Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#System Security
Showing:
172
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
Hussein Nasser
DNS Is Beautiful
0
rewiews
Explore DNS's brilliant design, scalability, and security challenges. Learn how it works, its pros and cons, and lessons for app development in this comprehensive overview.
Add to list
8
Lesons
41 minutes
On-Demand
Free-Video
INFOSEC TRAIN
Masterclass on Advanced Penetration Testing - Ethical Hacking Lifecycle
0
rewiews
Comprehensive overview of advanced penetration testing techniques, covering exploit frameworks, zero-day vulnerabilities, and macro usage for ethical hacking and cybersecurity professionals.
Add to list
9
Lesons
1 hour 28 minutes
On-Demand
Free-Video
z/OS Academy - Brasil 2020
0
rewiews
Evento virtual em português sobre z/OS para profissionais de mainframe, abordando tópicos como segurança, arquitetura, gerenciamento de workload, analytics e desenvolvimento no IBM Z.
Add to list
25
Lesons
1 day 2 hours
On-Demand
Free-Video
Cooper
Pyrrha - Navigating System Binaries Easily
0
rewiews
Discover Pyrrha, a tool for effortlessly exploring system binaries, enhancing your understanding of executable files and improving reverse engineering capabilities.
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
IEEE
Plundervolt - Software-Based Fault Injection Attacks against Intel SGX
0
rewiews
Explore software-based fault injection attacks on Intel SGX, focusing on the Plundervolt technique that exploits voltage scaling interfaces to compromise enclave computations and cryptographic algorithms.
Add to list
12
Lesons
17 minutes
On-Demand
Free-Video
IEEE
ICAS - An Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans
0
rewiews
Explore an extensible framework for assessing IC layout vulnerability to additive trojans, covering hardware security, development processes, and preventive measures.
Add to list
17
Lesons
17 minutes
On-Demand
Free-Video
IEEE
Finding and Exploiting CPU Features Using MSR Templating
0
rewiews
Explore CPU vulnerabilities through MSR templating, uncovering hidden features and potential security risks in modern processors. Learn techniques for identifying and exploiting undocumented CPU capabilities.
Add to list
6
Lesons
20 minutes
On-Demand
Free-Video
IEEE
A Secret-Free Hypervisor - Rethinking Isolation in the Age of Speculative Vulnerabilities
0
rewiews
Explore innovative approaches to hypervisor isolation, focusing on secret-free design to mitigate speculative vulnerabilities and enhance system security.
Add to list
10
Lesons
17 minutes
On-Demand
Free-Video
SyScan360
Pwning Adobe Reader - Exploiting Vulnerabilities and Security Flaws
0
rewiews
Explore advanced techniques for exploiting vulnerabilities in Adobe Reader, focusing on security flaws and potential attack vectors in this popular PDF software.
Add to list
1
Lesons
50 minutes
On-Demand
Free-Video
SyScan360
Practical SMEP Bypass Techniques
0
rewiews
Explore practical techniques for bypassing Supervisor Mode Execution Prevention (SMEP) in system security, enhancing your understanding of kernel exploitation and protection mechanisms.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
SyScan360
Setup for Failure - Defeating Secureboot
0
rewiews
Explore techniques for bypassing Secureboot security measures in this technical presentation, uncovering vulnerabilities and potential exploits in system protection mechanisms.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
SyScan360
Getting User Credentials Beyond Admin Privilege - Security Exploits
0
rewiews
Explore techniques for obtaining user credentials beyond admin privileges, uncovering vulnerabilities and security risks in system authentication processes.
Add to list
1
Lesons
18 minutes
On-Demand
Free-Video
Association for Computing Machinery (ACM)
Investigating System Operators' Perspective on Security Misconfigurations
0
rewiews
Explore system operators' views on security misconfigurations, their causes, and potential solutions in this insightful investigation of cybersecurity practices and incident prevention.
