Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Data Analysis
Digital Marketing
El rol de la digitalización en la transición energética
First Step Korean
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Discover how to build a robot for extracting RAM contents from embedded devices using cryogenic techniques. Learn about design challenges, practical solutions, and cost-effective construction methods.
Efficient heuristics for detecting cryptographic algorithms, state machines, and obfuscated code in binaries. Enhance reverse engineering workflows with architecture-agnostic techniques.
Discover a pre-auth remote vulnerability in Linux kernel's NVMe implementation. Learn open-source vulnerability research, static code analysis, and NVMe technology. Includes live demos and practical tips.
Reverse engineering Samsung oven firmware to fix temperature inaccuracies and improve performance, demonstrating power analysis, fault injection, and binary patching techniques for e-waste reduction.
Comprehensive security analysis of low-earth satellites, exploring vulnerabilities and demonstrating live exploitation to gain full control. Covers satellite architecture, reverse engineering, and potential impacts on critical services.
Reverse engineering and exploiting cryptographic backdoors in Phicomm routers, demonstrating vulnerabilities and developing tools for unauthenticated root access.
Découvrez les nouvelles techniques de dissimulation du malware PlugX utilisant les API Windows via COM, son exploitation de Windows Explorer et sa capacité de propagation par clé USB.
Explore Windows networking internals, reverse engineering techniques, and recent vulnerabilities like CVE-2023-23415 in this insightful talk on uncovering security flaws in the Windows networking stack.
Exploring MS-DOS malware techniques to create art, blending assembly programming with vintage bootkit analysis. Insights on legacy vulnerabilities and modern applications in firmware and IoT security.
Explore Windows Restart Manager: its architecture, legitimate uses, and potential for malicious exploitation. Learn defense techniques against threats and see live demonstrations of its functionalities.
Explore modifying Qualcomm WiFi chip firmware for security research. Learn about chip architecture, firmware structure, and patching techniques using the Nexmon framework to enhance functionality and find vulnerabilities.
Explore an intermediate approach to return oriented programming using taint-based analysis, balancing speed and query expressiveness for efficient gadget discovery and chaining.
Discover techniques for recovering software architecture from large binaries using CodeCut and local function affinity, with applications in automated module-to-module call graphs and section naming.
Hybrid framework for Windows malware analysis combining dynamic and sandbox approaches. Offers stealthy, adaptive solution to reduce analysis time, demonstrated with WannaCry case study.
Explore techniques for reconstructing embedded Java firmwares from fragmented file systems, developing puzzle-solving algorithms to piece together unknown J2ME fragments.
Get personalized course recommendations, track subjects and courses with reminders, and more.