Large-Scale Software Composition Analysis: Uncovering Vulnerable Dependencies in 600 Apps

Large-Scale Software Composition Analysis: Uncovering Vulnerable Dependencies in 600 Apps

OWASP Foundation via YouTube Direct link

People, Process Technology

4 of 13

4 of 13

People, Process Technology

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Large-Scale Software Composition Analysis: Uncovering Vulnerable Dependencies in 600 Apps

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Possible Challenges with Outsourced App Development
  3. 3 Considerations for Centralized Vulnerability Management Tools
  4. 4 People, Process Technology
  5. 5 Evaluation of SCA Tools
  6. 6 SCA Tool Success Factors
  7. 7 SCA Tool Operational Architecture (3rd iteration)
  8. 8 SCA Tool Operational Architecture (4th iteration, WIP)
  9. 9 SCA Tool Evaluation Comparison (Revised)
  10. 10 False Positive from overly broad NVD CPE
  11. 11 Suppression Method
  12. 12 Scanning base products
  13. 13 Vendor's Challenge of non-exploitability

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.