Add to list
11
Lesons
23 minutes
On-Demand
Free-Video
TheIACR
TPM-FAIL - TPM Meetings Timing and Lattice Attacks
0
rewiews
Explore TPM vulnerabilities, timing attacks, and lattice-based cryptanalysis. Learn about ECDSA nonce issues and their impact on digital signatures in trusted computing.
Add to list
17
Lesons
34 minutes
On-Demand
Free-Video
Linux Foundation
Analyzing and Improving the Security Properties of Secret Memory
0
rewiews
Explore techniques for enhancing secret memory security in Linux systems, covering trusted kernels, container security, and cloud security considerations.
Add to list
15
Lesons
28 minutes
On-Demand
Free-Video
Linux Foundation
Read-only Rootfs: Theory and Practice for Embedded Systems
0
rewiews
Explore techniques for implementing read-only rootfs in embedded systems, enhancing robustness and facilitating system updates. Learn to manage state storage and overcome challenges in real-world scenarios.
Add to list
26
Lesons
39 minutes
On-Demand
Free-Video
Linux Foundation
Verified Boot: From ROM to Userspace
0
rewiews
Explore cryptographic system protection on ARM processors, from bootloader to root file system. Learn about FOSS components, implementation challenges, and lessons from a large-scale project.
Add to list
1
Lesons
55 minutes
On-Demand
Free-Video
OWASP Foundation
Exploiting Hardware Glitches and Side Channels in Perfect Software
0
rewiews
Uncover vulnerabilities in flawless software through hardware glitches and side-channel attacks. Learn advanced exploitation techniques for enhancing cybersecurity defenses.
Add to list
1
Lesons
51 minutes
On-Demand
Free-Video
Linux Foundation
Let's Encrypt ActiveMQ and Karaf - Securing Messaging Services
0
rewiews
Explore securing ActiveMQ and Karaf using Let's Encrypt, covering certificate management, orchestration layers, and implementing a secure messaging service at scale.
Add to list
21
Lesons
45 minutes
On-Demand
Free-Video
OWASP Foundation
Threat Modeling Made Interactive - Using Poirot for Dynamic Security Analysis
0
rewiews
Interactive demonstration of Poirot, a tool for modeling and analyzing system security during design phase, enabling real-time threat assessment and mitigation strategies.
Add to list
15
Lesons
40 minutes
On-Demand
Free-Video
Linux Foundation
Reducing Exploitation Risk via Application-Specific Hardening in IoT Systems
0
rewiews
Reduce exploitation risk in IoT systems through application-specific hardening techniques. Learn preventive measures, Linux security features, and hands-on examples for enhancing system security.
Add to list
13
Lesons
43 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
Timekiller: Escape From QEMU/KVM - Exploiting Asynchronous Clock Vulnerabilities
0
rewiews
Demonstrating a novel guest-to-host escape exploit in QEMU/KVM using asynchronous clock vulnerabilities. Introduces "Timekiller" technique to turn heap overflow into arbitrary address write, achieving full VM escape.
Add to list
1
Lesons
53 minutes
On-Demand
Free-Video
CAE in Cybersecurity Community
Building Secure Software Systems Using Security Patterns
0
rewiews
Learn to create secure software systems using proven security patterns, enhancing your ability to design robust and protected applications in today's cybersecurity landscape.
Add to list
1
Lesons
50 minutes
On-Demand
Free-Video
Security BSides San Francisco
Protecting Data vs Systems: Practicality, Performance, and Problems
0
rewiews
Explore data protection strategies, encryption options, and trade-offs. Learn about record-level security and performance considerations for safeguarding information beyond system-level defenses.
Add to list
1
Lesons
29 minutes
On-Demand
Free-Video
HackMiami
Breaching the Depths of the Abyss: Exposing Rootkits - Track 2, Session 4
0
rewiews
Dive deep into rootkits: explore their inner workings, detection techniques, and countermeasures. Learn to identify and neutralize these stealthy threats using advanced tools like Living Off The Land Drivers.
