V
主页
京东 11.11 红包
Code Red- Navigating the Minefield of Security Programming Blunders - Gregg Jask
发布人
https://youtu.be/gyIw2H0-8qY
打开封面
下载高清视频
观看高清视频
视频下载器
USENIX Security '16 - AMD x86 Memory Encryption Technologies
TPM Transport Security Defeating Active Interposers with DICE.mp4
Profiling Code in Rust - by Vitaly Bragilevsky - Rust Linz, December 2022
OSDI '20 - Wait-Free Code Patching of Multi-Threaded Processes
Navigating Transactions - ACID Complexity in Modern Databases
Ballroom F Saturday Mar 09 SCaLE 17x Branden Gregg Debugging Minecraft
Linux perf tool metrics - Ian Rogers
Houston, We Have a Problem- Analyzing the Security of Low Earth Orbit Satellites
Unleashing VFIO's Potential- Code Refactoring
Enhancing Systemd Security Using TPM 2.0
Memory profiling using code tagging - Suren Baghdasaryan, Kent Overstreet
The Code- Story of Linux documentary (Multilingual) (HQ 50 fps)
USENIX Security '17 - Reverse Engineering x86 Processor Microcode
Zero Trust – Changing the Security Paradigm
eBPF Strengthens SR-IOV to Be Powerful - Weizhou Lan & Zhiying Fang, Daocloud
gVisor- Modern Linux Sandboxing Technology
Linux Virtualization Based Security (LVBS) - Thara Gopinath
SDC2022 – Hardware Accelerated ZFS using Computational Storage
Storage Trends 2024
Enarx - Attested, Secured Execution with AMD’s SEV - Nathaniel McCallum & David
sched ext - David Marchevsky
USENIX Security '23 - HECO- Fully Homomorphic Encryption Compiler
PostgreSQL - memory management internals
Debugging Real-Time Linux Scheduling Latency
Change w- Jim Keller
Results from using SCHED_DEADLINE for energy-aware optimization of RT DAGs on he
Breaking the x86 Instruction Set
SDC2022 – NVMe Computational Storage – An update on the Standard
Chips & Salsa Episode 52 - February 2023 Security Advisories | Intel Technology
Embedded Recipes 2022 - Secure Elements in a Trusted Execution Environment
AWS re-Invent 2022 - Integrating optimization into your cloud journey (PRT311)
KVM Forum 2022 - Panel Discussion - KVM-based Virtualization Contributor Q&A
SREcon22 APAC - Chaos Engineering at Scale
USENIX Security '23 - Remote Direct Memory Introspection
Update Your Kernels! - Greg Kroah-Hartman, Linux Kernel, Cyber Resilience Act
TPMs & The Linux Kernel- Unlocking A Better Path To Hardware Security
AMD's virtualization memory encryption technology - Brijesh Singh, Advanced Micr
CPU isolation vs jailbreaking IPIs - Valentin Schneider
Sched Ext - The pluggable Linux scheduler
Drinking from the Firehose: How the Mill CPU Decodes 30+ Instructions per Cycle