YoVDO

Control-Flow Integrity Courses

Capturing 0Day Exploits With Perfectly Placed Hardware Traps
Black Hat via YouTube
Return to Where? You Can't Exploit What You Can't Find
Black Hat via YouTube
The Beast is in Your Memory
Black Hat via YouTube
WarpAttack - Bypassing CFI through Compiler-Introduced Double-Fetches
IEEE via YouTube
Lessons Learned Applying Compile-time Hardening Options for Security-Critical Programs in Linux
Linux Foundation via YouTube
Hardware-Assisted Fine-Grained Control-Flow Integrity - Adding Lasers to Intel's CET/IBT
Linux Foundation via YouTube
Kernel Self-Protection Project: Eliminating Bug Classes and Blocking Exploitation Techniques
Linux Foundation via YouTube
Linux Kernel Control-Flow Integrity Support
Linux Plumbers Conference via YouTube
Control Flow Integrity in the Linux Kernel
linux.conf.au via YouTube
Making C Less Dangerous in the Linux Kernel
linux.conf.au via YouTube
< Prev Page 3 Next >