usenix security '19 - hardfails: insights into software-exploitable hardware bugs
Published 4 years ago • 757 plays • Length 20:37Download video MP4
Download video MP3
Similar videos
-
54:55
usenix security '19 - lessons learned about building secure software: it's about the developers!
-
19:50
usenix enigma 2019 - hardware is the new software: finding exploitable bugs in hardware designs
-
18:44
usenix security '19 - terminal brain damage: exposing the graceless degradation in deep
-
21:18
usenix security '18 - discovering flaws in security-focused static analysis tools for android...
-
9:34
usenix security '23 - icspatch: automated vulnerability localization and non-intrusive...
-
20:06
usenix security '19 - uxom: efficient execute-only memory on arm cortex-m
-
13:10
usenix atc '21 - tcp-fuzz: detecting memory and semantic bugs in tcp stacks with fuzzing
-
24:02
3gse '14 - cyberciege scenario design and implementation
-
21:29
usenix enigma 2019 - the urlephant in the room
-
1:19:58
usenix security '15 - preventing security bugs through software design
-
20:02
usenix security '19 - origin-sensitive control flow integrity
-
10:37
usenix security '20 - fuzzing error handling code using context-sensitive software fault injection
-
11:57
usenix security '20 - sys: a static/symbolic tool for finding good bugs in good (browser) code
-
12:05
usenix security '21 - undo workarounds for kernel bugs
-
23:41
usenix security '16 - undermining information hiding (and what to do about it)
-
22:03
usenix security '19 - safehidden: an efficient and secure information hiding technique using
-
13:04
usenix security '21 - the use of likely invariants as feedback for fuzzers
-
12:15
usenix security '21 - pasan: detecting peripheral access concurrency bugs within bare-metal...
-
12:23
usenix security '22 - fixreverter: a realistic bug injection methodology for benchmarking fuzz
-
12:14
usenix security '21 - understanding and detecting disordered error handling with precise function