Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
696 results
The rapid advancement of cyber defense products has led to an increase in sophisticated memory evasion techniques employed ...
1,591 views
2y ago
Guarded Control Stack on arm64: Challenges in Enabling Shadow Stack Support for CRIU - Igor Svilenkov Bozic (CRIU) Shadow ...
35 views
3mo ago
Don't miss out! Join us at our next Flagship Conference: KubeCon + CloudNativeCon North America in Salt Lake City from ...
317 views
1y ago
This talk provides an overview of recent developments in the SFrame stack tracing format over the past year. We discuss some of ...
85 views
5mo ago
Control Flow Integrity in the Linux Kernel - Kees Cook, Google.
1,501 views
5y ago
The Linux kernel is the lowest layer of software (above BIOS) and that requires it to be as efficient as possible. Recent hardware ...
34,123 views
6y ago
Go to https://tryfum.com/ALONESCAPE or scan the QR code and use code ALONESCAPE to get your free FÜM Topper when you ...
37,157 views
4mo ago
Hardware-Assisted Fine-Grained Control-Flow Integrity: Adding Lasers to Intel's CET/IBT - Joao Moreira, Intel.
409 views
4y ago
... which we haven't talked about like officially in this class uh but there is functionality that is known as a shadow stack uh which is ...
647 views
... probably interesting work for L Tool's project regardless of what happens next with things like es frame or Shadow Stacks simply ...
198 views
Finer-grained kernel control flow integrity and challenges - Mr Deepak Gupta Kernel control flow integrity RFC patches [1] are out.
25 views
Smashing the Stack with Hydra: The Many Heads of Advanced Polymorphic Shellcode Pratap Prabhu Research Assistant, ...
331 views
12y ago
For more information and to download the video visit: http://bit.ly/30C3_info Playlist 30C3: http://bit.ly/30c3_pl Speaker: Andreas ...
947 views
Memory safety issues impact program safety and integrity. One of the implications of such issues is subversion of programmer ...
657 views
Control Flow Integrity on RISC-V Linux - Deepak Gupta, Rivos Inc Memory safety issues impact program safety and integrity.
376 views
Alexander Bluhm: OpenBSD Attack Mitigations The environment for userland application in OpenBSD tries to be an unpleasant ...
1,484 views
Slides: https://static.sched.com/hosted_files/owasp2023globalappsecwashin/6a/Exploiting%20Memory%20Vulnerabilities.pdf ...
776 views
Toolchains for the Future - Victor Rodriguez, Intel As it has been seen in the last decade the performance and security of an ...
486 views
Security Features status update - Justin Stitt (Google), Kees Cook (Google) Another year of work is behind us, with lots of progress ...
62 views
This is a start to finish tutorial for using two dual narrowband filters (Ha/OIII and SII/OIII) with a color camera to capture SHO data ...
9,505 views
1d ago