YoVDO

What Makes Software Exploitation Hard?

Offered By: USENIX Enigma Conference via YouTube

Tags

USENIX Enigma Conference Courses Cybersecurity Courses Software Security Courses Vulnerability Analysis Courses

Course Description

Overview

Explore a 22-minute conference talk from USENIX Enigma 2016 featuring Ben Hawkes, a founding member and manager of Google's Project Zero security research team. Delve into the mission of making zero-day vulnerabilities harder to exploit and discover the technologies and trends that have made vulnerability discovery and exploitation more challenging. Learn about Project Zero's approach to using attack research for improving software and designing new defenses. Gain insights from Hawkes' extensive experience in discovering serious vulnerabilities across various software platforms and his expertise in vulnerability analysis and software exploitation techniques. Understand the importance of virtualization and sandboxing in enhancing software security.

Syllabus

USENIX Enigma 2016 - What Makes Software Exploitation Hard?


Taught by

USENIX Enigma Conference

Related Courses

Pattern-Oriented Software Architectures: Programming Mobile Services for Android Handheld Systems
Vanderbilt University via Coursera
Engineering Maintainable Android Apps
Vanderbilt University via Coursera
Software Design as an Element of the Software Development Lifecycle
University of Colorado System via Coursera
Secure Software Development
Pluralsight
Secure Software Concepts for CSSLPĀ®
Pluralsight