Archive
Results
Showing: 1 to 3 of 3Affiliation shown is the affiliation at the time the talk was given.
02/22/2017
![A2C: Self Destructing Exploit Executions via Input Perturbation](/assets/video/secsem/images/secsem_20170222_full.jpg)
A2C: Self Destructing Exploit Executions via Input Perturbation
Yonghwi Kwon - Purdue University
09/09/2015
![P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions](/assets/video/secsem/images/secsem_20150909_full.jpg)
P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions
Yonghwi Kwon - Purdue University
10/21/2009
![Information Security Management and IT Executives in a Top Management Team](/assets/video/secsem/images/secsem_20091021_full.jpg)
Information Security Management and IT Executives in a Top Management Team
Juhee Kwon - Purdue University
Ways to Watch
![YouTube](/assets/images/youtube_200.png)