Java Every-Days - Exploiting Software Running on 3 Billion Devices

Java Every-Days - Exploiting Software Running on 3 Billion Devices

Black Hat via YouTube Direct link

Introduction

3 of 28

3 of 28

Introduction

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Java Every-Days - Exploiting Software Running on 3 Billion Devices

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Solution
  3. 3 Introduction
  4. 4 Vulnerability Sample Set
  5. 5 Oracle Java's Footprint and Software Architecture
  6. 6 Vulnerability Trending and Attack Surface
  7. 7 Vulnerability Statistics 2011-2013
  8. 8 Oracle Java Patch Statistics
  9. 9 Zero Day Initiative Submission Trends
  10. 10 Insight into Vulnerability Classes (CWE)
  11. 11 CWE-265 Breakdown and Historical Timeline
  12. 12 Styles of Memory Corruption
  13. 13 Top 7 Vulnerability Classes in the Java
  14. 14 Extrapolating Sub-component Weaknesses
  15. 15 Java Sub-component Weaknesses
  16. 16 Library Sub-component Weaknesses
  17. 17 2D Sub-component Weaknesses
  18. 18 JavaFX Sub-component Weaknesses
  19. 19 Leveraging Sub-component Weaknesses
  20. 20 Threat Landscape
  21. 21 Vulnerability Prevalence in Toolkits
  22. 22 Exploitation Techniques
  23. 23 Case Study
  24. 24 Vendor Response Review
  25. 25 Handling Vulnerability Disclosure
  26. 26 Package Restriction List Modifications
  27. 27 Oracle Weathered Quite The Storm
  28. 28 Good Luck Bug Hunting!

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.