Lead AI-Native Products with Microsoft's Agentic AI Program
The Fastest Way to Become a Backend Developer Online
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore vulnerabilities in application whitelisting through malware case studies in this conference talk from BSidesLV 2013. Delve into Jared Sperl's analysis of real-world examples, uncovering weaknesses in whitelisting approaches and their exploitation by malicious actors. Gain insights into the limitations of application whitelisting as a security measure and learn about potential attack vectors that bypass these controls. Understand the implications for cybersecurity professionals and organizations relying on whitelisting techniques for protection against malware threats.
Syllabus
BSidesLV 2013 3 2 4 Vulnerabilities in Application Whitelisting Malware Case Studies Jared Sperl