Add to list
1
Lesons
39 minutes
On-Demand
Free-Video
Linux Foundation
Civil Infrastructure Platform - Empowering Sustainable Living with Industrial Grade Linux
0
rewiews
Explore Industrial Grade Linux for sustainable, secure, and long-lasting civil infrastructure systems. Learn how CIP enhances reliability and fosters collaborative development.
Add to list
1
Lesons
42 minutes
On-Demand
Free-Video
IEEE
Krace: Data Race Fuzzing for Kernel File Systems
0
rewiews
Innovative fuzzing technique for detecting data races in kernel file systems, enhancing concurrency coverage tracking and active interleaving exploration through delay injection.
Add to list
29
Lesons
17 minutes
On-Demand
Free-Video
IEEE
Razzer - Finding Kernel Race Bugs through Fuzzing
0
rewiews
Discover efficient kernel race bug detection through fuzzing with Razzer. Learn static analysis and deterministic thread interleaving techniques to identify vulnerabilities in Linux kernels.
Add to list
12
Lesons
20 minutes
On-Demand
Free-Video
Linux Foundation
Fuzzing the Linux Kernel - Mentorship Session
0
rewiews
Explore advanced techniques for identifying vulnerabilities in the Linux kernel through fuzzing, enhancing system security and stability.
Add to list
1
Lesons
1 hour 22 minutes
On-Demand
Free-Video
Rust
Aya - Extending the Linux Kernel with eBPF and Rust
0
rewiews
Explore extending the Linux kernel using eBPF and Rust with Aya, a powerful framework for kernel development and system programming.
Add to list
1
Lesons
41 minutes
On-Demand
Free-Video
Rust
The Sheer Terror of PAM - Extending UNIX Authentication with Rust
0
rewiews
Explore UNIX authentication challenges and PAM's complexities. Learn to leverage Rust for safer, more efficient authentication logic, with practical examples and research insights.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
Linux Foundation
Develop Android Context Hub Runtime Environment (CHRE) Nanoapps in WebAssembly
0
rewiews
Learn to develop Android CHRE nanoapps using WebAssembly, enhancing security, cross-architecture compatibility, and battery efficiency for always-on, contextually aware features.
Add to list
1
Lesons
29 minutes
On-Demand
Free-Video
Eclipse Foundation
Unikernels Motivations, Benefits and Issues - A Multivocal Literature Review
0
rewiews
Explore the potential of unikernels through a comprehensive analysis of their motivations, benefits, and challenges in cloud computing, focusing on performance optimization and security enhancements.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
DEFCONConference
Staying Undetected Using the Windows Container Isolation Framework
0
rewiews
Delve into Windows Container isolation mechanisms, file system separation techniques, and security implications, including methods to manipulate container frameworks for enhanced system protection.
Add to list
1
Lesons
37 minutes
On-Demand
Free-Video
USENIX
APRON: Authenticated and Progressive System Image Renovation
0
rewiews
Innovative approach to secure OS recovery, minimizing downtime through progressive block repair and verification. Outperforms conventional methods, enabling swift system restoration with minimal performance impact.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
SyScan360
All About RPC, LRPC, ALPC, and LPC in Your PC
0
rewiews
Comprehensive exploration of Windows inter-process communication mechanisms, including RPC, LRPC, ALPC, and LPC, detailing their architecture, security implications, and practical applications.
Add to list
1
Lesons
1 hour 2 minutes
On-Demand
Free-Video
Association for Computing Machinery (ACM)
Practical State Recovery Attacks Against Legacy RNG Implementations
0
rewiews
Systematic study of FIPS 140-2 certifications reveals vulnerabilities in ANSI X9.31 RNG implementations, highlighting risks of static keys and emphasizing the importance of secure random number generation.
Add to list
6
Lesons
23 minutes
On-Demand
Free-Video
TheIACR
Baby Sharks - Small-Subgroup Attacks to Disrupt Large Distributed Systems
0
rewiews
Explore small-subgroup attacks on distributed systems, focusing on MPC implementation vulnerabilities and real-world implications for cryptographic protocols and distributed key generation.
