Lecture

Adversarial Reasoning: Threat Modeling and CWEs

Description

This lecture covers the process of threat modeling to identify potential threats and prioritize security mechanisms, as well as the Common Weaknesses Enumeration (CWE) database to help security engineers avoid common software errors. It also discusses specific vulnerabilities like Insecure Interaction Between Components, OS Injection, Cross-site Scripting, and Risky Resource Management.

About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.