Completed
CASE STUDY I: VERIFY YOUR OWN SOFTWARE
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Verifying Software for Security Bugs - Dynamic Analysis and Fuzzing Testing
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 TALK OBJECTIVES
- 3 AGENDA
- 4 SECURE DEVELOPMENT: VERIFICATION
- 5 OPENSAMM
- 6 MICROSOFT SDL
- 7 IT'S ABOUT SAVING MONEY!
- 8 OTHER VERIFICATION TOOLS
- 9 1. BINSCOPE
- 10 1. CURRENT VERIFICATION TOOLS
- 11 1. BINARY INTELLIGENCE
- 12 WHY BINSECSWEEPER?
- 13 FEATURES
- 14 BINSECSWEEPER IN ACTION (I)
- 15 CURRENT WINDOWS CHECKS
- 16 CURRENT LINUX CHECKS
- 17 2. PLUGIN EXAMPLE: TEST PLUGIN
- 18 2. PLUGIN EXAMPLE: WINDOWS ASLR
- 19 2. PLUGIN EXAMPLE: LINUX FORTIFY_SOURCE
- 20 2. REPORTING
- 21 2. BINSECSWEEPER: WHAT'S NEXT
- 22 2. BINSECSWEEPER: WHERE?
- 23 TIME FOR SOME ACTION
- 24 CASE STUDY I: VERIFY YOUR OWN SOFTWARE
- 25 POSTURE, AMCE INC
- 26 CASE STUDY III: BROWSER SECURITY COMPARISON
- 27 VERIFYING SOFTWARE SECURITY POSTURE MATTERSI
- 28 BINSECSWEEPER: CALL TO ARMS
- 29 REFERENCES
- 30 Q&A