Add to list
13
Lesons
33 minutes
On-Demand
Free-Video
TheIACR
Tornado- Automatic Generation of Probing-Secure Masked Bitsliced Implementations
0
rewiews
Explore automatic generation of secure masked bitsliced implementations for cryptographic algorithms, addressing probing attacks and enhancing performance in hardware security.
Add to list
9
Lesons
22 minutes
On-Demand
Free-Video
SecurityFWD
Exploring Hacker Operating Systems - Manjaro
0
rewiews
Explore Manjaro, an Arch-based OS for user-friendly Linux experience. Learn installation, setup, and how to transform it into a powerful pentesting platform using BlackArch repository.
Add to list
10
Lesons
1 hour 3 minutes
On-Demand
Free-Video
Linux Foundation
DIGLIM eBPF - Secure Boot at Application Level with Minimal Distro Changes
0
rewiews
Explore secure boot implementation at the application level using eBPF technology, minimizing distro modifications for enhanced system integrity and security.
Add to list
1
Lesons
1 hour 21 minutes
On-Demand
Free-Video
Linux Foundation
Resurrection of /dev/bpf Discussion for Implementing Trusted Unprivileged BPF
0
rewiews
Explore the revival of /dev/bpf for implementing trusted unprivileged BPF, delving into its implications and potential benefits for Linux kernel development and security.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
Linux Foundation
Sframe - Introduction to Linux Kernel Tracing Framework
0
rewiews
Explore Sframe technology with experts Steven Rostedt and Indu Bhagat, gaining insights into its applications and potential impact on Linux systems and networking.
Add to list
1
Lesons
33 minutes
On-Demand
Free-Video
Cooper
Hypervisor-Level Debugger - Benefits and Challenges
0
rewiews
Explore hypervisor-level debugging techniques, their advantages, and potential obstacles in this insightful presentation by Mathieu Tarral at Hack.lu 2018.
Add to list
1
Lesons
18 minutes
On-Demand
Free-Video
Linux Foundation
Lessons Learned Creating a Robust, Hardened Kernel Driver for a Hardware Device
0
rewiews
Explore insights on developing resilient, secure kernel drivers for hardware devices, drawing from real-world experiences and best practices in Linux systems.
Add to list
1
Lesons
41 minutes
On-Demand
Free-Video
Linux Foundation
A Virtual IOMMU with Cooperative DMA Buffer Tracking
0
rewiews
Explore Intel's innovative approach to virtual IOMMU implementation, focusing on cooperative DMA buffer tracking techniques for enhanced system performance and security.
Add to list
1
Lesons
24 minutes
On-Demand
Free-Video
Linux Foundation
Guest Memory Protection - Current Status and Future
0
rewiews
Explore current status and future developments of Guest Memory Protection in virtualization technology, focusing on Intel's advancements and industry trends.
Add to list
1
Lesons
18 minutes
On-Demand
Free-Video
Linux Plumbers Conference
User Namespaces with Host-Isolated UIDs/GIDs - Linux Kernel Extension
0
rewiews
Exploring user namespace extensions for host-isolated UIDs/GIDs, discussing 64-bit kuid_t/kgid_t and VFS permission models for unmapped identifiers in Linux kernel development.
Add to list
1
Lesons
30 minutes
On-Demand
Free-Video
Linux Plumbers Conference
Simplifying Livepatch Callbacks, Shadow Variables, and State Handling
0
rewiews
Propuesta para mejorar el manejo de callbacks, variables shadow y estados en livepatches de Linux. Unifica estos elementos, simplifica su uso y resuelve problemas de compatibilidad entre parches acumulativos.
Add to list
1
Lesons
18 minutes
On-Demand
Free-Video
Linux Foundation
Are Our Systems Using Up-to-Date Cryptography?
