Главная
Study mode:
on
1
Introduction
2
Overview
3
Two Character Change
4
Doubles
5
System Hangs
6
Technical Horror Story
7
What are vulnerabilities
8
Bug that can be exploited
9
Exploits
10
Who cares
11
Scale of the problem
12
Lots of those
13
Cybercrime
14
Windows
15
Social Engineering
16
Features
17
CVS
18
Search for Java
19
No Details
20
Reporting
21
Assess
22
Dependencies
23
Un untrusted code
24
Plugin
25
untrusted data
26
JPEG buffer overflow
27
No Equifax
28
Heartbleed Poodle
29
Local vectors
30
Wannacry
31
Serialisation
32
Debugging
33
Class loading
34
Class not found
35
Not in the map
36
Error message
37
Example
38
LGTM
39
Findbugs
40
WASP
41
Updating
Description:
Explore the world of Java vulnerabilities in this 49-minute Devoxx conference talk. Delve into the reasons behind Java's reputation for security issues, learn about ongoing efforts to address these concerns, and discover strategies to minimize your own exposure. Gain insights into the reporting, management, and resolution of Java vulnerabilities, as well as specific attack vectors and the definition of a 'vulnerability'. With the rising threat of cybercrime, equip yourself with the knowledge to defend your code through practical examples and code demonstrations. Understand the scale of the problem, including issues related to the Java plugin, server-side vulnerabilities, and the impact on billions of devices worldwide. Learn about various types of exploits, including system hangs, buffer overflows, and serialization vulnerabilities. Explore tools and techniques for identifying and mitigating security risks, such as LGTM, Findbugs, and WASP. By the end of this talk, you'll be better prepared to tackle security issues in Java and enhance your overall cybersecurity practices. Read more

The Anatomy of Java Vulnerabilities

Devoxx
Add to list
0:00 / 0:00