Software engineer Software Engineering Institute, United States
Does your application behave as designed? It is necessary to understand how an application actually operates on a system, not just what the specification says, but how it really functions and how its execution may impact a computer system. Often, cybersecurity professionals must complete security evaluations via manual testing and analysis without a repeatable or complete framework. The facilitators of this workshop have helped to engineer a new open-source framework for performing analysis of software binaries that combines a software profiler with a DAST tool. This breakout session will walk participants through the process of installing, configuring, and executing the tool against pre-selected applications. Attendees will learn how metrics are collected and how to use the new tool to analyze them.
Learning Objectives:
Describe the current best practices for software security, the challenges of implementing software security best practices, and the latest open-source tools that enable implementation.
Understand the importance of creating a risk assessment profile of software applications that they plan to deploy in their organization.
Perform a dynamic analysis of the execution of a software application using the new open-source framework and understand how the software application functions on a system.