Using Undocumented CPU Behavior to See Into Kernel Mode and Break KASLR in the Process
50:27
Breaking Kernel Address Space Layout Randomization (KASLR) With Intel TSX
22:32
USENIX Security '18 - Meltdown: Reading Kernel Memory from User Space
23:49
Side-Channel Attacks on Everyday Applications
51:00
GOD MODE UNLOCKED - Hardware Backdoors in x86 CPUs
51:04
DRAMA: How Your DRAM Becomes a Security Problem
38:21
Breaking FIDO: Are Exploits in There?
1:24:13
Stanford Seminar - Exploiting modern microarchitectures: Meltdown, Spectre, & other hardware attacks
46:34