ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

4,842 results

DEFCONConference
DEF CON 31 - StackMoonwalk  - Alessandro Magnosi, Arash  Parsa, Athanasios Tserpelis

The rapid advancement of cyber defense products has led to an increase in sophisticated memory evasion techniques employed ...

39:41
DEF CON 31 - StackMoonwalk - Alessandro Magnosi, Arash Parsa, Athanasios Tserpelis

1,610 views

2 years ago

Linux Plumbers Conference
Guarded Control Stack on arm64: Challenges in Enabling Shadow Stack Support... Igor Svilenkov Bozic

Guarded Control Stack on arm64: Challenges in Enabling Shadow Stack Support for CRIU - Igor Svilenkov Bozic (CRIU) Shadow ...

24:23
Guarded Control Stack on arm64: Challenges in Enabling Shadow Stack Support... Igor Svilenkov Bozic

35 views

3 months ago

The Linux Foundation
Control Flow Integrity in the Linux Kernel - Kees Cook, Google

Control Flow Integrity in the Linux Kernel - Kees Cook, Google.

44:46
Control Flow Integrity in the Linux Kernel - Kees Cook, Google

1,506 views

5 years ago

CNCF [Cloud Native Computing Foundation]
Shadow Vulnerabilities in AI/ML Data Stacks - What You Don’t Know... Avi Lumelsky & Nitzan Mousseri

Don't miss out! Join us at our next Flagship Conference: KubeCon + CloudNativeCon North America in Salt Lake City from ...

36:42
Shadow Vulnerabilities in AI/ML Data Stacks - What You Don’t Know... Avi Lumelsky & Nitzan Mousseri

320 views

1 year ago

OpenFest Bulgaria
Arguing with Linus Torvalds - Steven Rostedt

The Linux kernel is the lowest layer of software (above BIOS) and that requires it to be as efficient as possible. Recent hardware ...

54:37
Arguing with Linus Torvalds - Steven Rostedt

34,171 views

6 years ago

The Linux Foundation
Segmented Stacks for BPF Programs (Yonghong Song)

Segmented Stacks for BPF Programs (Yonghong Song)

18:50
Segmented Stacks for BPF Programs (Yonghong Song)

121 views

1 year ago

GNU Tools Cauldron
SFrame for effective userspace stack tracing

This talk provides an overview of recent developments in the SFrame stack tracing format over the past year. We discuss some of ...

1:10:14
SFrame for effective userspace stack tracing

87 views

6 months ago

Alonescape
How I Made MAX CASH In Less Than A Month

Go to https://tryfum.com/ALONESCAPE or scan the QR code and use code ALONESCAPE to get your free FÜM Topper when you ...

28:36
How I Made MAX CASH In Less Than A Month

40,516 views

5 months ago

The Linux Foundation
Hardware-Assisted Fine-Grained Control-Flow Integrity: Adding Lasers to Intel's CET/IBT

Hardware-Assisted Fine-Grained Control-Flow Integrity: Adding Lasers to Intel's CET/IBT - Joao Moreira, Intel.

23:48
Hardware-Assisted Fine-Grained Control-Flow Integrity: Adding Lasers to Intel's CET/IBT

410 views

4 years ago

Linux Plumbers Conference
Control Flow Integrity on RISCV - Deepak Gupta

Memory safety issues impact program safety and integrity. One of the implications of such issues is subversion of programmer ...

20:21
Control Flow Integrity on RISCV - Deepak Gupta

660 views

2 years ago

Linux Plumbers Conference
Finer-grained kernel control flow integrity and challenges - Mr Deepak Gupta

Finer-grained kernel control flow integrity and challenges - Mr Deepak Gupta Kernel control flow integrity RFC patches [1] are out.

26:34
Finer-grained kernel control flow integrity and challenges - Mr Deepak Gupta

26 views

3 months ago

pwn.college
Jump Oriented Programming - CSE466 - Robert - 2025.10.02

... which we haven't talked about like officially in this class uh but there is functionality that is known as a shadow stack uh which is ...

1:00:28
Jump Oriented Programming - CSE466 - Robert - 2025.10.02

666 views

6 months ago

OpenInfra Foundation
Tokyo 2015 Keynotes: Banishing the Shadow Cloud

Like it or not, application developers will compare their private cloud experience with what they're accustomed to in the public ...

14:42
Tokyo 2015 Keynotes: Banishing the Shadow Cloud

629 views

10 years ago

The Linux Foundation
Control Flow Integrity on RISC-V Linux - Deepak Gupta, Rivos Inc

Control Flow Integrity on RISC-V Linux - Deepak Gupta, Rivos Inc Memory safety issues impact program safety and integrity.

35:13
Control Flow Integrity on RISC-V Linux - Deepak Gupta, Rivos Inc

380 views

1 year ago

MikeyBikey
The Inferno Is Free Now With This Cheese Method

A cape's a cape. I never showed the justiciar and bulwark in action lol saved me a bunch rotating pillars. oh well too late Looking ...

18:05
The Inferno Is Free Now With This Cheese Method

66,156 views

7 months ago

Erik Thor
Mastering The INTP Unconscious Shadow Functions

The INTP has beyond their conscious functions, many unconscious personality traits. These are personality traits they are less ...

17:21
Mastering The INTP Unconscious Shadow Functions

26,336 views

7 years ago

tpyo
Dota 2 - How to triple stack as Shadow Demon (dire)

A quick demonstration of how to triple stack the dire jungle as Shadow Demon on dire side. THE BOOTS ARE CRUCIAL because ...

0:37
Dota 2 - How to triple stack as Shadow Demon (dire)

2,255 views

10 years ago

Roel Van de Paar
What actually is a shadow register? (3 Solutions!!)

https://amzn.to/4aLHbLD You're literally one click away from a better setup — grab it now! As an Amazon Associate I earn ...

2:10
What actually is a shadow register? (3 Solutions!!)

365 views

4 years ago

Adam Doupé
CSE 365 S20: 4-23-20 "Application Security Pt. 5"

Recorded zoom lecture for CSE 365 S20 on 4-23-20. We covered stack overflows, overwriting saved EIP on the stack, and return ...

1:26:03
CSE 365 S20: 4-23-20 "Application Security Pt. 5"

466 views

5 years ago

Patched Bandit
Honda CRF300 Restrictive Airbox Snorkel Is 100% BS? #motorcycle #dirtbike

Removing the intake snorkel from my Honca CRF300L and testing the performance differences to a STOCK BIKE. Full long test ...

0:55
Honda CRF300 Restrictive Airbox Snorkel Is 100% BS? #motorcycle #dirtbike

19,323 views

2 years ago