Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Web Development
Software Development
Graphic Design
Functional Programming Principles in Scala
Mountains 101
Industrial Pharmacy-I
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the trade-offs between security and consistency in transaction scheduling, with real-world examples and attack demonstrations in information flow control systems.
Explore memory isolation techniques for multithreaded applications, focusing on enforcing least privilege memory views to enhance security and prevent unauthorized access.
Explore differential power analysis, masking techniques, and strong non-interference in cryptographic systems. Learn about probing security and noiseless leakage models.
Explores data reduction techniques for big data security dependency analyses, focusing on expendable dependencies, controlled loss, and domain knowledge to improve efficiency while maintaining accuracy.
Scalable graph-based approach for efficient bug detection in firmware images, improving vulnerability search speed and accuracy for IoT devices.
Explore Android app security, focusing on third-party library detection, fragmentation issues, and vulnerability identification in mobile applications.
Learn techniques for statistically deobfuscating Android apps, including probabilistic graphical models and implementation strategies, to enhance app security and analysis.
Explore Android security vulnerabilities through synchronous callbacks, examining attacks on system servers and apps, and discussing detection methods and defense strategies.
Explore Android Unix domain socket vulnerabilities, their security implications, and mitigation strategies in this comprehensive analysis of potential misuse and authentication weaknesses.
Explore distributed payment systems, mobile money revolution, and the DigiTally project with Ross Anderson. Insights on challenges, field trials, and lessons learned in building truly decentralized financial solutions.
Martin Hellman explores cybersecurity, nuclear security, and logical paradoxes, drawing connections between cryptography, national security, and mathematical logic while reflecting on his career and the broader implications of technology.
Automatic detection of flaws in iOS sandbox profiles using SandScout tool. Explores iOS architecture, sandbox profile language, and presents proof of concept for identifying security vulnerabilities.
Explore game theory's application to optimal decoy routing strategies, enhancing internet censorship circumvention through strategic placement and deployment of decoy routers.
Proactive system for identifying and preventing domain abuse at registration time, using machine learning to analyze registration patterns and historical data.
Explore techniques to identify infrastructure behind amplification DDoS attacks, including scanning, honeypots, and trilateration methods for improved cybersecurity defenses.
Get personalized course recommendations, track subjects and courses with reminders, and more.