Ingrid Verbauwhede, KU Leuven "The need for Hardware roots of trust"
Loading
0 %
Key | Action |
---|---|
K or space | Play / Pause |
M | Mute / Unmute |
C | Select next subtitles |
A | Select next audio track |
V | Show slide in full page or toggle automatic source change |
left arrow | Seek 5s backward |
right arrow | Seek 5s forward |
shift + left arrow or J | Seek 10s backward |
shift + right arrow or L | Seek 10s forward |
control + left arrow | Seek 60s backward |
control + right arrow | Seek 60s forward |
shift + down arrow | Decrease volume |
shift + up arrow | Increase volume |
shift + comma | Decrease playback rate |
shift + dot or shift + semicolon | Increase playback rate |
end | Seek to end |
beginning | Seek to beginning |
Information on this media
Links:
Number of views:
121 (this month: 1)Creation date:
Nov. 21, 2018Other media in the channel "Journée des GT SSL/SRI du Pre-GDR sécurité informatique a EURECOM"
206 views, 1 this monthSam L. Thomas, IRISA "Experiences with the Carnegie Mellon University Binary Analysis Platform (CMU BAP)"November 22nd, 2018
49 views, 1 this monthSébasten Bardin, CEA "Formal methods: from source-level safety to binary-level security"November 22nd, 2018
237 viewsEmanuele Cozzi, EURECOM "Understanding Linux Malware"November 22nd, 2018
165 views, 1 this monthLeyla Bilge, Symantec Research Labs "An honest look at the state of enterprise security"November 22nd, 2018