Formal methods

Provably Secure Operating System

No description. (Wikipedia).

Video thumbnail

Firmware Security: Why It Matters and How You Can Have It

A system is only as secure as the least secure component it depends on. Hardening the kernel is a vital part of developing a secure operating system, but if the firmware underneath the kernel is insecure then attackers have an opportunity to sidestep your security and compromise you anyway

From playlist Security

Video thumbnail

Computer Basics: Protecting Your Computer

There are many different online threats that you need to be aware of. In this video, we're going to show you some of these threats and talk about how to protect the files and personal data that you have stored on your computer. We hope you enjoy! For more info, check out our written less

From playlist Starting out with Technology

Video thumbnail

What can I do to protect my account?

Learn how you can use tools such as two-step verifications, password managers, and security checkups to proactively keep your accounts secure.

From playlist Internet Safety

Video thumbnail

How to keep your online accounts secure

What exactly is a "secure account"? Learn what account security is and why it’s so important to keep your accounts secure.

From playlist Internet Safety

Video thumbnail

Does it really matter what browser I choose?

You have a choice of browsers to select from. What makes a browser more - or less - secure? Learn some ways to assess a browser's security.

From playlist Internet Safety

Video thumbnail

CERIAS Security: Sphinx: A Compact and Provably Secure Mix Format 3/6

Clip 3/6 Speaker: Ian Goldberg · University of Waterloo Mix networks, originally proposed in 1981, provide a way for Internet users to send messages--such as email, blog posts, or tweets--without automatically revealing their identities or their locations. In this talk, we will describe

From playlist The CERIAS Security Seminars 2009

Video thumbnail

Computer Basics: Understanding Operating Systems

Whether you have a laptop, desktop, smartphone, or tablet, your device has an operating system (also known as an "OS"). In this video we'll show you what an operating system is and talk about a few of the most common operating systems. We'll also talk about compatibility issues. Some soft

From playlist Starting out with Technology

Video thumbnail

DEFCON 14: Trusted Computing: Could it be SATAN?

Speaker: Bruce Potter, The Shmoo Group Abstract: Trusted computing is not inherently evil. It sounds scary, but it's true. While the public perception of trusted computing is that content providers will use trusted computing to enforce their digital rights and take away our civil libertie

From playlist DEFCON 14

Video thumbnail

Staysafe.org: Protect your computer

The Internet is a global network that connects us to limitless information and opportunities. But there are risks involved with connecting to the Internet, such as downloading viruses and spyware onto computers and devices. Watch this video for four easy steps to help protect your computer

From playlist awareness

Video thumbnail

Introduction to Quantum Information and Computing by Barry Sanders

Dates: Thursday 03 Jan, 2013 - Saturday 05 Jan, 2013 Venue: ICTS-TIFR, IISc Campus, Bangalore The school aims to provide students and researchers an introduction to the field of quantum information, computation and communication. Topics that will be covered include introduction to quantu

From playlist Mini Winter School on Quantum Information and Computation

Video thumbnail

DEFCON 20: Creating an A1 Security Kernel in the 1980s (Using "Stone Knives and Bear Skins")

Speaker: TOM PERRINE SR ENTERPRISE ARCHITECT, SR MANAGER IT INFRASTRUCTURE This is a retrospective of computer security research and the process of building a secure operating system for the US government 1983-1990. The paper presents the case study of Kernelized Secure Operating System (

From playlist DEFCON 20

Video thumbnail

Don't Build Perfect Software

Many of us strive for perfection in software development, is this really an appropriate target to aim for? Perfect code is an illusion. Software engineering is an empirical discipline, and the software we create is only ever correct in a narrow context, from a technical and a social perspe

From playlist Software Engineering

Video thumbnail

CERIAS Security: Sphinx: A Compact and Provably Secure Mix Format 5/6

Clip 5/6 Speaker: Ian Goldberg · University of Waterloo Mix networks, originally proposed in 1981, provide a way for Internet users to send messages--such as email, blog posts, or tweets--without automatically revealing their identities or their locations. In this talk, we will describe

From playlist The CERIAS Security Seminars 2009

Video thumbnail

How coders are creating software that's impossible to hack | Kathleen Fisher | Big Think

New videos DAILY: https://bigth.ink How coders are creating software that's impossible to hack Join Big Think Edge for exclusive video lessons from top thinkers and doers: https://bigth.ink/Edge ---------------------------------------------------------------------------------- Hackers thr

From playlist Inside the minds of great programmers | Big Think

Video thumbnail

CERIAS Security: Sphinx: A Compact and Provably Secure Mix Format 4/6

Clip 4/6 Speaker: Ian Goldberg · University of Waterloo Mix networks, originally proposed in 1981, provide a way for Internet users to send messages--such as email, blog posts, or tweets--without automatically revealing their identities or their locations. In this talk, we will describe

From playlist The CERIAS Security Seminars 2009

Video thumbnail

What is DevSecOps?

What is DevSecOps? As teams adopt Continuous Delivery, DevOps, CI/CD for software development, being able to create systems that are safe and secure at speed, with great feedback and with high-quality becomes ever more important. Using software engineering disciplines like Continuous Del

From playlist DevOps

Video thumbnail

CERIAS Security: Provable security in mobile ad hoc networks 5/6

Clip 5/6 Speaker: Mike Burmester · Florida State Mobile ad hoc networks (MANETs) are collections of wireless mobile nodes with links that are made or broken in an arbitrary way. Communication is achieved via routes whose node relay packets. Several routing algorithms have been propose

From playlist The CERIAS Security Seminars 2006

Video thumbnail

Stanford Seminar - Preventing Successful Cyberattacks Using Strongly-typed Actors

Carl Hewitt MIT John Perry Stanford University UC Riverside June 17, 2021 Carl and John discuss how fundamental higher-order theories of mathematical structures of computer science are categorical meaning that they can be axiomatized up to a unique isomorphism thereby removing any ambi

From playlist Stanford EE380-Colloquium on Computer Systems - Seminar Series

Related pages