Ranked #1

Lecture 2: Control Hijacking Attacks
Lecture 2: Control Hijacking Attacks
In this lecture, Professor Mickens continues the topic of buffer overflows, discussing approaches to such control hijack... Read more
28 Mar 2017
•
1hr 27mins
Ranked #2

Lecture 10: Symbolic Execution
Lecture 10: Symbolic Execution
In this lecture, Professor Solar-Lezama from MIT CSAIL presents the concept of symbolic execution.
28 Mar 2017
•
1hr 22mins
Similar Podcasts
Ranked #3

Lecture 12: Network Security
Lecture 12: Network Security
In this lecture, Professor Zeldovich discusses network security, and how TCP/IP has evolved.
28 Mar 2017
•
1hr 18mins
Ranked #4

Lecture 3: Buffer Overflow Exploits and Defenses
Lecture 3: Buffer Overflow Exploits and Defenses
In this lecture, Professor Mickens discusses topics related to buffer overflow exploits, including baggy bounds handling... Read more
28 Mar 2017
•
1hr 21mins
Ranked #5

Lecture 14: SSL and HTTPS
Lecture 14: SSL and HTTPS
In this lecture, Professor Zeldovich discusses how to cryptographically protect network communications, as well as how t... Read more
28 Mar 2017
•
1hr 18mins
Ranked #6

Lecture 18: Private Browsing
Lecture 18: Private Browsing
In this lecture, Professor Mickens discusses privacy in the context of web browsers and web security.
28 Mar 2017
•
1hr 20mins
Ranked #7

Lecture 4: Privilege Separation
Lecture 4: Privilege Separation
In this lecture, Professor Zeldovich introduces the concept of privilege separation in the context of system security.
28 Mar 2017
•
1hr 23mins
Ranked #8

Lecture 8: Web Security Model
Lecture 8: Web Security Model
In this lecture, Professor Mickens introduces the concept of web security, specifically as it relates to client-side app... Read more
28 Mar 2017
•
1hr 22mins
Ranked #9

Lecture 15: Medical Software
Lecture 15: Medical Software
In this lecture, Kevin Fu from the University of Michigan delivers a guest lecture on medical software.
28 Mar 2017
•
1hr 15mins
Ranked #10

Lecture 9: Securing Web Applications
Lecture 9: Securing Web Applications
In this lecture, Professor Mickens continues looking at how to build secure web applications.
28 Mar 2017
•
1hr 22mins