Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Large-Scale Software Composition Analysis: Uncovering Vulnerable Dependencies in 600 Apps

OWASP Foundation via YouTube

Overview

Explore a comprehensive conference talk detailing the successful implementation of a large-scale Software Composition Analysis (SCA) exercise on hundreds of third-party vendor-managed applications in just two months. Learn how the Government Technology Agency Singapore utilized OWASP Dependency-Check to address risks from software supply chain attacks and tackle patch debt from emerging libraries. Discover insights on process design, automation, monitoring, and vendor interaction. Delve into topics such as challenges with outsourced app development, considerations for centralized vulnerability management tools, evaluation of SCA tools, operational architecture iterations, and methods for handling false positives. Gain valuable knowledge on suppression techniques, scanning base products, and addressing vendors' challenges of non-exploitability in this informative 51-minute presentation by Frank Liauw, Senior Red Team Engineer and AppSec Team Lead.

Syllabus

Intro
Possible Challenges with Outsourced App Development
Considerations for Centralized Vulnerability Management Tools
People, Process Technology
Evaluation of SCA Tools
SCA Tool Success Factors
SCA Tool Operational Architecture (3rd iteration)
SCA Tool Operational Architecture (4th iteration, WIP)
SCA Tool Evaluation Comparison (Revised)
False Positive from overly broad NVD CPE
Suppression Method
Scanning base products
Vendor's Challenge of non-exploitability

Taught by

OWASP Foundation

Reviews

Start your review of Large-Scale Software Composition Analysis: Uncovering Vulnerable Dependencies in 600 Apps

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.