usenix security '20 - p2im: scalable and hardware-independent firmware testing via automatic
Published 3 years ago • 892 plays • Length 10:43Download video MP4
Download video MP3
Similar videos
-
12:05
usenix security '20 - phmon: a programmable hardware monitor and its security use cases
-
12:05
usenix security '21 - automatic firmware emulation through invalidity-guided knowledge inference
-
12:12
usenix security '20 - halucinator: firmware re-hosting through abstraction layer emulation
-
12:55
usenix security '22 - gpu-accelerated pir with client-independent preprocessing for large-scale
-
11:39
usenix security '22 - rapidpatch: firmware hotpatching for real-time embedded devices
-
11:17
usenix security '20 - partemu: enabling dynamic analysis of real-world trustzone software...
-
13:13
usenix security '23 - forming faster firmware fuzzers
-
2:09
synopsys & samtec: successful 112g pam-4 system interoperability
-
14:31
flexible development with the psoc™ 62s2 evaluation kit -- infineon and mouser
-
1:32:18
session 2: introduction to digital peripherals in modustoolbox
-
11:16
usenix security '23 - a hybrid alias analysis and its application to global variable protection...
-
11:53
usenix security '20 - plug-n-pwned: comprehensive vulnerability analysis of obd-ii dongles...
-
11:23
usenix security '20 - usbfuzz: a framework for fuzzing usb drivers by device emulation
-
9:34
usenix security '23 - icspatch: automated vulnerability localization and non-intrusive...
-
28:02
usenix security '16 - sanctum: minimal hardware extensions for strong software isolation
-
11:34
usenix security '20 - secure parallel computation on national scale volumes of data
-
12:16
usenix security '21 - m2mon: building an mmio-based security reference monitor for unmanned vehicles
-
11:45
usenix security '21 - an investigation of the android kernel patch ecosystem
-
11:58
usenix security '23 - firmsolo: enabling dynamic analysis of binary linux-based iot kernel modules
-
12:55
usenix security '23 - how effective is multiple-vantage-point domain control validation?