Completed
OUTLINE
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Automated Detection of Vulnerabilities in Black-Box Routers and Other Network Devices
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 INTRODUCTION-GABI NAKIBLY
- 3 OUTLINE
- 4 RESEARCH GOAL
- 5 OURMETHOD IN A GLANCE
- 6 CREATE A MODEL OF A PROTOCOL
- 7 SYMBOLIC EXECUTION 101
- 8 GENERATE TEST CASES
- 9 EXECUTE TESTS
- 10 FIND DEVIATIONS
- 11 PATH EXPLOSION PROBLEM
- 12 OUR MAIN OPTIMIZATION
- 13 OSPF ANALYSIS
- 14 THE FIGHT-BACK MECHANISM
- 15 THE ATTACKER
- 16 OSPF MODEL
- 17 CISCO TESTBED
- 18 CISCO RESULTS
- 19 QUAGGA
- 20 IN SUMMARY