usenix security '22 - loki: hardening code obfuscation against automated attacks
Published 1 year ago • 592 plays • Length 11:44Download video MP4
Download video MP3
Similar videos
-
11:09
usenix security '22 - faster yet safer: logging system via fixed-key blockcipher
-
10:56
usenix security '22 - fuzzware: using precise mmio modeling for effective firmware fuzzing
-
9:33
usenix security '21 - obfuscation-resilient executable payload extraction from packed malware
-
12:33
usenix security '20 - decaf: automatic, adaptive de-bloating and hardening of cots firmware
-
9:40
1. dvwa | brute force attack | low | dengan burp suite
-
11:05
vulnhub oscp walkthrough
-
9:42
explaining the kr00k vulnerability
-
12:22
usenix security '21 - shard: fine-grained kernel specialization with context-aware hardening
-
11:38
usenix security '21 - raccoon attack: finding and exploiting most-significant-bit-oracles...
-
27:10
usenix security '17 - predicting the resilience of obfuscated code...
-
10:31
usenix security '20 - v0ltpwn: attacking x86 processor integrity from software
-
11:10
usenix security '20 - pku pitfalls: attacks on pku-based memory isolation systems
-
13:01
usenix security '22 - inference attacks against graph neural networks
-
11:03
usenix security '22 - movery: a precise approach for modified vulnerable code clone discovery from
-
29:22
usenix security '17 - syntia: synthesizing the semantics of obfuscated code
-
12:15
usenix security '20 - copycat: controlled instruction-level attacks on enclaves
-
13:13
usenix security '23 - forming faster firmware fuzzers
-
9:57
usenix security '21 - dompteur: taming audio adversarial examples
-
10:38
usenix security '22 - sgxfuzz: efficiently synthesizing nested structures for sgx enclave fuzzing
-
12:28
usenix security '22 - opensslntru: faster post-quantum tls key exchange
-
12:15
usenix security '22 - fuzzing hardware like software