Protecting Your Applications from Backdoors: How Static Binary Analysis Helps Build High-Assurance Applications
sponsored by Veracode, Inc.

Backdoors and malicious code pose significant operational risk to software that is too significant for organizations to ignore. Given the complexity of modern application development and the common practice of outsourcing and increased use of 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security level of the software running their business-critical applications and handling their customer’s personally identifiable information. As a result, backdoors and malicious code insertion are expected to become a prevalent attack vector against the enterprise. Because the binary (compiled code) represents the actual attack surface for the hacker, testing binary code is the ideal time and place to conduct the most complete and final independent security test, validation, and verification. Read this white paper to learn more about securing applications from backdoor vulnerabilities with static binary analysis.

(THIS RESOURCE IS NO LONGER AVAILABLE.)
 
Available Resources from Veracode, Inc.
See what other users are reading via our Daily Top 50 Report
.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement