Completed
Next Step: Software Asset Management
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
From SBOM to Trusted Software Supply Chain - How Far Are We?
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 What is SBOM?
- 3 SBOM Ecosystem: Dedicated to Standardizing SBOMs and Building a Data Foundation a Secure Software Supply Chain
- 4 Response to the Vulnerability in Log4j: Continuously Enhance Community Governanc Capabilities Centering on Vulnerability Awareness, Locating, and Remediation
- 5 Poisoning Attacks Bring Huge Risks to the Software Supply Chain
- 6 Challenges in the Trustworthy Software Supply Chain Still Persist
- 7 An Overview of Trustworthy Software Supply Chain Solution
- 8 Security Vulnerability Disclosure Models
- 9 Early Awareness of Security Vulnerabilities is Unavailable
- 10 Early Awareness of Critical Vulnerabilities Based on Contrastive Learni
- 11 Early Detection Technology for Security Defect Reports (MemVul)
- 12 Proactive Vulnerability Discovery by Scanning Similar Vulnerability Features
- 13 Correct the Version Information of Software with CVEs
- 14 CVE Fixing Patch Identification
- 15 Locate Components with CVEs
- 16 Package Name Confusion Detection
- 17 Community Monitoring and Risk Control Technologies
- 18 Early Detection of High-Risk Vulnerabilities
- 19 Binary Vulnerability Scanning for Open Source Software
- 20 Effective Malicious Code Identification
- 21 Next Step: Software Asset Management