Ingrid Verbauwhede, KU Leuven "The need for Hardware roots of trust"
Action | Key |
---|---|
Play / Pause | K or space |
Mute / Unmute | M |
Select next subtitles | C |
Select next audio track | A |
Show slide in full page or toggle automatic source change | V |
Seek 5s backward | left arrow |
Seek 5s forward | right arrow |
Seek 10s backward | shift + left arrow or J |
Seek 10s forward | shift + right arrow or L |
Seek 60s backward | control + left arrow |
Seek 60s forward | control + right arrow |
Decrease volume | shift + down arrow |
Increase volume | shift + up arrow |
Decrease playback rate | shift + comma |
Increase playback rate | shift + dot or shift + semicolon |
Seek to end | end |
Seek to beginning | beginning |
Other media in the channel "Journée des GT SSL/SRI du Pre-GDR sécurité informatique a EURECOM"
- 212 views, 6 this yearSam L. Thomas, IRISA "Experiences with the Carnegie Mellon University Binary Analysis Platform (CMU BAP)"November 22nd, 2018
- 50 views, 1 this yearSébasten Bardin, CEA "Formal methods: from source-level safety to binary-level security"November 22nd, 2018
- 240 views, 3 this yearEmanuele Cozzi, EURECOM "Understanding Linux Malware"November 22nd, 2018
- 165 viewsLeyla Bilge, Symantec Research Labs "An honest look at the state of enterprise security"November 22nd, 2018