyone looking to learn how buffer overflow attacks work. But the world has changed a lot since then, and the original attacks will not generally work on modern 64-bit machines. Some of this is due to many new defense mechanisms that are now enabled by default (see Paul Makowski’s Smashing the Stack in 2011 for an overview), but those can be disabled if all you want to do is understan...| thesquareplanet.com
Examples of using the Linux perf command, aka perf_events, for performance analysis and debugging. perf is a profiler and tracer.| www.brendangregg.com