sandpile-models
×
malware
1944
cybersecurity
1231
bug-bounty
1176
ransomware
692
security
678
microsoft
561
exploit
558
google
508
supply-chain
457
xss
412
rce
374
cve
297
facebook
284
apple
284
phishing
233
node
196
vulnerability
158
reverse-engineering
156
hacking
156
web3
154
account-takeover
146
web
141
browser
137
writeup
135
cloud
130
1
0
A technical deep dive into optimizing sandpile identity computation, presenting analysis of the Difference and Iterated Burning methods and applying linear algebra (Reduced Laplacian matrices) to understand sandpiles as an abelian group structure, enabling computation of 16384×16384 sandpiles in ~1 hour.