The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 Decoders
![](https://i.ytimg.com/vi/WpzVhCOcIAc/mqdefault.jpg)
31:44
You Can Run, but You Can't Hide - Finding the Footprints of Hidden Shellcode
![](https://i.ytimg.com/vi/opW_Q7jvSbc/mqdefault.jpg)
40:33
Weaponizing Plain Text: ANSI Escape Sequences as a Forensic Nightmare
![](https://i.ytimg.com/vi/j045KuFU2QM/mqdefault.jpg)
2:36:05
Versatile Video Coding - Algorithms and Specification
![](https://i.ytimg.com/vi/YP2XNAbB_Nw/mqdefault.jpg)
26:02
Evading Logging in the Cloud: Bypassing AWS CloudTrail
![](https://i.ytimg.com/vi/Ucve3aUzWWA/mqdefault.jpg)
1:23:55
Bugs, Bounties, and Beginners : Insights for Aspiring Hunters - Jayesh Kunwal
![](https://i.ytimg.com/vi/PdOP1IchX6Y/mqdefault.jpg)
40:27
Something Rotten in the State of Data Centers
![](https://i.ytimg.com/vi/mJ6BQ5eFkG4/mqdefault.jpg)
40:18
Three New Attacks Against JSON Web Tokens
![](https://i.ytimg.com/vi/u8V4ofWpHZk/mqdefault.jpg)
39:49