YoVDO

Robbery on DevOps - Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms

Offered By: IEEE via YouTube

Tags

IEEE Symposium on Security and Privacy Courses Cybersecurity Courses DevOps Courses

Course Description

Overview

Explore a 14-minute IEEE conference talk that delves into the world of illicit cryptomining on Continuous Integration (CI) service platforms. Learn about the research conducted by a team of experts from Huazhong University of Science and Technology and Indiana University Bloomington on this emerging cybersecurity threat. Discover how attackers exploit CI platforms for unauthorized cryptocurrency mining, understand the implications for DevOps environments, and gain insights into potential mitigation strategies. Examine the intersection of cybersecurity, cloud computing, and blockchain technology in this comprehensive analysis of a growing concern in the software development ecosystem.

Syllabus

Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms


Taught by

IEEE Symposium on Security and Privacy

Tags

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network