Completed
Virtual machine introspection
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Using the Observer Effect and Cyber Feng Shui - Jacob Torrey
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Questions
- 3 Who am I
- 4 Red Team
- 5 Three Tools
- 6 Trusted Computing
- 7 Static Measurement
- 8 TPMs
- 9 Remote attestation
- 10 Virtual machine introspection
- 11 Paranoidfish
- 12 CPU Isolation
- 13 Shared Resources
- 14 Cash Teller
- 15 rootkit
- 16 gadgets
- 17 Secure Node
- 18 Secure Node Demo
- 19 Challenges
- 20 VM Detection
- 21 Manufacturing Variants
- 22 Challenge
- 23 Puffs
- 24 Secret Sharing
- 25 Error Correction Codes
- 26 SRAM Example
- 27 Other Techniques
- 28 FPGAs
- 29 Flash
- 30 EEPROM
- 31 Row Hammer
- 32 Github
- 33 Root Trust Key
- 34 Zelda Theme Execution
- 35 TLB Background
- 36 Hypervisor
- 37 Reverse Engineering
- 38 Chain of Trust
- 39 Observer Effect
- 40 Conclusion
- 41 Future Work
- 42 Time Overhead