Loading...

Tag trends are in beta. Feedback? Thoughts? Email me at [email protected]

Eliminating Memory Safety Vulnerabilities at the Source

Deploying Rust in existing firmware codebases

Eliminating Memory Safety Vulnerabilities at the Source

A new path for Kyber on the web for Chrome

Entrust Certificate Distrust

On Fire Drills and Phishing Tests

How we built the Find My Device network with user security and privacy in mind

Address Sanitizer for bare-metal firmware

Google Public DNS's approach to fight against cache poisoning attacks

Secure by Design: Google's Perspective on Memory Safety

Improving Interoperability Between Rust and C++

MiraclePtr: protecting users from use-after-free vulnerabilities on more platforms

Hardening cellular basebands in Android

Google to Implement IETF's Message Layer Security (MLS) Specification RFC 9420

MTE – The promising path forward for memory safety

Bare-metal Rust in Android

Bare-metal Rust in Android

Scaling Rust Adoption Through Training

SMS Security and Privacy Gaps

Capslock: What is your code really capable of?

Android Goes All-in on Fuzzing

Toward Quantum Resilient Security Keys

Pixel Binary Transparency: verifiable security for Pixel devices

Pixel Binary Transparency: verifiable security for Pixel devices

Android 14 introduces cellular connectivity security features

A Year in Review of 0-days Exploited In-the-Wild in 2022

An important step towards secure and interoperable messaging

Supply chain security for Go, Part 3: Shifting left

Learnings from kCTF VRP's 42 Linux kernel exploits submissions

Securely Hosting User Data in Modern Web Applications

More →