Security Engineering Lecture 12: Ecosystems Security

preview_player
Показать описание
Sam discusses supply-chain attacks including Operation Gunman, or how there are many points of failure in the security model of modern devices. He looks at the emergent security properties and design philosophies of mobile phones, desktops and cloud environments from a variety of perspectives, including incentives, then moves on to discuss the supply chains of codes and vulnerability markets, and then the technical mechanisms behind accessory control or "razor and blades" models.
Рекомендации по теме