usenix security '18 - heaphopper: bringing bounded model checking to heap implementation security
Published 6 years ago • 637 plays • Length 22:01Download video MP4
Download video MP3
Similar videos
-
21:29
usenix security '18 - automatic heap layout manipulation for exploitation
-
10:22
usenix security '23 - automated exploitable heap layout generation for heap overflows through...
-
13:03
usenix security '20 - automatic techniques to systematically discover new heap exploitation
-
26:24
usenix security '17 - towards efficient heap overflow discovery
-
22:18
usenix security '18 - charm: facilitating dynamic analysis of device drivers of mobile systems
-
12:09
usenix security '21 - locally differentially private analysis of graph statistics
-
24:03
usenix security '18 - data – differential address trace analysis...
-
13:13
usenix security '23 - tight auditing of differentially private machine learning
-
21:49
usenix atc '22 - bbq: a block-based bounded queue for exchanging data and profiling
-
18:21
the definition of differential privacy - cynthia dwork
-
48:47
usenix atc '22/osdi '22 joint keynote address - trustworthy open source: the consequences of success
-
26:42
usenix security '14 - blanket execution: dynamic similarity testing for program binaries
-
11:30
usenix security '21 - static detection of unsafe dma accesses in device drivers
-
11:30
usenix security '22 - arbiter: bridging the static and dynamic divide in vulnerability discovery...
-
20:32
usenix security '19 - entrust: regulating sensor access by cooperating programs
-
19:54
usenix security '18 - end-users get maneuvered: empirical analysis of redirection hijacking...
-
11:41
usenix security '22 - augmenting decompiler output with learned variable names and types
-
14:53
usenix security '19 - evaluating differentially private machine learning in practice
-
13:37
usenix security '22 - stateful greybox fuzzing
-
19:55
usenix security '19 - pex: a permission check analysis framework for linux kernel
-
22:15
usenix security '14 - optimizing seed selection for fuzzing
-
41:46
usenix security '17 - differential privacy: from theory to deployment