Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
1,015 results
Chapters: 00:00 - Intro & Motivation 00:57 - Concept #1: CPU Caches 01:57 - Measure Cache Access Time with rdtscp 05:00 ...
121,252 views
1 year ago
Unfortunately, security vulnerabilities in signed drivers can be used to as a proxy to read and write hardware resources such as ...
5,280 views
4 years ago
For decades, software vulnerabilities have remained an unsolvable security problem regardless of years of investment in various ...
4,691 views
The presentation demonstrates that the security of the A5/1 and A5/3 ciphers used to protect cellular calls are vulnerable to ...
11,870 views
Memory corruption vulnerabilities have plagued computer systems since we started programming software. Techniques for ...
3,696 views
8 years ago
A concept is a brick. It can be used to build a courthouse of reason. Or it can be thrown through the window.” ― Gilles Deleuze ...
4,933 views
A deep dive into the Windows boot process, its security mechanisms, and the security issues that have been found within the last ...
2,150 views
As cyber threats continue to evolve, attackers constantly develop new methods for exploiting system vulnerabilities and evading ...
3,865 views
9 months ago
This is the story of how we found and exploited a series of critical vulnerabilities (later named Ripple20) affecting tens or hundreds ...
8,775 views
3 years ago
Two sets of security issues will be discussed: those that affect all NoSQL database systems such as defaults, authentication, ...
6,742 views
10 years ago
A few years ago, a team of academic researchers showed how they can take over and control smart lightbulbs, and how this in ...
12,588 views
In this talk, Andreas speaks about the ongoing clash between hardware and software development (instead of "East vs.
26,363 views
7 years ago
In the recent years, we have seen some of the major players in the industry switch from x86-based processors to ARM processors.
1,510 views
2 years ago
This is a follow-up to my popular Windows 11 video. I respond to several of the common comments and criticisms and give a lot ...
222,409 views
In theory, brute force key recovery attacks against modern ciphers like AES should be impractical with the current state of ...
1,254 views
C2 servers of mobile and Windows malware are usually left to their own fate after they have been discovered and the malware is ...
11,459 views
Gary Numan said it best. Cars. They're everywhere. You can hardly drive down a busy freeway without seeing one. But what ...
112,645 views
Over the past years, our team has used several new approaches to identify multiple critical vulnerabilities in SQLite and Curl, two ...
1,740 views
DNS May Be Hazardous to Your Health ROBERT STUCKE SECURITY RESEARCHER The largest manufacturer of laptops, one ...
3,209 views
Dr. Inma Borrella and Ms. Laura Allegue host Mr. Mani Janakiram to discuss the evolution from an Automated to an Autonomous ...
3,136 views