YoVDO

Control-Flow Integrity Courses

Year in Review - Android Kernel Security
Linux Foundation via YouTube
Securing the Hypervisor with Control-Flow Integrity
Linux Foundation via YouTube
On Code Execution Tracking via Power Side-Channel
Association for Computing Machinery (ACM) via YouTube
Ghost in the Machine: Challenges in Embedded Binary Security - Enigma 2017
USENIX Enigma Conference via YouTube
A Tough Call - Mitigating Advanced Code-Reuse Attacks at the Binary Level
IEEE via YouTube
Micro-Policies - Formally Verified, Tag-Based Security Monitors
IEEE via YouTube
Detecting Kernel Exploits with eBPF
Black Hat via YouTube
The Dark Age of Memory Corruption Mitigations in the Spectre Era
Black Hat via YouTube
Drop the ROP - Fine-Grained Control-Flow Integrity for the Linux Kernel
Black Hat via YouTube
Towards a Policy-Agnostic Control-Flow Integrity Implementation
Black Hat via YouTube
< Prev Page 2 Next >