Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
1,710 results
Chapters: 00:00 - Intro & Motivation 00:57 - Concept #1: CPU Caches 01:57 - Measure Cache Access Time with rdtscp 05:00 ...
121,181 views
1 year ago
Unfortunately, security vulnerabilities in signed drivers can be used to as a proxy to read and write hardware resources such as ...
5,274 views
4 years ago
View the full free MOOC at https://ost2.fyi/Vulns1002. This class is for C/C++ developers learning secure development, and ...
201 views
3 months ago
A deep dive into the Windows boot process, its security mechanisms, and the security issues that have been found within the last ...
2,130 views
A general introduction into using the Intel VTune Profiler to optimize parallel applications. This video is part of an #hpc.nrw tutorial ...
7,348 views
2 years ago
Speculative Store Buffer Bypass is a security vulnerability that allows unauthorized users to steal sensitive information through ...
60,047 views
6 years ago
View the full free MOOC at https://ost2.fyi/Arch4001. This course will be an advanced Intel architecture and firmware security class ...
194 views
2 months ago
This video demonstrates an attack exploiting Thunderspy vulnerability variant 6, "SPI flash interface deficiencies". Thunderbolt ...
6,279 views
This is a follow-up to my popular Windows 11 video. I respond to several of the common comments and criticisms and give a lot ...
221,706 views
127 views
142 views
Memory corruption vulnerabilities have plagued computer systems since we started programming software. Techniques for ...
3,693 views
8 years ago
Kernel DMA Protection helps keep your computer secure by mediating all Thunderbolt Direct Memory Access operations through ...
8,770 views
3 years ago
As cyber threats continue to evolve, attackers constantly develop new methods for exploiting system vulnerabilities and evading ...
3,822 views
9 months ago
218 views
125 views
This video demonstrates an attack exploiting Thunderspy vulnerability variant 5, "Use of unauthenticated controller configurations" ...
192,890 views
Two sets of security issues will be discussed: those that affect all NoSQL database systems such as defaults, authentication, ...
6,740 views
10 years ago
In the recent years, we have seen some of the major players in the industry switch from x86-based processors to ARM processors.
1,508 views
C2 servers of mobile and Windows malware are usually left to their own fate after they have been discovered and the malware is ...
11,276 views