The Magnetic Pull of Mutable Protection: Worked Examples in Cryptographic Agility

  Рет қаралды 802

Black Hat

Black Hat

2 ай бұрын

...How do you go about fully understanding what cryptography you have, how it is used and if it's good or bad? This was the question we started to ask ourselves and set about trying to answer using static analysis tools such as GitHub's CodeQL.
Given how we all rely heavily on open-source projects, we set about scanning the top 1000 GitHub open-source projects to identify insecure cryptographic algorithms. We used GitHub's CodeQL multi-repository variant analysis to build a cryptographic bill of materials (CBOM) for each project. The CBOM will list all of the cryptographic algorithms that are used in the project, as well as their security status, and more importantly, help us identify all of the places where insecure cryptographic algorithms are used in the projects....
By: Mark Carney , Daniel Cuthbert , Niroshan Rajadurai , Benjamin Rodes
Full Abstract and Presentation Materials:
www.blackhat.com/eu-23/briefi...

Пікірлер
Kerberos Authentication Explained | A deep dive
16:52
Destination Certification
Рет қаралды 324 М.
La final estuvo difícil
00:34
Juan De Dios Pantoja
Рет қаралды 29 МЛН
I Need Your Help..
00:33
Stokes Twins
Рет қаралды 146 МЛН
КАРМАНЧИК 2 СЕЗОН 5 СЕРИЯ
27:21
Inter Production
Рет қаралды 594 М.
Motion Change Animated WELCOME  Slide Design In PowerPoint
3:43
Knowledge for Future
Рет қаралды 621 М.
Fix Waiting to sync Xiaomi Cloud Data View Problem Solve
1:17
Techno Vaibhav 1
Рет қаралды 11 М.
BLACK HAT IS BACK !
0:31
Black Hat MEA
Рет қаралды 1,5 М.
2014 Three Minute Thesis winning presentation by Emily Johnston
3:19
University of South Australia
Рет қаралды 5 МЛН
Wireshark Tutorial for BEGINNERS // Where to start with Wireshark
16:14
The Black Hat Europe Network Operations Center (NOC) Report
38:03
What is RabbitMQ?
10:10
IBM Technology
Рет қаралды 304 М.
La final estuvo difícil
00:34
Juan De Dios Pantoja
Рет қаралды 29 МЛН