Sort by

Newest

Oldest

Popular

Professor reveals the secret to being accepted into a PhD program
05:29
Should you get a Ph.D.? (2 minute video)
02:02
Spectre and Meltdown attacks explained understandably
16:19
Research questions at Emory University - Ymir Vigfusson
06:28
Estimating the multiplicity of infection of P. falciporum malaria parasites
10:55
Rowhammer attacks explained simply
18:49
CS453 - Derek O - Fuzzing with American Fuzzy Lop
09:39
CS453 - Secure design
01:11:10
CS453 - Web security, part 2/2
01:13:34
Dynamic Performance Profiling of Caches
01:00:21
CS453 - Format string attack, example attack.
01:14:04
CS453 - Heap overflow example; Format string exploits
01:15:36
CS453 - Heap overflows
01:14:58
CS453 - Integer vulnerabilities
01:15:37
CS453 - More return oriented programming; Integer bugs
01:11:14
CS453 - Return oriented programming (ROP)
01:17:21
CS453 - Nop sleds and returning to libc
01:16:15
CS453 - How to write a shellcode
01:15:03
CS453 - Side channel attacks; demo against Internet Explorer on Windows 7
01:18:02
CS453 - Buffer overflows
01:11:36
CS453 - x86 assembly, part 3/3
01:13:32
CS453 - x86 assembly, part 2/3
01:14:51
CS453 - x86 assembly, part 1/3
01:16:51
CS453 - Computer security and exploitation
01:15:36
CS453 - Web security, part 1/2
01:15:00
CS453 - Network Security
01:15:20
CS453 - Wireless Security, part 2
01:12:02
CS453 - Wireless Security, part 1
01:13:11
CS453 - RSA and Randomness
01:10:07
How to write a great research paper
01:01:17