Secure Password Storage with Insecure Side Effects
11
Developers Come to the Rescue
12
Production Web Farm Using Session DB
13
One-Time Passwords in Parallel Universes
14
Multi-factor Authentication for Remote Access
15
Side-effect of Load Balancing Servers
16
Secure Connection or Open Door?
17
Attacking the System
18
Attack the Datacentre
19
What is an Asset?
20
Gaming: Is Userld an Asset?
21
How Can Bob Climb the Leaderboard?
22
Summary
Description:
Explore real-world threat modeling scenarios and learn from practical experiences in this conference talk. Delve into the fundamentals of threat modeling, design flaws, and security controls. Examine case studies on integration challenges, step-up authentication vulnerabilities, and password storage issues. Discover how developers address security concerns and analyze the implications of production web farms using session databases. Investigate one-time password implementations, multi-factor authentication for remote access, and load balancing server side-effects. Assess secure connection vulnerabilities and potential attack vectors on systems and datacenters. Evaluate asset identification in gaming contexts and strategies for exploiting leaderboard systems. Gain valuable insights to enhance your threat modeling skills and improve overall security practices.
Threat Modeling Stories from the Trenches - Security Design Flaws and Solutions