YoVDO

Robbery on DevOps - Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms

Offered By: IEEE via YouTube

Tags

IEEE Symposium on Security and Privacy Courses Cybersecurity Courses DevOps Courses

Course Description

Overview

Explore a 14-minute IEEE conference talk that delves into the world of illicit cryptomining on Continuous Integration (CI) service platforms. Learn about the research conducted by a team of experts from Huazhong University of Science and Technology and Indiana University Bloomington on this emerging cybersecurity threat. Discover how attackers exploit CI platforms for unauthorized cryptocurrency mining, understand the implications for DevOps environments, and gain insights into potential mitigation strategies. Examine the intersection of cybersecurity, cloud computing, and blockchain technology in this comprehensive analysis of a growing concern in the software development ecosystem.

Syllabus

Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms


Taught by

IEEE Symposium on Security and Privacy

Tags

Related Courses

Sensor Security
IEEE via YouTube
Tracking Ransomware End-to-end
IEEE via YouTube
Cinderella - Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation
IEEE via YouTube
Algorithmic Transparency via Quantitative Input Influence - Theory and Experiments with Learning Systems
IEEE via YouTube
Bitcoin Over Tor Isn't a Good Idea
IEEE via YouTube