0
rewiews
Explore modern cryptography auditing techniques using USDT and eBPF to detect legacy algorithms, ensuring system security without compromising performance or privacy.
Add to list
1
Lesons
29 minutes
On-Demand
Free-Video
Linux Foundation
Linux Integrity Subsystem Status Update
0
rewiews
Overview of new features and changes in Linux integrity subsystem, discussing current and future developments. Presented by IBM researcher and subsystem maintainer Mimi Zohar.
Add to list
1
Lesons
16 minutes
On-Demand
Free-Video
Linux Foundation
Take the Power Back on Your Containers with Flatcar
0
rewiews
Learn to deploy and manage Flatcar, a secure container-focused OS, using Terraform and Ignition. Explore auto-updates with Nebraska for efficient, low-maintenance infrastructure.
Add to list
1
Lesons
34 minutes
On-Demand
Free-Video
Linux Foundation
Enhancing System Security by Integrating Zephyr Bootloader and MCUboot
0
rewiews
Learn to enhance system security by integrating Zephyr Bootloader and MCUboot. Explore implementation techniques, benefits, and best practices for secure firmware development in embedded systems.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
Linux Foundation
Overview and Recent Developments of Keyrings Subsystem
0
rewiews
Explore the Linux keyrings subsystem, its access methods, recent updates, and future plans in this informative talk by Red Hat expert David Howells.
Add to list
1
Lesons
35 minutes
On-Demand
Free-Video
Linux Foundation
Tying EVM into LSM Policy for Enhanced Linux Security
0
rewiews
Explore securing developer machines using Linux's Extended Verification Module, integrating it with security mechanisms for enhanced application privilege management based on metadata integrity.
Add to list
11
Lesons
34 minutes
On-Demand
Free-Video
Linux Foundation
Overview and Recent Developments - Linux Integrity
0
rewiews
Explore Linux integrity subsystem's goals, security guarantees, and developments with IBM expert Mimi Zohar. Learn about file alteration detection, measurement appraisal, and local integrity enforcement.
Add to list
1
Lesons
36 minutes
On-Demand
Free-Video
Linux Foundation
Container Kernel Development
0
rewiews
Explore container kernel development with Christian Brauner from Canonical, focusing on key concepts, challenges, and advancements in this critical area of Linux technology.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
Linux Foundation
Advanced Systemd for Embedded Use-Cases
0
rewiews
Explore advanced systemd features for embedded systems, covering environment control, security, lifecycle management, boot optimization, and filesystem handling.
Add to list
11
Lesons
44 minutes
On-Demand
Free-Video
Linux Foundation
Next Steps for BPF LSM
0
rewiews
Explore advancements in BPF LSM technology, its potential applications, and future developments in Linux security modules with expert insights from KP Singh.
Add to list
1
Lesons
35 minutes
On-Demand
Free-Video
Linux Foundation
BPF Conformance - Handling Undefined Opcodes
0
rewiews
Explore BPF conformance and strategies for managing undefined opcodes in this concise technical presentation by Alan Jowett.
Add to list
1
Lesons
19 minutes
On-Demand
Free-Video
Linux Plumbers Conference
Integral Atomic Stack Switching for IST Exceptions
0
rewiews
Explore advanced techniques for handling IST exceptions through integral atomic stack switching in Linux kernel development.
Add to list
1
Lesons
18 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Hacking the Pandemic's Most Popular Software - Zoom
0
rewiews
Explore the vulnerabilities in Zoom discovered during Pwn2Own, including the process of finding and exploiting them to gain full control over a victim's system.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
media.ccc.de
ZombieLoad Attack
0
rewiews
ZombieLoad: Powerful Intel CPU vulnerability allowing data leaks across processes, kernels, and VMs. Explores attack methods, demonstrates real-world impacts, and discusses implications for hardware/software security.
