Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
1,074 results
Chapters: 00:00 - Intro & Motivation 00:57 - Concept #1: CPU Caches 01:57 - Measure Cache Access Time with rdtscp 05:00 ...
121,184 views
1 year ago
In this work, we present the novel results of our research on Intel CPU microcode. Building upon prior research on Intel Goldmont ...
6,179 views
9 months ago
View the full free MOOC at https://ost2.fyi/Arch4001. This course will be an advanced Intel architecture and firmware security class ...
297 views
2 months ago
Unfortunately, security vulnerabilities in signed drivers can be used to as a proxy to read and write hardware resources such as ...
5,274 views
4 years ago
A deep dive into the Windows boot process, its security mechanisms, and the security issues that have been found within the last ...
2,130 views
The presentation demonstrates that the security of the A5/1 and A5/3 ciphers used to protect cellular calls are vulnerable to ...
11,867 views
Parts: 00:00 - Intro 01:28 - Overpriced 14:00 - Ugly and Cheap 16:43 - Nothing Special for Linux Users 22:54 - Who Shouldn't Buy ...
31,623 views
7 months ago
As an American, you can't help but root for Intel CEO Pat Gelsinger to succeed. His vision to bring semiconductor manufacturing ...
10,624 views
4 months ago
As cyber threats continue to evolve, attackers constantly develop new methods for exploiting system vulnerabilities and evading ...
3,822 views
For decades, software vulnerabilities have remained an unsolvable security problem regardless of years of investment in various ...
4,674 views
Memory corruption vulnerabilities have plagued computer systems since we started programming software. Techniques for ...
3,693 views
8 years ago
Two sets of security issues will be discussed: those that affect all NoSQL database systems such as defaults, authentication, ...
6,740 views
10 years ago
This is the story of how we found and exploited a series of critical vulnerabilities (later named Ripple20) affecting tens or hundreds ...
8,774 views
3 years ago
C2 servers of mobile and Windows malware are usually left to their own fate after they have been discovered and the malware is ...
11,281 views
This is a follow-up to my popular Windows 11 video. I respond to several of the common comments and criticisms and give a lot ...
221,729 views
2 years ago
Public transportation payment systems have undergone significant changes over the years. Recently, mobile payment solutions ...
20,057 views
... opposite effect and chill anyone from wanting to report security vulnerabilities that affect everyone. Lack of clear reporting paths, ...
52,278 views
In this talk, Andreas speaks about the ongoing clash between hardware and software development (instead of "East vs.
26,359 views
7 years ago
Gary Numan said it best. Cars. They're everywhere. You can hardly drive down a busy freeway without seeing one. But what ...
112,571 views
In the recent years, we have seen some of the major players in the industry switch from x86-based processors to ARM processors.
1,508 views