Главная
Study mode:
on
1
Introduction
2
Agenda
3
What is Threat Modeling
4
Why should we do Threat Modeling
5
Threat Modeling 101
6
Threat Modeling in the Beginning
7
Advanced Threat Modeling
8
Known vs unknown vulnerabilities
9
Setting clear objectives
10
Understanding how the application works
11
What can go wrong
12
CWE
13
OSS Top 10
14
Stride
15
Verification
16
Supply Chain Attacks
17
What is Supply Chain Attack
18
Outdated Libraries
19
You are not the target
20
OpenSSL
21
Informationally
22
Legacy code
23
Automatic tools
24
Mitigation
25
Problems with security products
26
Summary
Description:
Explore the art of identifying attack surfaces and securing open source code through threat modeling in this 37-minute conference talk by Aviv Sasson and Daniel Prizmant from Palo Alto Networks. Discover the importance and benefits of threat modeling for open source projects, and learn how attackers utilize this technique to find vulnerabilities. Dive into the technicalities of the threat modeling process, including setting clear objectives, understanding application functionality, and identifying potential vulnerabilities using frameworks like CWE and STRIDE. Gain insights from real-world examples of vulnerabilities found in major open source projects, and understand the challenges of supply chain attacks, outdated libraries, and legacy code. Learn about mitigation strategies and the limitations of security products while acquiring practical knowledge to enhance the security of open source software.

Securing Open Source Through Threat Modeling

Linux Foundation
Add to list
0:00 / 0:00