This resource is no longer available

Protecting Your Applications from Backdoors: How Static Binary Analysis Helps Build High-Assurance Applications

Cover

Backdoors and malicious code pose significant operational risk to software that is too significant for organizations to ignore. Given the complexity of modern application development and the common practice of outsourcing and increased use of 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security level of the software running their business-critical applications and handling their customer’s personally identifiable information. As a result, backdoors and malicious code insertion are expected to become a prevalent attack vector against the enterprise. Because the binary (compiled code) represents the actual attack surface for the hacker, testing binary code is the ideal time and place to conduct the most complete and final independent security test, validation, and verification. Read this white paper to learn more about securing applications from backdoor vulnerabilities with static binary analysis.

Vendor:
Veracode, Inc.
Posted:
10 May 2010
Published
10 May 2010
Format:
PDF
Length:
10 Page(s)
Type:
White Paper
Language:
English

This resource is no longer available.