Sébasten Bardin, CEA "Formal methods: from source-level safety to binary-level security"
Loading
0 %
Key | Action |
---|---|
K or space | Play / Pause |
M | Mute / Unmute |
C | Select next subtitles |
A | Select next audio track |
V | Show slide in full page or toggle automatic source change |
left arrow | Seek 5s backward |
right arrow | Seek 5s forward |
shift + left arrow or J | Seek 10s backward |
shift + right arrow or L | Seek 10s forward |
control + left arrow | Seek 60s backward |
control + right arrow | Seek 60s forward |
shift + down arrow | Decrease volume |
shift + up arrow | Increase volume |
shift + coma | Decrease playback speed |
shift + dot or shift + semicolon | Increase playback speed |
end | Seek to end |
beginning | Seek to beginning |
Information on this media
Links:
Creation date:
November 21st, 2018, 3:11 p.m.Add date:
November 22nd, 2018, 1:58 p.m.Number of views:
39 (this month: 2)Visibility:
This media is publishedOther media in the channel "Journée des GT SSL/SRI du Pre-GDR sécurité informatique a EURECOM"
169 views, 2 this monthSam L. Thomas, IRISA "Experiences with the Carnegie Mellon University Binary Analysis Platform (CMU BAP)"November 22nd, 2018
219 views, 12 this monthEmanuele Cozzi, EURECOM "Understanding Linux Malware"November 22nd, 2018
92 views, 1 this monthIngrid Verbauwhede, KU Leuven "The need for Hardware roots of trust"November 22nd, 2018
119 views, 3 this monthLeyla Bilge, Symantec Research Labs "An honest look at the state of enterprise security"November 22nd, 2018