Control-Flow Integrity Courses
Linux Foundation via YouTube Securing the Hypervisor with Control-Flow Integrity
Linux Foundation via YouTube On Code Execution Tracking via Power Side-Channel
Association for Computing Machinery (ACM) via YouTube Ghost in the Machine: Challenges in Embedded Binary Security - Enigma 2017
USENIX Enigma Conference via YouTube A Tough Call - Mitigating Advanced Code-Reuse Attacks at the Binary Level
IEEE via YouTube Micro-Policies - Formally Verified, Tag-Based Security Monitors
IEEE via YouTube Detecting Kernel Exploits with eBPF
Black Hat via YouTube The Dark Age of Memory Corruption Mitigations in the Spectre Era
Black Hat via YouTube Drop the ROP - Fine-Grained Control-Flow Integrity for the Linux Kernel
Black Hat via YouTube Towards a Policy-Agnostic Control-Flow Integrity Implementation
Black Hat via YouTube