Synthetic Data Generation and Defense in Depth Measurement of Web Applications

In this webcast, the presenter will explain quickly cover architecture and system overviews, then dive into exploitation scenarios with techniques to attack Harvard architecture systems and code security implementations. End state results include pathways to gain coveted binary images of firmware and resident code execution.

Provided by: SecurityTube.net Topic: Hardware Date Added: Dec 2014 Format: Webcast

Find By Topic