🦞🌯 Lobster Roll

Stories by craigstuntz

From Silicon to Darude Sand-storm: breaking famous synthesizer DSPs (youtube.com)
A very unscientific guide to the security of various PQC algorithms (keymaterial.net)
Classes for the Masses (mlworkshop.org)
Abstract: "Type classes are an immensely popular and productive feature of Haskell. They have since been adopted in, and adapted to, numerous other languages, including theorem provers. This talk will show that type classes have a natural and efficient representation in .NET. This paves the way for ...
Things I learned the hard way using React Native (rickyreusser.com)
Getting to Zero Exceptions (yellerapp.com)
Why the name red-black tree? (blog.matejzavrsnik.com)
Random thought: lobste.rs should have a [naming-things] tag
Fuzzing Raft for Fun and Publication (colin-scott.github.io)
Linear Algebra: What matrices actually are (nolaymanleftbehind.wordpress.com)
The Itanium processor, part 1: Warming up (Raymond Chen kicks off a two week series) (blogs.msdn.com)
Cache Efficient Functional Algorithms, by Guy E. Blelloch and Robert Harper (cs.cmu.edu)
There is also a [POPL version of this paper](http://www.cs.cmu.edu/~rwh/papers/iolambda/short.pdf), which is longer but has fewer illustrations.
Interview with Mozilla's Aaron Turon (pl-enthusiast.net)
Barry Vercoe, who made coding sound accessible to all, has died (cdm.link)
Narratives and Lessons from The Early History of F# (youtube.com)
Refinement Types: A Tutorial (arxiv.org)
Refinement types enrich a language's type system with logical predicates that circumscribe the set of values described by the type, thereby providing software developers a tunable knob with which to inform the type system about what invariants and correctness properties should be checked on their co...
Ring-Road Bug: Leaking Sensitive Data in Security Protocols (ringroadbug.com)
Moving Fast with Software Verification (research.facebook.com)
Developing Provably-Correct Software Using Formal Methods (infoq.com)
Poems in an accidental language (youtube.com)
The Journey of a .NET Object - from allocation to collection (youtube.com)
Functional Algorithm Design, Part 0 (blog.sigplan.org)
Computer Scientists Achieve ‘Crown Jewel’ of Cryptography (quantamagazine.org)
Programming with a Read-Eval-Synth Loop (cseweb.ucsd.edu)
A frequent programming pattern for small tasks, especially expressions, is to repeatedly evaluate the program on an input as its editing progresses. The Read-Eval-Print Loop (REPL) interaction model has been a successful model for this programming pattern. We present the new notion of Read-Eval-Synt...
Telling the Truth About Security (craigstuntz.com)
Life Beyond Distributed Transactions - An apostate's opinion (queue.acm.org)
by Pat Helland This is an updated and abbreviated version of a paper by the same name first published in CIDR (Conference on Innovative Database Research) 2007.
Analyzing Programs with Z3 (youtube.com)
Remote Memory Vulnerability in node.js websockets (nodesecurity.io)
Underlying issue in node.js buffers [has been open for three years](https://github.com/nodejs/node-v0.x-archive/issues/4525).
Directed graph traversal, orderings and applications to data-flow analysis (eli.thegreenplace.net)
Practical Attacks Against BouncyCastle and Oracle JCE Elliptic Curve Implementations (web-in-security.blogspot.com)
Vulcan: A JavaScript Automated Proof System (rmarcus.info)
Markov Chain Monte Carlo Without all the Bullshit (jeremykun.com)