System Security Courses
Black Hat via YouTube 3D Red Pill - A Guest-to-Host Escape on QEMU/KVM Virtio Device
Black Hat via YouTube Plundervolt - Flipping Bits from Software without Rowhammer
Black Hat via YouTube Exploiting the Hyper-V IDE Emulator to Escape the Virtual Machine
Black Hat via YouTube GPU Security Exposed
Black Hat via YouTube Razzer - Finding Kernel Race Bugs through Fuzzing
IEEE via YouTube Finding and Exploiting CPU Features Using MSR Templating
IEEE via YouTube A Secret-Free Hypervisor - Rethinking Isolation in the Age of Speculative Vulnerabilities
IEEE via YouTube Krace: Data Race Fuzzing for Kernel File Systems
IEEE via YouTube ICAS - An Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans
IEEE via YouTube