Add to list
19
Lesons
56 minutes
On-Demand
Free-Video
media.ccc.de
Uncover, Understand, Own - Regaining Control Over Your AMD CPU
0
rewiews
Explore AMD's Platform Security Processor: firmware analysis, functionality insights, and security implications. Learn to extract, replace, and observe PSP components, gaining control over your AMD CPU.
Add to list
22
Lesons
57 minutes
On-Demand
Free-Video
BSidesLV
Prisoner Number Six
0
rewiews
Explore Docker container escape techniques through live demonstrations, covering reconnaissance, exploiting vulnerabilities, and gaining system access. Learn practical cybersecurity skills for container environments.
Add to list
19
Lesons
52 minutes
On-Demand
Free-Video
NorthSec
IOMMU and DMA Attacks
0
rewiews
Exploring IOMMU and DMA attacks, focusing on security implications, operating system integration, and techniques to bypass protections, particularly on macOS up to version 10.12.4.
Add to list
30
Lesons
34 minutes
On-Demand
Free-Video
BSidesLV
Ghost DMA Attack & The SeDeFuS Conundrum
0
rewiews
Explore Ghost DMA attacks, their mechanisms, and mitigations. Learn about the SeDeFuS conundrum and its implications for system security in this technical presentation.
Add to list
19
Lesons
42 minutes
On-Demand
Free-Video
media.ccc.de
Intel Management Engine Deep Dive
0
rewiews
Explora el Intel Management Engine: arquitectura, firmware, seguridad y desarrollo de un emulador. Análisis profundo de su funcionamiento interno y posibilidades de reemplazo de código abierto.
Add to list
42
Lesons
1 hour
On-Demand
Free-Video
media.ccc.de
Plundervolt - Flipping Bits from Software Without Rowhammer
0
rewiews
Explore Plundervolt, a software-based fault attack exploiting voltage scaling interfaces in processors to compromise system security, recover cryptographic keys, and induce vulnerabilities in secure enclaves.
Add to list
20
Lesons
50 minutes
On-Demand
Free-Video
media.ccc.de
Kernel Tracing With EBPF
0
rewiews
Explore Linux kernel tracing with eBPF: learn practical uses, dynamic instrumentation techniques, and insights into system workings. Gain knowledge to monitor actions and reveal process secrets efficiently.
Add to list
11
Lesons
54 minutes
On-Demand
Free-Video
LASCON
Cryptography Pitfalls
0
rewiews
Explore common cryptography pitfalls, modern techniques, and tools to enhance system security. Learn about random number generation, hash functions, ciphers, and authentication protocols.
Add to list
32
Lesons
46 minutes
On-Demand
Free-Video
OWASP Foundation
What Do You Mean Threat Model Every Story
0
rewiews
Explore integrating threat modeling into continuous development, focusing on methodology, developer education, and reflecting evolving systems in fast-paced environments.
Add to list
7
Lesons
31 minutes
On-Demand
Free-Video
Linux Foundation
Spectre, Meltdown, & Linux
0
rewiews
Explore Meltdown and Spectre security issues, their impact on Linux, and learn how the kernel community addressed these vulnerabilities to ensure system protection.
Add to list
12
Lesons
30 minutes
On-Demand
Free-Video
Linux Foundation
Kernel Runtime Security Instrumentation
0
rewiews
Explore extensible Linux security with eBPF programs, enabling custom security and auditing solutions without kernel modifications. Learn design, interfaces, and practical applications.
Add to list
11
Lesons
33 minutes
On-Demand
Free-Video
Linux Foundation
Using Seccomp to Limit the Kernel Attack Surface
0
rewiews
Explore seccomp for system call filtering in Linux, covering BPF virtual machine basics, filter examples, and applications in sandboxing and security. Learn implementation techniques and considerations.
Add to list
31
Lesons
1 hour 29 minutes
On-Demand
Free-Video
Linux Foundation
Open System Firmware Projects
0
rewiews
Explore open source system firmware initiatives aimed at enhancing boot, device, and management firmware. Industry experts discuss efforts to improve openness, portability, security, and maintainability.
