Verifying Software for Security Bugs - Dynamic Analysis and Fuzzing Testing

Verifying Software for Security Bugs - Dynamic Analysis and Fuzzing Testing

OWASP Foundation via YouTube Direct link

CURRENT WINDOWS CHECKS

15 of 30

15 of 30

CURRENT WINDOWS CHECKS

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Verifying Software for Security Bugs - Dynamic Analysis and Fuzzing Testing

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 TALK OBJECTIVES
  3. 3 AGENDA
  4. 4 SECURE DEVELOPMENT: VERIFICATION
  5. 5 OPENSAMM
  6. 6 MICROSOFT SDL
  7. 7 IT'S ABOUT SAVING MONEY!
  8. 8 OTHER VERIFICATION TOOLS
  9. 9 1. BINSCOPE
  10. 10 1. CURRENT VERIFICATION TOOLS
  11. 11 1. BINARY INTELLIGENCE
  12. 12 WHY BINSECSWEEPER?
  13. 13 FEATURES
  14. 14 BINSECSWEEPER IN ACTION (I)
  15. 15 CURRENT WINDOWS CHECKS
  16. 16 CURRENT LINUX CHECKS
  17. 17 2. PLUGIN EXAMPLE: TEST PLUGIN
  18. 18 2. PLUGIN EXAMPLE: WINDOWS ASLR
  19. 19 2. PLUGIN EXAMPLE: LINUX FORTIFY_SOURCE
  20. 20 2. REPORTING
  21. 21 2. BINSECSWEEPER: WHAT'S NEXT
  22. 22 2. BINSECSWEEPER: WHERE?
  23. 23 TIME FOR SOME ACTION
  24. 24 CASE STUDY I: VERIFY YOUR OWN SOFTWARE
  25. 25 POSTURE, AMCE INC
  26. 26 CASE STUDY III: BROWSER SECURITY COMPARISON
  27. 27 VERIFYING SOFTWARE SECURITY POSTURE MATTERSI
  28. 28 BINSECSWEEPER: CALL TO ARMS
  29. 29 REFERENCES
  30. 30 Q&A

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.