YoVDO

Robbery on DevOps - Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms

Offered By: IEEE via YouTube

Tags

IEEE Symposium on Security and Privacy Courses Cybersecurity Courses DevOps Courses

Course Description

Overview

Explore a 14-minute IEEE conference talk that delves into the world of illicit cryptomining on Continuous Integration (CI) service platforms. Learn about the research conducted by a team of experts from Huazhong University of Science and Technology and Indiana University Bloomington on this emerging cybersecurity threat. Discover how attackers exploit CI platforms for unauthorized cryptocurrency mining, understand the implications for DevOps environments, and gain insights into potential mitigation strategies. Examine the intersection of cybersecurity, cloud computing, and blockchain technology in this comprehensive analysis of a growing concern in the software development ecosystem.

Syllabus

Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms


Taught by

IEEE Symposium on Security and Privacy

Tags

Related Courses

Startup Engineering
Stanford University via Coursera
Developing Scalable Apps in Java
Google via Udacity
Cloud Computing Concepts, Part 1
University of Illinois at Urbana-Champaign via Coursera
Cloud Networking
University of Illinois at Urbana-Champaign via Coursera
Cloud Computing Concepts: Part 2
University of Illinois at Urbana-Champaign via Coursera