Ingrid Verbauwhede, KU Leuven "The need for Hardware roots of trust"
Action | Key |
---|---|
Play / Pause | K or space |
Mute / Unmute | M |
Toggle fullscreen mode | F |
Select next subtitles | C |
Select next audio track | A |
Toggle automatic slides maximization | V |
Seek 5s backward | left arrow |
Seek 5s forward | right arrow |
Seek 10s backward | shift + left arrow or J |
Seek 10s forward | shift + right arrow or L |
Seek 60s backward | control + left arrow |
Seek 60s forward | control + right arrow |
Seek 1 frame backward | alt + left arrow |
Seek 1 frame forward | alt + right arrow |
Decrease volume | shift + down arrow |
Increase volume | shift + up arrow |
Decrease playback rate | < |
Increase playback rate | > |
Seek to end | end |
Seek to beginning | beginning |
You can right click on slides to open the menu
Subscribe to notifications
When subscribed to notifications, an email will be sent to you for all added annotations.
Your user account has no email address.
Other media in the channel "Journée des GT SSL/SRI du Pre-GDR sécurité informatique a EURECOM"
212 views, 6 this yearSam L. Thomas, IRISA "Experiences with the Carnegie Mellon University Binary Analysis Platform (CMU BAP)"November 22nd, 2018
50 views, 1 this yearSébasten Bardin, CEA "Formal methods: from source-level safety to binary-level security"November 22nd, 2018
240 views, 1 this yearEmanuele Cozzi, EURECOM "Understanding Linux Malware"November 22nd, 2018
165 viewsLeyla Bilge, Symantec Research Labs "An honest look at the state of enterprise security"November 22nd, 2018