Please enable JavaScript.
Coggle requires JavaScript to display documents.
MITOCW 6.858 - Computer systems security (Introduction, threat models,…
MITOCW 6.858 - Computer systems security
Introduction, threat models
Control hijacking attacks
Buffer overflow exploits and defenses
Privilege separation
Capabilities
Sandboxing native code
Web security model
Securing web applications
Symbolic execution
Ur/Web
Network security
Network protocols
SSL and HTTPS
Medical software
Side-channel attacks
User authentication
Private browsing
Anonymous communication
Mobile phone security
Data tracking
Guest lecture by MIT IS&T
Security economics