YoVDO

Symbolic Execution Courses

Hardware Is the New Software - Finding Exploitable Bugs in Hardware Designs
USENIX Enigma Conference via YouTube
Rooting Routers Using Symbolic Execution
Hack In The Box Security Conference via YouTube
Logic Against Sneak Obfuscated Malware
NorthSec via YouTube
Binary Analysis, Meet the Blockchain
NorthSec via YouTube
Under the Hood of Wslink Multilayered Virtual Machine
Recon Conference via YouTube
Reverse Engineering of Black Box Binaries with Symbolic and Concolic Execution Technique
Recon Conference via YouTube
T-Fuzz - Fuzzing by Program Transformation
IEEE via YouTube
How the BIOS Assures Its Handling of Inputs
IEEE via YouTube
SymCerts - Practical Symbolic Execution for Exposing Noncompliance in X.509 Certificate Validation
IEEE via YouTube
Bringing the Power of Symbolic Execution to the Fight Against Malicious Excel 4 Macros
Black Hat via YouTube
< Prev Page 3 Next >