YoVDO

System Security Courses

The B-MAD Approach to Threat Modeling
Black Hat via YouTube
3D Red Pill - A Guest-to-Host Escape on QEMU/KVM Virtio Device
Black Hat via YouTube
Plundervolt - Flipping Bits from Software without Rowhammer
Black Hat via YouTube
Exploiting the Hyper-V IDE Emulator to Escape the Virtual Machine
Black Hat via YouTube
GPU Security Exposed
Black Hat via YouTube
Razzer - Finding Kernel Race Bugs through Fuzzing
IEEE via YouTube
Finding and Exploiting CPU Features Using MSR Templating
IEEE via YouTube
A Secret-Free Hypervisor - Rethinking Isolation in the Age of Speculative Vulnerabilities
IEEE via YouTube
Krace: Data Race Fuzzing for Kernel File Systems
IEEE via YouTube
ICAS - An Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans
IEEE via YouTube
< Prev Page 6 Next >