V
主页
USENIX Security '23 - (M)WAIT for It- Bridging the Gap between Microarchitectura
发布人
https://youtu.be/2X4TYi-e9kk
打开封面
下载高清视频
观看高清视频
视频下载器
USENIX Security '16 - AMD x86 Memory Encryption Technologies
USENIX Security '23 - Remote Direct Memory Introspection
USENIX Security '23 - HECO- Fully Homomorphic Encryption Compiler
USENIX Security '17 - Reverse Engineering x86 Processor Microcode
Code Red- Navigating the Minefield of Security Programming Blunders - Gregg Jask
TPMs & The Linux Kernel- Unlocking A Better Path To Hardware Security
Hardware-software co-design to fundamentally improve security
Linux Virtualization Based Security (LVBS) - Thara Gopinath
Keynote- Linux Kernel Security Demystified - Greg Kroah-Hartman
Container Images & Security 101
Zero Trust – Changing the Security Paradigm
Chips & Salsa Episode 52 - February 2023 Security Advisories | Intel Technology
Houston, We Have a Problem- Analyzing the Security of Low Earth Orbit Satellites
Enhancing Systemd Security Using TPM 2.0
Linux Storage Stack Explained
UserfaultFD-based Memory Overcommitment
Linux perf tool metrics - Ian Rogers
Next-Gen Exploitation- Exploring The PS5 Security Landscape by Specter | hardwea
Observability when we have frame pointers (2024)
vfio-cxl - CXL Type 2 Device Passthrough With VFIO
bysyscall - Exploring Using eBPF to Bypass System Calls - Alan Maguire
Understanding C++ Coroutines by Example- Generators (Part 1 of 2)
IEEE 802.1 Data Center Network Standard
NSDI '24 - A large-scale deployment of DCTCP
Stories from BPF security auditing at Google – Brendan Jackman, Google
VM crash investigation
SDC2022 – NVMe Computational Storage – An update on the Standard
From Containers to Unikernels (2024)
AI Hardware w- Jim Keller
gVisor- Modern Linux Sandboxing Technology
Submit a follow-up patch with b4
The Gap Between Virtual NICs and Physical Network Cards
Understanding C++ Coroutines by Example- Generators (Part 2 of 2)
Profiling data structures - Arnaldo Carvalho de Melo
PostgreSQL - memory management internals
eBPF Strengthens SR-IOV to Be Powerful - Weizhou Lan & Zhiying Fang, Daocloud
Memory Scalability in AI co-design
Apple Intelligence | Privacy
The Confidential Computing Story part I- Rivers, dams and kernel development by
An Introduction to the RISC-V Architecture (2024)