Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Security bug
Applied sciences
Computer engineering
Computer security
Information security
Graph Chatbot
Related lectures (11)
Login to filter by course
Login to filter by course
Reset
Zero Days Vulnerability: Security Breaches on Personal Devices
Explores zero days vulnerability, ethical hacking, cyber attacks, and defense strategies against cyber threats.
Software security - Security testing
Covers software security testing approaches and coverage metrics.
Software Security: Security Testing - Sanitizers
Explores the use of sanitizers in software security testing to detect bugs early and improve testing effectiveness.
Software Security Vulnerabilities: Case Studies
Explores various software security vulnerabilities and the challenges of testing large codebases.
Adversarial Thinking: Reasoning as an Adversary
Explores the importance of understanding attacks and the reasoning behind adversarial thinking in developing security mechanisms.
HexHive: Research and Impact
Explores the HexHive project's research questions, bug pruning techniques, and industry collaborations, showcasing its impactful alumni.
Software Security: Memory Safety and Execution Attacks
Covers memory safety, execution attacks, vulnerabilities, and defense mechanisms in software security.
Web and Software Bugs
Explores vulnerabilities in web and software applications, discussing broken access control, injection flaws, and defense strategies like DEP and ASLR.
Signal: Security Analysis
Explores the formal security analysis of the Signal Messaging Protocol, covering key concepts and highlighting limitations and results.
Software security - Memory safety
Covers the basics of software security, focusing on memory safety and mitigation strategies against code execution attacks.
Security Testing and Spoofing
Covers security testing techniques, spoofing vulnerabilities, encryption bans, and network security properties.
Previous
Page 1 of 1
Next