Add to list
15
Lesons
44 minutes
On-Demand
Free-Video
Association for Computing Machinery (ACM)
A Software Approach to Defeating Side Channels in Last-Level Caches
0
rewiews
Explore techniques to mitigate side-channel attacks in last-level caches, focusing on Copy-On-Access and Cacheability Management methods for enhanced cloud security.
Add to list
16
Lesons
27 minutes
On-Demand
Free-Video
Linux Foundation
Securing Linux VM Boot with AMD SEV Measurement
0
rewiews
Explore AMD SEV measurement for securing Linux VM boot, covering vulnerabilities, solutions, and future plans in confidential computing environments.
Add to list
15
Lesons
19 minutes
On-Demand
Free-Video
Black Hat
3D Red Pill - A Guest-to-Host Escape on QEMU/KVM Virtio Device
0
rewiews
Demonstration of a guest-to-host escape exploit on QEMU/KVM virtio-gpu devices, showcasing vulnerability analysis, exploitation techniques, and potential security solutions.
Add to list
8
Lesons
27 minutes
On-Demand
Free-Video
Black Hat
Plundervolt - Flipping Bits from Software without Rowhammer
0
rewiews
Discover Plundervolt: a software-based fault attack that threatens system security without physical access. Learn its mechanisms, potential impacts, and how it compares to Rowhammer.
Add to list
9
Lesons
40 minutes
On-Demand
Free-Video
Black Hat
Exploiting the Hyper-V IDE Emulator to Escape the Virtual Machine
0
rewiews
Explore a critical Hyper-V vulnerability, its exploitation on Windows Server 2012R2, and learn about virtualization security, memory manipulation, and payload strategies in this technical deep dive.
Add to list
23
Lesons
50 minutes
On-Demand
Free-Video
Black Hat
GPU Security Exposed
0
rewiews
Explore GPU security vulnerabilities, including shared memory risks and privilege escalation issues, with insights on protecting popular devices from potential exploits.
Add to list
15
Lesons
22 minutes
On-Demand
Free-Video
USENIX
Keepers of the Machines - Examining How System Administrators Manage Software Updates
0
rewiews
Examining system administrators' software update management practices, challenges, and potential improvements for multiple machines to enhance organizational cybersecurity.
Add to list
10
Lesons
21 minutes
On-Demand
Free-Video
USENIX
fTPM - A Software-Only Implementation of a TPM Chip
0
rewiews
Explore software-based TPM implementation using ARM TrustZone, overcoming hardware limitations to provide robust security features for trusted computing in mobile devices.
Add to list
24
Lesons
33 minutes
On-Demand
Free-Video
USENIX
Twizzler - A Data-Centric OS for Non-Volatile Memory
0
rewiews
Explore Twizzler, an innovative OS redesign for non-volatile memory, offering efficient data persistence, simplified programming, and improved performance over traditional systems.
Add to list
12
Lesons
24 minutes
On-Demand
Free-Video
Black Hat
The B-MAD Approach to Threat Modeling
0
rewiews
Discover the B-MAD approach to threat modeling, exploring its pitfalls and organizational impacts. Learn effective strategies for implementing threat modeling across your organization and improving overall security.
Add to list
10
Lesons
25 minutes
On-Demand
Free-Video
Black Hat
May the Trust be with You - Empowering TrustZone-M with Multiple Trusted Environments
0
rewiews
Explore TrustZone-M vulnerabilities and learn about innovative solutions for enhancing security through multiple trusted environments in embedded systems.
Add to list
1
Lesons
27 minutes
On-Demand
Free-Video
Black Hat
Winter is Coming Back - Defeating the Most Advanced Rowhammer Defenses to Gain Root and Kernel Privileges
0
rewiews
A novel exploit breaking advanced rowhammer defenses, allowing unprivileged applications to gain root and kernel privileges. Stealthier and more efficient than existing exploits, this talk presents key steps and implications.
