-<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en"><generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator><link href="https://cactilab.github.io/feed.xml" rel="self" type="application/atom+xml"/><link href="https://cactilab.github.io/" rel="alternate" type="text/html" hreflang="en"/><updated>2025-04-07T04:42:44+00:00</updated><id>https://cactilab.github.io/feed.xml</id><title type="html">blank</title><subtitle>CactiLab is in the [Khoury College of Computer Sciences](https://www.khoury.northeastern.edu/) at [Northeastern University](https://www.northeastern.edu/). </subtitle><entry><title type="html">Reproducing the ARMv8-M Secure Stack Pointer Software Vulnerability (CVE-2020-16273)</title><link href="https://cactilab.github.io/blog/2021/Ma/" rel="alternate" type="text/html" title="Reproducing the ARMv8-M Secure Stack Pointer Software Vulnerability (CVE-2020-16273)"/><published>2021-11-02T17:39:00+00:00</published><updated>2021-11-02T17:39:00+00:00</updated><id>https://cactilab.github.io/blog/2021/Ma</id><content type="html" xml:base="https://cactilab.github.io/blog/2021/Ma/"><![CDATA[]]></content><author><name></name></author><category term="security,"/><category term="ARMv8-M"/><summary type="html"><![CDATA[Our exploration of CVE-2020-16273]]></summary></entry></feed>
0 commit comments