Reverse Engineering Courses
IEEE via YouTube A Generic Approach to Automatic Deobfuscation of Executable Code
IEEE via YouTube Are We Susceptible to Rowhammer? An End-to-End Methodology for Cloud Providers
IEEE via YouTube Exploiting IPv6 Flow Label
IEEE via YouTube NetCAT - Practical Cache Attacks from the Network
IEEE via YouTube Asm2Vec - Boosting Static Representation Robustness for Binary Clone Search
IEEE via YouTube Unearthing the TrustedCore - A Critical Review on Huawei’s Trusted Execution Environment
USENIX via YouTube Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms
USENIX via YouTube Erays - Reverse Engineering Ethereum's Opaque Smart Contracts
USENIX via YouTube When CAN CANT
0xdade via YouTube