usenix security '20 - apex: a verified architecture for proofs of execution on remote devices...
Published 3 years ago • 192 plays • Length 13:48Download video MP4
Download video MP3
Similar videos
-
19:18
usenix security '19 - vrased: a verified hardware/software co-design for remote attestation
-
12:07
usenix security '20 - understanding security mistakes developers make: qualitative analysis...
-
12:05
usenix security '20 - phmon: a programmable hardware monitor and its security use cases
-
12:15
usenix security '20 - copycat: controlled instruction-level attacks on enclaves
-
12:51
usenix security '20 - firmscope: automatic uncovering of privilege-escalation vulnerabilities
-
2:56
watch this russian hacker break into our computer in minutes | cnbc
-
12:26
demonstrating cryptographic hash, signatures, and authentication -- maxim integrated
-
12:11
usenix security '20 - everything old is new again: binary security of webassembly
-
10:54
usenix security '20 - pixel: multi-signatures for consensus
-
10:31
usenix security '20 - v0ltpwn: attacking x86 processor integrity from software
-
10:28
usenix security '20 - an ever-evolving game: evaluation of real-world attacks and defenses
-
10:43
usenix security '20 - p2im: scalable and hardware-independent firmware testing via automatic
-
11:10
usenix security '20 - pku pitfalls: attacks on pku-based memory isolation systems
-
11:34
usenix security '20 - besfs: a posix filesystem for enclaves with a mechanized safety proof
-
12:29
usenix security '21 - cure: a security architecture with customizable and resilient enclaves
-
10:38
usenix security '20 - epic: every packet is checked in the data plane of a path-aware internet
-
13:40
usenix security '20 - hybcache: hybrid side-channel-resilient caches for trusted execution...
-
13:55
usenix security '22 - rapid prototyping for microarchitectural attacks
-
15:03
usenix security '23 - verizexe: decentralized private computation with universal setup
-
12:11
usenix security '20 - an observational investigation of reverse engineers’ processes
-
10:28
usenix security '20 - exploring connections between active learning and model extraction