Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Learn how to instrument software builds to identify stealth backdoors and other security anomalies in this 18-minute conference talk by Hilko Bengen. Discover techniques for monitoring and analyzing the software build process to detect malicious code injection, unauthorized modifications, and suspicious activities that could compromise software integrity. Explore practical approaches to build instrumentation, understand common attack vectors used to insert backdoors during compilation, and gain insights into defensive strategies for maintaining secure software supply chains.