filmov
tv
control-flow integrity
0:54:32
gannimo, npc@berkeley.edu: New memory corruption attacks: why can't we have nice things?
0:13:54
USENIX Security '24 - DEEPTYPE: Refining Indirect Call Targets with Strong Multi-layer Type Analysis
0:19:01
SoK: Shining Light on Shadow Stacks
0:30:19
2016 LLVM Developers' Meeting: S. Cook 'Using LLVM to guarantee program integrity'
0:54:32
32C3 7163: New memory corruption attacks: why can't we have nice things?
0:19:24
Hurdle: Securing Jump Instructions Against Code Reuse Attacks
0:02:44
The Embedded Security Powerhouse @ CES 2020
0:03:00
Zero-RI5C: Hardware security mechanism to mitigate classic software attacks
1:06:01
Protecting FreeBSD with Secure Virtual Architecture
0:35:09
RuhrSec 2016: 'On Securing Legacy Software Against Code-Reuse Attacks', Lucas Vincenzo Davi
0:34:53
Go With the Flow: Enforcing Program Behavior Through Syscall Sequences and Origins
0:12:55
USENIX Security '23 - Guarding Serverless Applications with Kalium
0:14:23
Scadman Control Behavior Integrity for Distributed Cyber physical Systems ICCPS 2020 Virtual
0:23:25
USENIX Security '17 - Venerable Variadic Vulnerabilities Vanquished
0:03:20
PathArmor Demo (CCS '15) — Part 2/2: Protected multiple runs
0:24:48
Secure Code Execution in the Presence of Fault Attacks
0:28:32
BPF-NX+CFI (Maxwell Bland)
0:23:12
USENIX Security '18 - IMIX: In-Process Memory Isolation EXtension
0:21:37
Micro-Policies: Formally Verified, Tag-Based Security Monitors
0:04:46
14 - Demonstration of Anti-CallBack Stack Checks
2:16:51
Workshop - Secure Computer Systems - Day2 - Part-3
0:11:25
USENIX Security '20 - Silhouette: Efficient Protected Shadow Stacks for Embedded Systems
0:23:20
Block Oriented Programming: Automating Data-Only Attacks
0:03:29
[Black Hat USA 2023] Lost Control: Breaking Hardware-Assisted Kernel CFI with POP
Назад
Вперёд