Rating is available when the video has been rented.
This feature is not available right now. Please try again later.
Uploaded on Jan 19, 2012
Building a secure system is an important but challenging task. System builders, who have traditionally focused on performance, power, and cost, must today be equally concerned with hardening their system against the myriad of hardware and software vulnerabilities that lead to exploits. In this short tutorial, we will first examine a wide variety of hardware and software exploits that exist today.