Ymir Vigfusson
Ymir Vigfusson
  • Видео 30
  • Просмотров 129 724
Professor reveals the secret to being accepted into a PhD program
How do you write that statement of purpose? What things are important in your application? Prof. Vigfusson tells you what's important when applying to graduate school, specifically in computer science.
Просмотров: 1 265

Видео

Should you get a Ph.D.? (2 minute video)
Просмотров 8023 года назад
Are you considering going to graduate school? What is it like getting a Ph.D.? Should you? Prof. Ymir Vigfusson is Assistant Professor of Computer Science at Emory University where he co-runs the Emory SimBioSys Lab. He does research into distributed systems, data science, cybersecurity, and computational epidemiology.
Spectre and Meltdown attacks explained understandably
Просмотров 56 тыс.6 лет назад
Gentle overview of the core ideas exploited by the Spectre and Meltdown CPU attacks, including speculative execution, side-channel attacks, and cache memory. Presented by Prof. Ymir Vigfusson at Emory University (ymsir.com).
Research questions at Emory University - Ymir Vigfusson
Просмотров 2,9 тыс.6 лет назад
Brief overview of some of the research projects I'm involved with at the Emory Simbiosys lab with my collaborators and students. Check this out if you are interested in joining us!
Estimating the multiplicity of infection of P. falciporum malaria parasites
Просмотров 1,5 тыс.6 лет назад
If you're unlucky enough to be infected by malaria, you might even be infected by multiple strains of malaria! So how can we monitor whether interventions against this deadly disease are working? This talk discusses a research collaboration between Emory University and the CDC about methods that might help.
Rowhammer attacks explained simply
Просмотров 30 тыс.7 лет назад
How can a hacker take over your computer through JavaScript? Rowhammer is relatively new class of highly potent attacks, abusing only properties of your memory.
CS453 - Derek O - Fuzzing with American Fuzzy Lop
Просмотров 3,5 тыс.7 лет назад
Derek gives a short demo about how to use lcamtuf's AFL to fuzz programs for bugs and vulnerabilities
CS453 - Secure design
Просмотров 3927 лет назад
What principles can we use to design secure software systems? Part of Emory University's CS453 course on computer security taught by Prof. Ymir Vigfusson
CS453 - Web security, part 2/2
Просмотров 3827 лет назад
Second part of web security, covering cross-site scripting (XSS) and cross-site request forgery. Slides based on David Brumley's CMU class. Part of Emory University's CS453 course taught by Prof. Ymir Vigfusson.
Dynamic Performance Profiling of Caches
Просмотров 1767 лет назад
Colloquium presentation at University of Arizona, January 2016. Joint work with Trausti Saemundsson, Hjortur Bjornsson and Gregory Chockler.
CS453 - Format string attack, example attack.
Просмотров 1,4 тыс.7 лет назад
Format string exploitation through an example. Part of Emory University's CS453 taught by Prof. Ymir Vigfusson.
CS453 - Heap overflow example; Format string exploits
Просмотров 1,5 тыс.7 лет назад
Part 2 of 2 of heap exploitation (demo). Format string exploits. Part of Emory University's CS453 taught by Prof. Ymir Vigfusson.
CS453 - Heap overflows
Просмотров 2,3 тыс.7 лет назад
Part 1 of 2 on heap exploitation, specifically about how the malloc() memory works and how it can be hacked. Part of Emory University's CS453 taught by Prof. Ymir Vigfusson.
CS453 - Integer vulnerabilities
Просмотров 5327 лет назад
integer vulnerabilities in C on x86 continued. Part of Emory University's CS453 taught by Prof. Ymir Vigfusson.
CS453 - More return oriented programming; Integer bugs
Просмотров 4187 лет назад
Assembling chains for return oriented programming (ROP). Integer vulnerabilities in C. Part of Emory University's CS453 taught by Prof. Ymir Vigfusson.
CS453 - Return oriented programming (ROP)
Просмотров 1,1 тыс.7 лет назад
CS453 - Return oriented programming (ROP)
CS453 - Nop sleds and returning to libc
Просмотров 2,6 тыс.7 лет назад
CS453 - Nop sleds and returning to libc
CS453 - How to write a shellcode
Просмотров 4 тыс.7 лет назад
CS453 - How to write a shellcode
CS453 - Side channel attacks; demo against Internet Explorer on Windows 7
Просмотров 4097 лет назад
CS453 - Side channel attacks; demo against Internet Explorer on Windows 7
CS453 - Buffer overflows
Просмотров 1,5 тыс.7 лет назад
CS453 - Buffer overflows
CS453 - x86 assembly, part 3/3
Просмотров 8347 лет назад
CS453 - x86 assembly, part 3/3
CS453 - x86 assembly, part 2/3
Просмотров 1,5 тыс.7 лет назад
CS453 - x86 assembly, part 2/3
CS453 - x86 assembly, part 1/3
Просмотров 4,2 тыс.7 лет назад
CS453 - x86 assembly, part 1/3
CS453 - Computer security and exploitation
Просмотров 7 тыс.7 лет назад
CS453 - Computer security and exploitation
CS453 - Web security, part 1/2
Просмотров 8927 лет назад
CS453 - Web security, part 1/2
CS453 - Network Security
Просмотров 5327 лет назад
CS453 - Network Security
CS453 - Wireless Security, part 2
Просмотров 2557 лет назад
CS453 - Wireless Security, part 2
CS453 - Wireless Security, part 1
Просмотров 8717 лет назад
CS453 - Wireless Security, part 1
CS453 - RSA and Randomness
Просмотров 5507 лет назад
CS453 - RSA and Randomness
How to write a great research paper
Просмотров 6147 лет назад
How to write a great research paper