2012-02-22 CERIAS - Vulnerability Path and Assessment
CERIAS Security: The dark side of software engineering and how to defend against it 1/5
Industrial Cyber Security: Creating a Secure Process Control Environment by Properly Managing Risk
CERIAS Security: The dark side of software engineering and how to defend against it 2/5
#HITB2013AMS D1T2 Tal Zeltzer - Analysis to Remote Root 0day in a SSL-VPN Appliance
National Interoperability Field Operations Guide Overview
Pentagon grounds F-35 fleet over engine issues
RVAsec 2013: Jericho -- Our Straw House: Vulnerabilities
How I met your pointer (Hijacking client software for fuzz and profit)
2004-10-13 - Information Flow Analysis in Security Enhanced Linux - CERIAS Security Seminar
Secunia ResearchCast Q2-2012: 0-days, Interesting Vulnerabilities, Prizes, and More!
2005-03-30 - Vulnerability-Driven Network Filters for Preventing Known Vulnerability Attacks
Vulcan Cyber - Automating Vulnerability Remediation
OWASP AppSec EU 2013: A Doorman for Your Home - Control-Flow Integrity Means in Web Frameworks
plamahs 1.5 changing data path.avi
Purdue Engineering Faculty Colloquium: Dr. David F. Radcliffe
Software Assurance Trustworthiness and Rigor
Dan Shoemaker - Assurance Case.mp4
Tech Talk Tutorial: Using the InfoSphere Guardium Vulnerability Assessment Query-based Test Builder
SCAP for Everyone: A case study in transforming configurations