Overview
Syllabus
Introduction
Context
Supply Chain
Edward Reever
Chevy Cobalt
Boeing 787
Lettuce
Old School Vulnerabilities
First Vulnerabilities
Shell Shock Heartbleed
Commons Collection
Log for Shell
China
National Security Agency
New Rise of Open Source
typo squatting attacks
evolution of attacks
attacks on developers
Jenkins
Vercata
Code Cub
Inversion
White Hat Research
Bug Bounties
The attackers are still focused
Global drug trade 2016
VC funds investing in attackers
Theyre looking for the easy way
For the attackers right now
This rise is not a coincidence
Credit card fraud detection
What do we do about it
They were freaking out
Theyre amateurs
Fix Open Source
Takata Airbag
JYear on View
Vulnerability Analysis
Solving 4 of the Problem
The Good News
The Point
You have a supply chain
How to avoid the next malicious release
Factory Deming principles
Security is most important
People are faster and more secure
Conclusion
Taught by
Linux Foundation