usenix security '21 - osiris: automated discovery of microarchitectural side channels
Published 3 years ago • 355 plays • Length 11:51Download video MP4
Download video MP3
Similar videos
-
11:53
usenix security '21 - automated discovery of denial-of-service vulnerabilities in connected vehicle
-
13:04
usenix security '21 - where's crypto?: automated identification and classification of proprietary...
-
11:21
usenix security '21 - maze: towards automated heap feng shui
-
12:06
usenix security '21 - lord of the ring(s): side channel attacks on the cpu on-chip ring...
-
12:42
usenix security '21 - understanding malicious cross-library data harvesting on android
-
12:05
usenix security '21 - automatic firmware emulation through invalidity-guided knowledge inference
-
12:21
usenix security '21 - cerebro: a platform for multi-party cryptographic collaborative learning
-
16:39
enh isecure sailpoint identityiq custom connector development demo
-
1:06:20
usenix atc '21/osdi '21 joint keynote address-it's time for operating systems to rediscover hardware
-
18:06
how to comply with the unece / iso sae 21434 cyber security regulation?
-
12:09
nsdi '21 - from conception to retirement: a lifetime story of a 3-year-old wireless beacon system
-
11:47
usenix security '21 - ripple: a programmable, decentralized link-flooding defense against adaptive
-
19:26
usenix security '19 - a billion open interfaces for eve and mallory: mitm, dos, and tracking
-
21:03
usenix atc '24 - diagnosing application-network anomalies for millions of ips in production clouds
-
13:57
usenix security '21 - jaqen: a high-performance switch-native approach for detecting and mitigating
-
14:39
srecon21 - how our sres safeguard nanosecond performance—at scale—in an environment built to fail
-
11:16
usenix security '21 - inexpensive brainwave authentication: new techniques and insights...
-
15:49
nsdi '24 - automatic parallelization of software network functions
-
34:28
lisa21 - hands-off testing for networked filesystems
-
13:55
usenix security '22 - rapid prototyping for microarchitectural attacks