Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
8,083 results
Sharing Shmoocon 2017 videos on YouTube. Hopefully to help reduce some load on Internet Archive, and because now I can ...
435 views
9 years ago
Presentation at 25 Years APART Workshop Author: Barton Miller, University of Wisconsin-Madison Abstract: Patching binary code ...
25 views
1 year ago
Binary Obfuscation from the Top-Down: Obfuscating Executables Without Writing Assembly Sean "Frank^2" Taylor Security ...
956 views
12 years ago
Nordic Vocal ASMR Soft‑spoken storytelling, gentle nature sounds, and atmospheric soundscapes — perfect for relaxing, ...
112 views
3 months ago
Security has gone from a curiosity to a phenomenon in the last decade. Fortunately for us, despite the rise of memory-safe, ...
13,371 views
10 years ago
This lecture is part of Post-quantum cryptography" part of the MasterMath course "Selected Areas in Cryptology" For details see ...
6,828 views
4 years ago
Presented by Jose E. Marchesi at GNU Tools Cauldron 2019 --- GNU Tools Cauldron 2019: https://gcc.gnu.org/wiki/cauldron2019.
2,838 views
6 years ago
The modern CPU is binary, which has so influenced the evolution of programming languages that software engineers think in ...
2,442 views
https://media.ccc.de/v/34c3-8789-lets_break_modern_binary_code_obfuscation A semantics based approach Do you want to ...
9,410 views
8 years ago
This is our first interview from The Tower with David Mallasén, from the Complutense University of Madrid, whose research group ...
127 views
Streamed 2 years ago
265 views
Scott Miller: A New Bioinformatics-Inspired and Binary Analysis: Coding Style/Motif Identification Abstract: Security analysis is ...
181 views
https://media.ccc.de/v/gpn23-148-patterns-hiding-in-dram-initialization Having looked at multiple implementations of DRAM ...
918 views
7 months ago
"Ghidra is a software reverse engineering (SRE) framework created and maintained by the National Security Agency Research ...
1,833 views
https://charlesaverill.github.io/teaching/30_Cycles_or_It_s_Free___Formal_Timing_of_Binary_Code.pdf.
21 views
Streamed 1 year ago
Abstract: In the dynamic field of cybersecurity, novel and efficient methods for malware analysis are paramount. Our research ...
141 views
Shiva allows developers to write patches in rich C code to naturally express the rewriting of binary code at runtime, in a high level ...
2,529 views
2 years ago
The C++ standard, just like the C standard, defines many important behaviours of the compiler and what constitutes a well-formed ...
1,533 views
WebAssembly is the newest way to play video games in your web browser. Both Unity3d and Unreal Engine now support ...
12,510 views
https://media.ccc.de/v/ASG2019-127-gnu-poke-an-extensible-editor-for-structured-binary-data GNU poke is a new interactive ...
1,950 views