Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

C++Now 2019: Matthew Butler “Secure Coding Best Practices - Threat Hunting”

Автор: CppNow

Загружено: 2019-06-19

Просмотров: 1833

Описание:

http://cppnow.org
—
Presentation Slides, PDFs, Source Code and other presenter materials are available at: http://cppnow.org/history/2019/talks/
—
C++ is a notoriously difficult language to master and Modern C++ is not far behind it. The language itself is powerful and flexible but does little to protect us from using it incorrectly and the closer a vulnerability is to an attack surface, the more easily it can be exploited. But how do you know where your attack surfaces are?

Threat Modeling is the foundation of everything else we do when securing our code. It tells us where the attack surfaces are, what possible attack vectors there are, where we aren't verifying who we're communicating with, where we're holding data and more importantly where we're holding data we don't use. Threat modeling forces us to analyze our designs & code by focusing our thinking to that of an attacker. Without it we have little to go on when looking for areas of vulnerability.

In this talk, we'll begin by looking at Intrusion Kill Chains, a simple but effective way to describe the process that attackers use to penetrate systems. We'll look at one of the most famous and successful attacks in cyber history through the lens of a kill chain.

Using this knowledge we'll then do a hands-on Threat Modeling exercise against an everyday system designed in Modern C++ using the STRIDE approach (and discuss others as we go). We'll look at:

how Spoofing can be used to gain unauthorized access to data within our system,
how Tampering is used to affect system behavior and how to protect against it,
how Repudiation is used to ensure that all systems behavior is verified,
how Information leaks give an attacker vital information on how to attack our systems,
how to defend against Denial of service attacks, and
how privilege Escalation attacks give attackers access to more than just our systems.


We'll also discuss how we have come to live in a Zero Trust world and how that affects systems design. We'll see how Threat modeling allow us to:

expose attack surfaces,
uncover architectural flaws early,
identify attack vectors,
balance risks and usability, and
document mitigation strategies.


Modern C++ is a powerful, flexible language, but it's not safe for those who have not truly mastered it. And as systems complexity increases, those knowledge gaps leave openings for attackers. Threat Modeling is the first step in sealing those gaps.
—
Matthew Butler
mbutler@laurellye.com
Matthew Butler has spent the last three decades as a systems architect and software engineer developing systems for network security, law enforcement and the military. He primarily works in signals intelligence using C, C++ and Modern C++ to build systems running on hardware platforms ranging from embedded micro-controllers to FPGAs to large-scale airborne platforms. Much of his experience has come in either building systems that defend against attackers or building highly sensitive systems that are targets. He is actively involved in the C++ community and is on various planning committees for C++Now and CppCon as well as being a speaker at both. He is also a member of the ISO C++ Standards Committee.

Over the past thirty years, he has learned the harsh lessons on how we often write systems that fail, not because they don't scale, but because they aren't designed to be secure.
—
Videos Filmed & Edited by Bash Films: http://www.BashFilms.com
---

*--*

---

C++Now 2019: Matthew Butler “Secure Coding Best Practices - Threat Hunting”

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

Рабочая музыка для глубокой концентрации и сверхэффективности

Рабочая музыка для глубокой концентрации и сверхэффективности

C++Now 2019: Alisdair Meredith “C++20 in Breadth”

C++Now 2019: Alisdair Meredith “C++20 in Breadth”

Понимание Active Directory и групповой политики

Понимание Active Directory и групповой политики

Keynote: Safety and Security: The Future of C and C++ - Robert Seacord. - NDC TechTown 2023

Keynote: Safety and Security: The Future of C and C++ - Robert Seacord. - NDC TechTown 2023

Chillout Lounge Radio - 24/7 Live | Smooth Background Music | Focus, Study, Work, Sleep, Meditation

Chillout Lounge Radio - 24/7 Live | Smooth Background Music | Focus, Study, Work, Sleep, Meditation

Workshop Preview: Secure Coding in C and C++ - Robert C. Seacord - ACCU 2025

Workshop Preview: Secure Coding in C and C++ - Robert C. Seacord - ACCU 2025

System Design Concepts Course and Interview Prep

System Design Concepts Course and Interview Prep

Memory Safety: Rust vs. C - Robert Seacord - NDC TechTown 2024

Memory Safety: Rust vs. C - Robert Seacord - NDC TechTown 2024

Чем ОПАСЕН МАХ? Разбор приложения специалистом по кибер безопасности

Чем ОПАСЕН МАХ? Разбор приложения специалистом по кибер безопасности

КАК УСТРОЕН TCP/IP?

КАК УСТРОЕН TCP/IP?

Я в опасности

Я в опасности

Кадыров пытается демонстрировать силу. Кирилл Мартынов

Кадыров пытается демонстрировать силу. Кирилл Мартынов

Лучшая музыка 2025 года 🏖️Зарубежные песни Хиты 🏖️Популярные песни Слушать бесплатно 2024 #280

Лучшая музыка 2025 года 🏖️Зарубежные песни Хиты 🏖️Популярные песни Слушать бесплатно 2024 #280

Если у тебя спросили «Как твои дела?» — НЕ ГОВОРИ! Ты теряешь свою силу | Еврейская мудрость

Если у тебя спросили «Как твои дела?» — НЕ ГОВОРИ! Ты теряешь свою силу | Еврейская мудрость

The Man Behind Google's AI Machine | Demis Hassabis Interview

The Man Behind Google's AI Machine | Demis Hassabis Interview

EP 035 - Secure Coding In C And C++ With Robert C. Seacord

EP 035 - Secure Coding In C And C++ With Robert C. Seacord

LLM и GPT - как работают большие языковые модели? Визуальное введение в трансформеры

LLM и GPT - как работают большие языковые модели? Визуальное введение в трансформеры

Music for Work — Limitless Productivity Radio

Music for Work — Limitless Productivity Radio

Secure Programming Practices in C++ - Patricia Aas

Secure Programming Practices in C++ - Patricia Aas

Secure Programming Practices in C++ - NDC Security 2018

Secure Programming Practices in C++ - NDC Security 2018

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: infodtube@gmail.com