Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Speculative Execution
Showing:
23
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
Conference on Computer-Aided Verification
Verified Software Security Down to Gates
0
rewiews
Explore hardware-software contracts synthesis, security vulnerability detection, and microarchitecture updates for verified software security. Gain insights into cutting-edge approaches for high-assurance computer systems design.
Add to list
1
Lesons
1 hour 9 minutes
On-Demand
Free-Video
Linux Foundation
KVM Address Space Isolation
0
rewiews
Explore KVM Address Space Isolation: its intuition, applications, lifecycle, usage, and synchronization. Learn about page table filling, switching, and the ASI model for data privilege.
Add to list
23
Lesons
49 minutes
On-Demand
Free-Video
IEEE
Mitigating Spectre Attacks Using CFI Informed Speculation
0
rewiews
Mitigating Spectre attacks using Control-Flow Integrity to constrain speculative execution, combining forward and backward edge protection for comprehensive defense against non-vendor-specific vulnerabilities.
Add to list
11
Lesons
17 minutes
On-Demand
Free-Video
Alan Turing Institute
Meltdown and Spectre - Professor Mark Handley, UCL
0
rewiews
Comprehensive explanation of Meltdown and Spectre vulnerabilities in modern CPUs, their impact on computer systems, and mitigation strategies. Explores CPU architecture, speculative execution, and side-channel attacks.
Add to list
1
Lesons
1 hour 43 minutes
On-Demand
Free-Video
TheIACR
Side-Channel Attacks on Microarchitecture - CHES 2024
0
rewiews
Explore microarchitectural side-channel attacks and defenses in cryptographic systems at CHES 2024, featuring cutting-edge research and expert insights.
Add to list
1
Lesons
1 hour 9 minutes
On-Demand
Free-Video
WEareTROOPERS
Say Hello to Your New Cache Flow
0
rewiews
Explore innovative cache flow techniques in IT security with experts Geoffrey Bertoli, Rémi Jullian, and Théo Gordyjan at TROOPERS24 conference in Heidelberg, Germany.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
OffensiveCon
From Phantom to Inception: Leaking Data Using Branch-Free Predictor Training
0
rewiews
Explore data leakage techniques using branch-free predictor training, from phantom to inception, in modern processors.
Add to list
1
Lesons
1 hour
On-Demand
Free-Video
Linux Foundation
Reducing Client Latency and Timeouts When Running Cassandra on Public Cloud
0
rewiews
Explore strategies to minimize latency and timeouts in Cassandra deployments on public clouds. Learn to detect incidents, implement automation, and optimize client configurations for improved performance and reliability.
Add to list
1
Lesons
27 minutes
On-Demand
Free-Video
secwestnet
Speculative Execution Vulnerabilities: From Spectre to Control Flow Hijack
0
rewiews
Comprehensive exploration of speculative execution attacks, from original Spectre to new vulnerabilities. Clear explanations of exploitation challenges and processor vulnerabilities, with insights on high-resolution timers as potential weapons.
Add to list
1
Lesons
1 hour 3 minutes
On-Demand
Free-Video
Association for Computing Machinery (ACM)
Ret2spec- Speculative Execution Using Return Stack Buffers
0
rewiews
Explore speculative execution security risks, focusing on return stack buffer vulnerabilities and potential countermeasures in modern CPUs.
Add to list
10
Lesons
23 minutes
On-Demand
Free-Video
IEEE
Spectre Attacks Exploiting Speculative Execution
0
rewiews
Explore speculative execution vulnerabilities in modern processors, their impact on system security, and potential countermeasures to protect against Spectre attacks.
Add to list
11
Lesons
21 minutes
On-Demand
Free-Video
IEEE
High-Assurance Cryptography in the Spectre Era
0
rewiews
Explore cutting-edge cryptography techniques addressing Spectre vulnerabilities, focusing on constant-time implementations and speculative execution semantics for enhanced security.
Add to list
11
Lesons
15 minutes
On-Demand
Free-Video
Linux Foundation
Using Hardware Protected Keys with the Linux Crypto API
0
rewiews
Learn to use hardware-protected keys with Linux Crypto API for enhanced security in embedded systems. Explore implementation, benefits, and potential challenges in this in-depth presentation.
Add to list
12
Lesons
36 minutes
On-Demand
Free-Video
USENIX
Empower Programmable Pipeline for Advanced Stateful Packet Processing
0
rewiews
Innovative architecture enhancing programmable pipelines for advanced stateful packet processing, enabling flexible dataplane functions through augmented hardware and speculative execution techniques.
Add to list
1
Lesons
14 minutes
On-Demand
Free-Video
ACM SIGPLAN
Lifting Compiler Security Properties to Stronger Attackers: The Speculation Case
0
rewiews
Explore compiler security properties against speculative execution attacks, focusing on lifting guarantees to stronger attacker models and developing a formal framework for well-formedness conditions.
Add to list
1
Lesons
20 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Exec ASLR - Abusing Intel Branch Predictors to Bypass ASLR
0
rewiews
Explore a new Spectre v2 technique to bypass ASLR on Intel CPUs by abusing branch predictors, with demos on x86 internals, side-channel attacks, and speculative execution.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
Linux Foundation
MDS, Fallout, Zombieland & Linux
0
rewiews
Explore CPU hardware vulnerabilities, their impact on system security, and Linux kernel mitigations with insights from a leading developer.
Add to list
10
Lesons
20 minutes
On-Demand
Free-Video
Black Hat
Bypassing KPTI Using the Speculative Behavior of the SWAPGS Instruction
0
rewiews
Unveiling a new speculative execution attack exploiting SWAPGS instruction, bypassing existing CPU and kernel protections. Explores side-channel vulnerabilities and their implications for system security.
Add to list
6
Lesons
49 minutes
On-Demand
Free-Video
Strange Loop Conference
Mill vs. Spectre - Performance and Security
0
rewiews
Explore CPU architecture vulnerabilities, focusing on Meltdown and Spectre attacks. Learn about the Mill architecture's unique approach to performance and security without hardware speculation.
Add to list
22
Lesons
47 minutes
On-Demand
Free-Video
Black Hat
Uncommon Sense - Detecting Exploits with Novel Hardware Performance Counters and ML Magic
0
rewiews
Explore novel hardware performance counters and machine learning techniques to detect advanced exploits like speculative execution, Rowhammer, and ROP, enhancing cybersecurity defenses against evolving threats.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
IEEE
Spook.js - Attacking Chrome Strict Site Isolation via Speculative Execution
0
rewiews
Explore a novel attack on Chrome's Strict Site Isolation, leveraging speculative execution to bypass security measures and potentially compromise user data.
Add to list
1
Lesons
19 minutes
On-Demand
Free-Video
NDC Conferences
Practical Ghostbusting - Meltdown, Spectre and You
0
rewiews
Learn about Meltdown and Spectre vulnerabilities, their risks, and practical mitigation strategies in this accessible deep dive into modern processor security issues.
Add to list
10
Lesons
50 minutes
On-Demand
Free-Video
USENIX
SpecLFB: Eliminating Cache Side Channels in Speculative Executions
0
rewiews
Discover how SpecLFB leverages Line-Fill-Buffer to eliminate cache side-channel vulnerabilities in speculative executions, offering an efficient defense mechanism with minimal performance impact.
Add to list
1
Lesons
12 minutes
On-Demand
Free-Video
load more...