usenix security '15 - trustworthy whole-system provenance for the linux kernel
Published 8 years ago • 527 plays • Length 28:58Download video MP4
Download video MP3
Similar videos
-
10:55
usenix security '23 - uncontained: uncovering container confusion in the linux kernel
-
1:45:43
usenix security '15 - conducting usable security studies: it's complicated
-
11:16
usenix security '23 - a hybrid alias analysis and its application to global variable protection...
-
27:30
usenix security '15 - compiler-instrumented, dynamic secret-redaction of legacy processes...
-
10:48
usenix security '22 - retbleed: arbitrary speculative code execution with return instructions
-
18:55
nsdi '23 - disaggregating stateful network functions
-
58:48
coverage-guided usb fuzzing with syzkaller | offensivecon 2019
-
11:42
usenix security '20 - koobe: towards facilitating exploit generation of kernel out-of-bounds write
-
10:49
usenix security '23 - alphaexp: an expert system for identifying security-sensitive kernel objects
-
34:00
srecon23 asia/pacific - an sre guide to linux kernel upgrades
-
12:57
usenix security '23 - pspray: timing side-channel based linux kernel heap exploitation technique
-
21:01
usenix security '19 - kepler: facilitating control-flow hijacking primitive evaluation for linux
-
40:50
srecon23 asia/pacific - what is linux kernel keystore and why you should use it in your next...
-
11:58
usenix security '23 - firmsolo: enabling dynamic analysis of binary linux-based iot kernel modules
-
12:35
usenix security '22 - syzscope: revealing high-risk security impacts of fuzzer-exposed bugs in linux
-
25:41
usenix security '15 - control-flow bending: on the effectiveness of control-flow integrity
-
18:44
usenix security '19 - terminal brain damage: exposing the graceless degradation in deep
-
27:36
usenix security '17 - kafl: hardware-assisted feedback fuzzing for os kernels
-
1:27:54
usenix security '15 - why johnny and janie can’t code safely: bringing software assurance...
-
23:38
usenix atc '15 - secpod: a framework for virtualization-based security systems
-
25:29
usenix security '15 - automatic generation of data-oriented exploits