Главная
Study mode:
on
1
Intro
2
Steves background
3
Double pals
4
Floating numbers
5
Missing error code
6
Deserialization
7
Exploit
8
Vulnerabilities
9
CVA
10
Assessment
11
Assess
12
Attack vectors
13
Un untrusted code
14
Cryptography
15
Social engineering
16
How to trust
17
Why should you care
18
Drug trade vs cybercrime
19
Finding a server with a vulnerability
20
The tools
21
Its getting worse
22
What else can you do
23
Summary
Description:
Explore the world of Java vulnerabilities in this 56-minute Devoxx conference talk. Delve into the reasons behind Java's reputation for security issues, both in client-side plugins and server-side applications. Learn about the reporting, management, and fixing of vulnerabilities, as well as specific attack vectors and their definitions. Discover how to defend your code against the rising tide of cybercrime through practical examples and code demonstrations. Gain insights into topics such as deserialization exploits, cryptography, social engineering, and the tools used by cybercriminals. Understand the importance of addressing security concerns in Java development and acquire strategies to reduce your exposure to potential threats.

The Anatomy of Java Vulnerabilities

Devoxx
Add to list
0:00 / 0:00