Vulnerability Analysis Courses
IEEE via YouTube Unearthing the TrustedCore - A Critical Review on Huawei’s Trusted Execution Environment
USENIX via YouTube Lock It and Still Lose It - On the -In-Security of Automotive Remote Keyless Entry Systems
USENIX via YouTube Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models
USENIX via YouTube Embedded Device Vulnerability Analysis Case Study Using Trommel
0xdade via YouTube Dial V for Vulnerable - Attacking VoIP Phones
44CON Information Security Conference via YouTube GreedyBTS - Hacking Adventures in GSM
44CON Information Security Conference via YouTube SexyDefense - Maximizing the Home-Field Advantage
44CON Information Security Conference via YouTube Real Time Vulnerability Alerting by Using Principles from the United States Tsunami Warning Center
OWASP Foundation via YouTube Playing in the Sandbox - Bypassing Adobe Flash Input Validation
Cooper via YouTube