YoVDO

Beyond Signatures - Using TUF and Notary to Secure Software Distribution

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Conference Talks Courses Threat Identification Courses Notary Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the critical aspects of secure software distribution in this conference talk. Delve into The Update Framework (TUF) and its application in protecting against attacks on software distribution and updates. Discover how TUF can enhance security for registries and learn about its adaptation for use with the Notary v2 project. Examine the threat model, cryptographic signatures, and their limitations. Gain insights into TUF attacks, principles, and features such as explicit and implicit relocation and offline keys. Understand the importance of securing the system and explore new features in this comprehensive overview of TUF and Notary for software distribution security.

Syllabus

Intro
Why do we care
What are we doing
Threat model
Cryptographic signatures
The downside of cryptographic signatures
Summary of attacks
TUF attacks
TUF principles
Explicit and implicit relocation
Offline keys
Securing the system
New features
Learn more


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube