Completed
Differences in TCP/IP Implementations
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Automated Evasion Attacks and Fingerprinting Using Blackbox Differential Automata Learning
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Motivation
- 3 Evaluating Web Security Products
- 4 Why Differential Testing
- 5 Why not Differential Testing
- 6 Overview
- 7 Symbolic Finite Automata (SFA)
- 8 Learning Symbolic Automata
- 9 Why Differential Automata Learning
- 10 Bootstrapping SFA Learning
- 11 Difference Analysis
- 12 Generating Program Fingerprints
- 13 Fingerprint Tree
- 14 Evaluation Of Bootstrapping Algorithm
- 15 Differences in TCP/IP Implementations
- 16 Mac OSX TCP/IP State Machine
- 17 Conclusions