A Case Study of Software Security Red Teams at Microsoft

Justin Smith
Justin Smith
Christopher Theisen
Christopher Theisen

2020 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC), pp. 1-10, 2020.

Cited by: 0|Bibtex|Views1|Links
EI WOS

Abstract:

The modern software security adversary employs persistent and evasive attack techniques, for example—using zero-day exploits that have not been disclosed publicly—to target high-profile companies for political and economic espionage or to exfiltrate sensitive data or intellectual property. To combat these threats, large organizations are ...More

Code:

Data:

Your rating :
0

 

Tags
Comments