From SBOM to Trusted Software Supply Chain - How Far Are We?

From SBOM to Trusted Software Supply Chain - How Far Are We?

Association for Computing Machinery (ACM) via YouTube Direct link

Intro

1 of 21

1 of 21

Intro

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

From SBOM to Trusted Software Supply Chain - How Far Are We?

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 What is SBOM?
  3. 3 SBOM Ecosystem: Dedicated to Standardizing SBOMs and Building a Data Foundation a Secure Software Supply Chain
  4. 4 Response to the Vulnerability in Log4j: Continuously Enhance Community Governanc Capabilities Centering on Vulnerability Awareness, Locating, and Remediation
  5. 5 Poisoning Attacks Bring Huge Risks to the Software Supply Chain
  6. 6 Challenges in the Trustworthy Software Supply Chain Still Persist
  7. 7 An Overview of Trustworthy Software Supply Chain Solution
  8. 8 Security Vulnerability Disclosure Models
  9. 9 Early Awareness of Security Vulnerabilities is Unavailable
  10. 10 Early Awareness of Critical Vulnerabilities Based on Contrastive Learni
  11. 11 Early Detection Technology for Security Defect Reports (MemVul)
  12. 12 Proactive Vulnerability Discovery by Scanning Similar Vulnerability Features
  13. 13 Correct the Version Information of Software with CVEs
  14. 14 CVE Fixing Patch Identification
  15. 15 Locate Components with CVEs
  16. 16 Package Name Confusion Detection
  17. 17 Community Monitoring and Risk Control Technologies
  18. 18 Early Detection of High-Risk Vulnerabilities
  19. 19 Binary Vulnerability Scanning for Open Source Software
  20. 20 Effective Malicious Code Identification
  21. 21 Next Step: Software Asset Management

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.