A Case Study of Software Security Red Teams at Microsoft
2020 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC), pp. 1-10, 2020.
The modern software security adversary employs persistent and evasive attack techniques, for example—using zero-day exploits that have not been disclosed publicly—to target high-profile companies for political and economic espionage or to exfiltrate sensitive data or intellectual property. To combat these threats, large organizations are ...More
Full Text (Upload PDF)
PPT (Upload PPT)