Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Algorithms and Data Structures
Stanford Introduction to Food and Health
Gamification
Learn to Program: The Fundamentals
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Innovative approach to finding bugs in scripting languages through cooperative mutation, combining script code and native input modifications to uncover hidden vulnerabilities in binding code.
Explore SafetyNet's internal mechanisms, VM design, and security checks for detecting Magisk, emulators, rooted devices, and Pegasus in this comprehensive analysis of DroidGuard.
Uncover vulnerabilities in Android's ION driver, explore root causes, and learn how to achieve privilege escalation. Gain insights into preventing similar security issues in the Android ecosystem.
Explore non-intrusive techniques for identifying and patching vulnerabilities in Industrial Control Systems, focusing on specialized requirements of devices like PLCs.
Explore an optical side-channel attack that recovers sound from reflective objects in home offices, revealing potential vulnerabilities in remote work environments.
Explore Linux kernel attack methods, focusing on gadgets and CFI mitigation. Learn about innovative techniques to overcome limitations and enhance kernel exploitation strategies.
Explore techniques for discovering remote code execution vulnerabilities in embedded TLS libraries, with insights on improving security in IoT and embedded systems.
Explore Unix domain socket vulnerabilities in Android, revealing potential privilege escalation risks and security implications for third-party applications and vendor implementations.
Explore cloud computing security with in-process isolation techniques, addressing vulnerabilities in shared hardware resources while maintaining high performance.
Explores firmware supply chain vulnerabilities, outsourcing risks, and security gaps in hardware products. Discusses challenges in fixing known issues and proposes solutions for improved threat modeling and security.
Uncover hidden vulnerabilities in Android OS libraries that process incoming files, potentially leading to remote code execution attacks on various system applications.
Dissecting APT attacks on online entertainment companies, revealing espionage motives beyond financial gain. Analyzes 20+ operations since 2018, exposing tactics and implications for data-rich targets.
Explore techniques for automatically bypassing and inspecting web application firewalls, examining vulnerabilities in WAF-as-a-service solutions and cloud security services.
Explore security vulnerabilities in QEMU/KVM hypervisors caused by recursive MMIO handling, uncovering a new attack surface with potential for critical exploits in cloud computing environments.
Vulnerability in Samsung Android allows zero-permission apps to execute arbitrary activities as system user, compromising device security across multiple Android versions.
Get personalized course recommendations, track subjects and courses with reminders, and more.