Add to list
14
Lesons
40 minutes
On-Demand
Free-Video
Black Hat
Eternal War in XNU Kernel Objects
0
rewiews
Systematic assessment of Apple's kernel security, demonstrating bypasses through ipc_port Kernel Object-Oriented Programming and showcasing realistic attack scenarios for full XNU control.
Add to list
25
Lesons
37 minutes
On-Demand
Free-Video
Black Hat
Back to the Future - A Radical Insecure Design of KVM on ARM
0
rewiews
Explore ARM architecture vulnerabilities in KVM, focusing on privilege escalation through exception-generating instructions and hypervisor calls. Learn about potential security risks in virtualization.
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
Black Hat
Another Flip in the Row
0
rewiews
Explore the Rowhammer bug in DRAM modules, its security implications, exploitation techniques, and potential mitigations in this comprehensive overview of hardware vulnerabilities.
Add to list
33
Lesons
50 minutes
On-Demand
Free-Video
Black Hat
Battle of the SKM and IUM - How Windows 10 Rewrites OS Architecture
0
rewiews
Explore Windows 10's revolutionary OS architecture, featuring Virtual Secure Machines, Secure Kernel Mode, and Isolated User Mode. Learn how these changes enhance security and impact system design.
Add to list
47
Lesons
52 minutes
On-Demand
Free-Video
Black Hat
Exploiting Linux and Pax ASLR's Weaknesses on 32-Bit and 64-Bit Systems
0
rewiews
Uncover vulnerabilities in Linux and PaX ASLR implementations, exploring low entropy, distribution issues, and object correlations. Learn to bypass Full ASLR and discover ASLR-NG, a new design addressing current weaknesses.
Add to list
1
Lesons
58 minutes
On-Demand
Free-Video
Black Hat
Exploiting Out-of-Order Execution for Covert Cross-VM Communication
0
rewiews
Explore a novel side channel attack exploiting CPU out-of-order execution for covert cross-VM communication in cloud environments, with live demos and mitigation techniques.
Add to list
1
Lesons
26 minutes
On-Demand
Free-Video
Black Hat
Over the Edge - Silently Owning Windows 10's Secure Browser
0
rewiews
Exploiting Windows 10's memory deduplication feature to silently compromise Microsoft Edge, bypassing security measures and gaining arbitrary memory access through JavaScript-based attacks.
Add to list
10
Lesons
33 minutes
On-Demand
Free-Video
Black Hat
Using Undocumented CPU Behavior to See Into Kernel Mode and Break KASLR in the Process
0
rewiews
Explore undocumented CPU behavior to breach kernel security, map memory, and bypass KASLR. Learn techniques for kernel introspection and physical-to-virtual address conversion without special privileges.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
JSConf
Build an End-to-End IoT System Using JavaScript with GDPR Awareness
0
rewiews
Explore building a GDPR-compliant IoT system using JavaScript, from device onboarding to remote access. Learn about JerryScript and node.js-based open gateway frameworks for secure, decentralized IoT development.
Add to list
1
Lesons
24 minutes
On-Demand
Free-Video
Teach Me10 Breaking in Bad - I'm the One Who Doesn't Knock
0
rewiews
Learn physical security penetration techniques from expert Jayson E. Street. Discover real-world strategies for unauthorized access and improve your organization's defenses.
Add to list
1
Lesons
57 minutes
On-Demand
Free-Video
USENIX
Protecting System Integrity with Trusted Platform Module
0
rewiews
Explore system firmware vulnerabilities and learn how Trusted Platform Module (TPM) can safeguard against persistent implants, ensuring secure access to infrastructure secrets.
Add to list
1
Lesons
27 minutes
On-Demand
Free-Video
USENIX
An SRE Guide to Linux Kernel Upgrades
0
rewiews
Demystifying Linux kernel releases: Learn to safely and timely update your systems, balancing security patches with stability concerns for high-profile services and applications.
Add to list
1
Lesons
34 minutes
On-Demand
Free-Video
load more...