Vulnerability Analysis Courses
TheIACR via YouTube Formal Verification of Masked Hardware Implementations in the Presence of Glitches
TheIACR via YouTube Functional Graph Revisited - Updates on Second Preimage Attacks on Hash Combiners
TheIACR via YouTube Authenticated Encryption with Variable Stretch
TheIACR via YouTube Security of Encryption Schemes in Weakened Random Oracle Models
TheIACR via YouTube ARSpy: Breaking Location-based, Multi-player Augmented Reality Applications for User Location Tracking
CAE in Cybersecurity Community via YouTube Waiter, There's a Compiler in My Shellcode
YouTube A Deep Look at Stack Buffer Overflows and Format String Vulnerabilities
YouTube State of Win32k Security - Revisiting Insecure Design
YouTube Lessons Learned from Development and Release of Blacksmith - The Meltdown
YouTube