Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Cybersecurity
Greening the Economy: Sustainable Cities
Discover Dentistry
Academic Writing
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Optimizing OS fuzzer seed selection through trace distillation, improving code coverage and vulnerability detection in Linux kernel testing.
Explore automated exploit generation for kernel Use-After-Free vulnerabilities using FUZE framework, enhancing security analysis efficiency and exploitability evaluation for complex OS kernels.
Explores QSYM, a fast concolic execution engine for hybrid fuzzing, integrating symbolic emulation with native execution to find bugs in complex software more efficiently than traditional methods.
Explores indirect cache attacks bypassing software-based defenses by exploiting MMU operations, challenging existing security measures and revealing vulnerabilities in cache isolation techniques.
NetHide: A framework for network topology obfuscation that mitigates link-flooding attacks while preserving debugging capabilities. Leverages programmable network devices to modify path tracing probes at line-rate, balancing security and usability.
Reverse engineering tool for Ethereum smart contracts, providing insights into code complexity, reuse, and linking contracts to public source code. Demonstrates applications in high-value wallets, arbitrage bots, and popular games.
Humorous critique of tech industry's approach to security, highlighting flaws in machine learning, AI, and IoT while advocating for ethical computing and thoughtful development.
Evolution of Alibaba's Pangu storage system: embracing SSD and RDMA technologies, reducing I/O latency, and transitioning to performance-oriented storage with innovative designs for improved efficiency and reliability.
Explores wide Locally Recoverable Codes for efficient data storage, introducing novel designs like Uniform Cauchy LRCs that improve reliability and performance in large-scale storage clusters.
Discover how to identify and mitigate hidden vulnerabilities in microservice architectures using OpenTelemetry, with real-world examples from Google Maps' high-risk dependencies.
Explore biases in SRE, their impact on organizations, and strategies for mitigation. Learn to identify, discuss, and address cognitive biases and stereotypes to improve workplace equity and SRE integration.
Explore Lamphone, a novel optical side-channel attack that recovers sound from desk lamp vibrations, enabling passive eavesdropping from a distance with high-quality results.
Novel model inversion attacks on classification models reveal vulnerabilities in ML technologies, potentially leaking sensitive training data. Explores confidence score-based and label-only attacks, demonstrating disparate vulnerability across different…
Explore innovative audio deepfake detection using vocal tract reconstruction. Learn how fluid dynamics and articulatory phonetics can identify impossible anatomical arrangements in synthesized speech.
Explore a novel programming model for intermittent computing on ultra-low-power microcontrollers, enabling efficient multithreaded processing and event handling with minimal progress loss during power failures.
Get personalized course recommendations, track subjects and courses with reminders, and more.