YoVDO

Supply Chain Anarchy - Trojaned Binaries in the Java Ecosystem

Offered By: OWASP Foundation via YouTube

Tags

Software Composition Analysis Courses Supply Chain Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the critical issue of supply chain security in the Java ecosystem through this conference talk from AppSecUSA 2017. Delve into the potential risks of trojaned binaries in open-source components, which make up 80% of modern software applications. Learn about an automated security pipeline created to detect malicious discrepancies between source code and binaries in Java libraries. Understand the importance of source-to-binary traceability and the challenges of identifying intentionally introduced vulnerabilities. Gain insights from Jeff Williams, CTO of Contrast Security, on the need for vigilance in trusting third-party code and the potential consequences of compromised popular components like Log4j or Apache Commons.

Syllabus

Supply Chain Anarchy - Trojaned Binaries in the Java Ecosystem - AppSecUSA 2017


Taught by

OWASP Foundation

Related Courses

Cyber Security in Manufacturing
University at Buffalo via Coursera
Supply Chain and Operations Management Tips
LinkedIn Learning
Kubernetes Security: Implementing Supply Chain Security
Pluralsight
Implement Cybersecurity Best Practices in Your Organization
Salesforce via Trailhead
ISC2 Certified Secure Software Life-Cycle Professional (CSSLP)
Cybrary