Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Adversarial Thinking: Common Weaknesses Enumeration
Graph Chatbot
Related lectures (30)
Protecting Your Work and EPFL
Emphasizes protecting work and EPFL through laws, regulations, identifying threats, and securing hardware.
Digital Contact Tracing: The Dark Side
Explores the challenges and vulnerabilities of digital contact tracing technology, focusing on the SwissCovid app and its implications.
Data Privacy: Anonymization and Protection
Discusses choosing relevant capsules and data privacy techniques.
NFC Security Research with NFCGate
Explores NFC technology, NFCGate toolkit, security breaches, analysis tools, and counter-measures to enhance NFC security.
Secret Services: Espionage and Security
Explores the history of espionage in Switzerland, the role of intelligence services, and various espionage activities, including industrial espionage.
HTTP Desync: Request Smuggling Reborn
Explores HTTP request smuggling, a vulnerability to bypass security controls, with examples and defense strategies.
Software Security: Memory Safety and Execution Attacks
Covers memory safety, execution attacks, vulnerabilities, and defense mechanisms in software security.
Adversarial Thinking: Reasoning as an Adversary
Explores the importance of understanding attacks and the reasoning behind adversarial thinking in developing security mechanisms.
Challenges in IoT Era
Covers IoT security challenges, cyber-physical attacks, and global attack surfaces.
Conditional Access I
Explores the definitions, history, and applications of conditional access in media security, covering user authentication techniques, smart cards, biometrics, and legal aspects.
Previous
Page 2 of 2
Next