MIT Sloan AI Adoption: Build a Playbook That Drives Real Business ROI
Python, Prompt Engineering, Data Science — Build the Skills Employers Want Now
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore vulnerabilities in application whitelisting through malware case studies in this conference talk from BSidesLV 2013. Delve into Jared Sperl's analysis of real-world examples, uncovering weaknesses in whitelisting approaches and their exploitation by malicious actors. Gain insights into the limitations of application whitelisting as a security measure and learn about potential attack vectors that bypass these controls. Understand the implications for cybersecurity professionals and organizations relying on whitelisting techniques for protection against malware threats.
Syllabus
BSidesLV 2013 3 2 4 Vulnerabilities in Application Whitelisting Malware Case Studies Jared Sperl