Epidemiology of Software Vulnerabilities: A Study of Attack Surface Spread

Many developers today are turning to well established third-party libraries to speed the development process and realize quality improvements over creating an in-house proprietary font parsing or image rendering library from the ground up. Efficiency comes at a cost though: a single application may have as many as 100 different third party libraries implemented.

Provided by: SecurityTube.net Topic: Software Date Added: Nov 2014 Format: Webcast

Find By Topic