Главная
Study mode:
on
1
Intro
2
Platform Requirements
3
Platform Design
4
Trusty Code Scanning Framework (TCSF)
5
Example Scanning Bots
6
Trusty Jenkins
7
Trusty Code Scanning: Example Issues
8
Using ELK for Database and Dashboards
9
Future Work
10
Conclusion
Description:
Explore a conference talk that unveils an innovative platform for automated code scanning and vulnerability detection. Discover how developers can receive crucial vulnerability data as effortlessly as streaming their favorite TV shows. Delve into the platform's requirements, design, and key components, including the Trusty Code Scanning Framework (TCSF) and various scanning bots. Learn about the integration with Jenkins and the use of ELK for database management and dashboards. Gain insights into example scanning issues and future developments in this cutting-edge approach to code security.

Got Popcorn? What's on the Vuln Channel Tonight?

Security BSides San Francisco
Add to list
0:00 / 0:00