Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Artificial Intelligence
Data Analysis
Digital Marketing
Max MSP Programming Course: Structuring Interactive Software for Digital Arts
Algorithms, Part I
The Emergence of the Modern Middle East - Part I
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Reverse engineering MediaTek's audio DSP firmware reveals vulnerabilities in RTOS and Android HAL, potentially enabling local privilege escalation and eavesdropping on user conversations.
Explore advanced HTTP response smuggling techniques, including protocol vulnerabilities, session hijacking, and response scripting, with real-world demonstrations on major ERP systems.
Explore large-scale malware behavior analysis using sandbox telemetry. Gain insights into infection patterns, commonalities, and evolving tactics to improve detection and mitigation strategies.
Explore new root causes of transient execution attacks, including machine clears, and discover novel attack primitives like Floating Point Value Injection and Speculative Code Store Bypass.
Explore software security analysis, covering vulnerability detection, attack mitigation, and automated exploit generation. Learn about cutting-edge research initiatives in program comprehension and security testing techniques.
Explore MIPS-based IoT device research with a framework for efficient emulation, vulnerability analysis, and exploit development. Gain insights into CPU architectures, virtualization, and cross-compilation techniques.
Explore low-level protocol fuzzing for secure microcontrollers, uncovering vulnerabilities in BootROM USB drivers. Learn about a custom fuzzing framework for SPI, I2C, USB, and UART, and its application in hardware security research.
Explore Azure AD security vulnerabilities, privilege escalation techniques, and mitigation strategies. Learn to protect your organization's cloud infrastructure from potential attacks and misconfigurations.
Explore 5G network security challenges, solutions, and design principles. Learn about industry collaboration, in-depth defense, zero-trust, and adaptive security for controllable 5G risks.
Explore modern post-exploitation techniques in cloud environments, focusing on IAM vulnerabilities in enterprise apps. Learn attacker strategies, discovery methods, and evasion tactics against security tools.
Explore the potential of smart contracts as anonymous rootkit C2 infrastructure, demonstrating their immutability, anonymity, and scalability for controlling infected devices remotely.
Explore electro-optical sound eavesdropping techniques, including Lamphone and Glowworm attacks, to recover speech from physical and virtual conversations using light analysis.
Coverage-guided binary fuzzing tool for vulnerability discovery, featuring test management, mutation tracking, and visualization. Supports multiple architectures and debuggers, with successful application in finding software vulnerabilities.
Framework for examining mobile app privacy, focusing on user control over data, consent, and compliance with global regulations. Includes automatic tools and findings from top apps, highlighting pervasive privacy issues.
Exploring innovative techniques to fuzz RDP protocol using WinAFL, uncovering vulnerabilities in both client and server implementations for enhanced remote connection security.
Get personalized course recommendations, track subjects and courses with reminders, and more.