Overview
Syllabus
Intro
TALK OBJECTIVES
AGENDA
SECURE DEVELOPMENT: VERIFICATION
OPENSAMM
MICROSOFT SDL
IT'S ABOUT SAVING MONEY!
OTHER VERIFICATION TOOLS
1. BINSCOPE
1. CURRENT VERIFICATION TOOLS
1. BINARY INTELLIGENCE
WHY BINSECSWEEPER?
FEATURES
BINSECSWEEPER IN ACTION (I)
CURRENT WINDOWS CHECKS
CURRENT LINUX CHECKS
2. PLUGIN EXAMPLE: TEST PLUGIN
2. PLUGIN EXAMPLE: WINDOWS ASLR
2. PLUGIN EXAMPLE: LINUX FORTIFY_SOURCE
2. REPORTING
2. BINSECSWEEPER: WHAT'S NEXT
2. BINSECSWEEPER: WHERE?
TIME FOR SOME ACTION
CASE STUDY I: VERIFY YOUR OWN SOFTWARE
POSTURE, AMCE INC
CASE STUDY III: BROWSER SECURITY COMPARISON
VERIFYING SOFTWARE SECURITY POSTURE MATTERSI
BINSECSWEEPER: CALL TO ARMS
REFERENCES
Q&A
Taught by
OWASP Foundation