1:29:58
6.858 Spring 2022 Lecture 22: Guest lecture by Max Krohn: Zoom security
679 views • 1 year ago
1:29:57
6.858 Spring 2022 Lecture 21: Guest lecture by bunnie: Hardware security
565 views • 1 year ago
1:29:57
6.858 Spring 2022 Lecture 19: Guest lecture by Nick Mathewson: Tor
386 views • 1 year ago
1:29:58
6.858 Spring 2022 Lecture 8: Sandboxing libraries
460 views • 1 year ago
1:29:40
6.858 Spring 2022 Lecture 23: Final project presentations
300 views • 1 year ago
1:29:58
6.858 Spring 2022 Lecture 12: Web security
561 views • 1 year ago
1:29:57
6.858 Spring 2022 Lecture 15: Certificates
351 views • 1 year ago
1:29:57
6.858 Spring 2022 Lecture 18: Guest lecture by Galen Hunt: IoT Security in Microsoft Azure Sphere
203 views • 1 year ago
1:29:55
6.858 Spring 2022 Lecture 20: CPU timing attacks
326 views • 1 year ago
1:29:57
6.858 Spring 2022 Lecture 13: Network security
617 views • 1 year ago
1:29:59
6.858 Spring 2022 Lecture 17: Messaging security
246 views • 1 year ago
1:29:56
6.858 Spring 2022 Lecture 16: Guest lecture by Max Burkhardt: Information security in real life
252 views • 1 year ago
1:29:59
6.858 Spring 2022 Lecture 14: Secure channels
337 views • 1 year ago
1:29:39
6.858 Spring 2022 Lecture 11: Symbolic execution
352 views • 1 year ago
1:29:57
6.858 Spring 2022 Lecture 3: User authentication
1K views • 1 year ago
1:29:59
6.858 Spring 2022 Lecture 9: Client device security
387 views • 1 year ago
1:29:44
6.858 Spring 2022 Lecture 10: Android security
411 views • 1 year ago
1:29:52
6.858 Spring 2022 Lecture 7: Software fault isolation
589 views • 1 year ago
1:29:58
6.858 Spring 2022 Lecture 5: Privilege separation
510 views • 1 year ago
1:29:57
6.858 Spring 2022 Lecture 6: OS and VM isolation
577 views • 1 year ago
1:29:08
6.858 Spring 2022 Lecture 4: Buffer overflows
673 views • 1 year ago
1:29:43
6.858 Spring 2022 Lecture 2: Security architecture
1.6K views • 1 year ago
1:29:58
6.858 Spring 2022 Lecture 1: Introduction
6.9K views • 1 year ago
1:21:15
6.S060 Fall 2021 Lecture 18: Case study: iOS security
1.2K views • 2 years ago
1:17:11
6.826 Fall 2020 Lecture 25: Reliability without proofs
485 views • 3 years ago
1:19:43
6.826 Fall 2020 Lecture 24: Push-button verification: Serval, Rosette
712 views • 3 years ago
1:09:02
6.826 Fall 2020 Lecture 23: What to expect from proofs for security?
335 views • 3 years ago
1:25:34
6.826 Fall 2020 Lecture 22: Non-interference; CertiKOS
420 views • 3 years ago
1:21:05
6.826 Fall 2020 Lecture 21: Secure enclaves; Komodo
314 views • 3 years ago
1:23:26
6.826 Fall 2020 Lecture 20: Correctness of verified systems
186 views • 3 years ago
Load More