Completed
Intro
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Nowhere to Hide - How HW Telemetry and ML Can Make Life Tough for Exploits
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 The Evolution of Malware Detection Technologies
- 3 CPU Telemetry To The Rescue...wait, what is it?
- 4 Profiling exploits with performance monitoring events
- 5 DEMO
- 6 Classification Pipeline
- 7 Which PMU Events?
- 8 Information Gain is the key
- 9 Sample Telemetry
- 10 Identifying Relevant Events
- 11 Feature Map Example
- 12 Training pipeline
- 13 Detection Environments
- 14 What else can we use from the CPU
- 15 Signature Detection
- 16 HW-based Anomaly Detection
- 17 What is Control Flow?
- 18 How does it work?
- 19 HW Telemetries for Control Flow Tracing
- 20 Training and detection phases