AG
blog
code
research

attack surface

bitcode

embedded systems

fuzzing

graph neural networks

kernel

linux

llvm

program analysis

program synthesis

reverse engineering

ros2

security

supply chain security

uav

cv Icon dblp Icon email Icon github Icon google_scholar Icon linkedin Icon mastodon Icon orcid Icon twitter Icon
Support the EFF cc Icon by Icon sa Icon