1:29:58
6.858 Spring 2022 Lecture 22: Guest lecture by Max Krohn: Zoom security
667 views • 1 year ago
1:29:57
6.858 Spring 2022 Lecture 21: Guest lecture by bunnie: Hardware security
558 views • 1 year ago
1:29:57
6.858 Spring 2022 Lecture 19: Guest lecture by Nick Mathewson: Tor
384 views • 1 year ago
1:29:58
6.858 Spring 2022 Lecture 8: Sandboxing libraries
453 views • 1 year ago
1:29:40
6.858 Spring 2022 Lecture 23: Final project presentations
299 views • 1 year ago
1:29:58
6.858 Spring 2022 Lecture 12: Web security
557 views • 1 year ago
1:29:57
6.858 Spring 2022 Lecture 15: Certificates
350 views • 1 year ago
1:29:57
6.858 Spring 2022 Lecture 18: Guest lecture by Galen Hunt: IoT Security in Microsoft Azure Sphere
203 views • 1 year ago
1:29:55
6.858 Spring 2022 Lecture 20: CPU timing attacks
320 views • 1 year ago
1:29:57
6.858 Spring 2022 Lecture 13: Network security
610 views • 1 year ago
1:29:59
6.858 Spring 2022 Lecture 17: Messaging security
244 views • 1 year ago
1:29:56
6.858 Spring 2022 Lecture 16: Guest lecture by Max Burkhardt: Information security in real life
252 views • 1 year ago
1:29:59
6.858 Spring 2022 Lecture 14: Secure channels
335 views • 1 year ago
1:29:39
6.858 Spring 2022 Lecture 11: Symbolic execution
350 views • 1 year ago
1:29:57
6.858 Spring 2022 Lecture 3: User authentication
1K views • 1 year ago
1:29:59
6.858 Spring 2022 Lecture 9: Client device security
383 views • 1 year ago
1:29:44
6.858 Spring 2022 Lecture 10: Android security
408 views • 1 year ago
1:29:52
6.858 Spring 2022 Lecture 7: Software fault isolation
585 views • 1 year ago
1:29:58
6.858 Spring 2022 Lecture 5: Privilege separation
507 views • 1 year ago
1:29:57
6.858 Spring 2022 Lecture 6: OS and VM isolation
577 views • 1 year ago
1:29:08
6.858 Spring 2022 Lecture 4: Buffer overflows
667 views • 1 year ago
1:29:43
6.858 Spring 2022 Lecture 2: Security architecture
1.6K views • 1 year ago
1:29:58
6.858 Spring 2022 Lecture 1: Introduction
6.8K views • 1 year ago
1:21:15
6.S060 Fall 2021 Lecture 18: Case study: iOS security
1.2K views • 2 years ago
1:17:11
6.826 Fall 2020 Lecture 25: Reliability without proofs
484 views • 3 years ago
1:19:43
6.826 Fall 2020 Lecture 24: Push-button verification: Serval, Rosette
707 views • 3 years ago
1:09:02
6.826 Fall 2020 Lecture 23: What to expect from proofs for security?
335 views • 3 years ago
1:25:34
6.826 Fall 2020 Lecture 22: Non-interference; CertiKOS
419 views • 3 years ago
1:21:05
6.826 Fall 2020 Lecture 21: Secure enclaves; Komodo
309 views • 3 years ago
1:23:26
6.826 Fall 2020 Lecture 20: Correctness of verified systems
186 views • 3 years ago
Load More