1:29:58
6.858 Spring 2022 Lecture 22: Guest lecture by Max Krohn: Zoom security
657 views • 1 year ago
1:29:57
6.858 Spring 2022 Lecture 21: Guest lecture by bunnie: Hardware security
552 views • 1 year ago
1:29:57
6.858 Spring 2022 Lecture 19: Guest lecture by Nick Mathewson: Tor
381 views • 1 year ago
1:29:58
6.858 Spring 2022 Lecture 8: Sandboxing libraries
446 views • 1 year ago
1:29:40
6.858 Spring 2022 Lecture 23: Final project presentations
295 views • 1 year ago
1:29:58
6.858 Spring 2022 Lecture 12: Web security
548 views • 1 year ago
1:29:57
6.858 Spring 2022 Lecture 15: Certificates
343 views • 1 year ago
1:29:57
6.858 Spring 2022 Lecture 18: Guest lecture by Galen Hunt: IoT Security in Microsoft Azure Sphere
196 views • 1 year ago
1:29:55
6.858 Spring 2022 Lecture 20: CPU timing attacks
313 views • 1 year ago
1:29:57
6.858 Spring 2022 Lecture 13: Network security
593 views • 1 year ago
1:29:59
6.858 Spring 2022 Lecture 17: Messaging security
231 views • 1 year ago
1:29:56
6.858 Spring 2022 Lecture 16: Guest lecture by Max Burkhardt: Information security in real life
246 views • 1 year ago
1:29:59
6.858 Spring 2022 Lecture 14: Secure channels
332 views • 1 year ago
1:29:39
6.858 Spring 2022 Lecture 11: Symbolic execution
338 views • 1 year ago
1:29:57
6.858 Spring 2022 Lecture 3: User authentication
987 views • 1 year ago
1:29:59
6.858 Spring 2022 Lecture 9: Client device security
377 views • 1 year ago
1:29:44
6.858 Spring 2022 Lecture 10: Android security
399 views • 1 year ago
1:29:52
6.858 Spring 2022 Lecture 7: Software fault isolation
578 views • 1 year ago
1:29:58
6.858 Spring 2022 Lecture 5: Privilege separation
493 views • 1 year ago
1:29:57
6.858 Spring 2022 Lecture 6: OS and VM isolation
565 views • 1 year ago
1:29:08
6.858 Spring 2022 Lecture 4: Buffer overflows
651 views • 1 year ago
1:29:43
6.858 Spring 2022 Lecture 2: Security architecture
1.5K views • 1 year ago
1:29:58
6.858 Spring 2022 Lecture 1: Introduction
6.6K views • 1 year ago
1:21:15
6.S060 Fall 2021 Lecture 18: Case study: iOS security
1.2K views • 2 years ago
1:17:11
6.826 Fall 2020 Lecture 25: Reliability without proofs
481 views • 3 years ago
1:19:43
6.826 Fall 2020 Lecture 24: Push-button verification: Serval, Rosette
703 views • 3 years ago
1:09:02
6.826 Fall 2020 Lecture 23: What to expect from proofs for security?
335 views • 3 years ago
1:25:34
6.826 Fall 2020 Lecture 22: Non-interference; CertiKOS
417 views • 3 years ago
1:21:05
6.826 Fall 2020 Lecture 21: Secure enclaves; Komodo
306 views • 3 years ago
1:23:26
6.826 Fall 2020 Lecture 20: Correctness of verified systems
185 views • 3 years ago
Load More