|COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring.|
Exploiting Online Games
If you have a question about this talk, please contact Andrew Lewis.
Note unusual time and room
The talk, based on a book of the same title (co-authored by Greg Hoglund), exposes the inner workings of online game security for all to see, drawing illustrations from MMORP Gs such as World of Warcraft to discuss:
But ultimately this talk is about security problems associated with advanced massively distributed software. With hundreds of thousands of interacting users, today’s online games are a bellwether of modern software yet to come. The kinds of attack and defense techniques I describe are tomorrow’s security techniques on display today.
BIO Gary McGraw, Ph.D. CTO , Cigital
Gary McGraw is the CTO of Cigital, Inc., a software security and quality consulting firm with headquarters in the Washington, D.C. area. He is a globally recognized authority on software security and the author of six best selling books on this topic. The latest, Exploiting Online Games was released in 2007. His other titles include Java Security, Building Secure Software, Exploiting Software, and Software Security; and he is editor of the Addison-Wesley Software Security series. Dr. McGraw has also written over 90 peer-reviewed scientific publications, authors a monthly security column for darkreading.com, and is frequently quoted in the press. Besides serving as a strategic counselor for top business and IT executives, Gary is on the Advisory Boards of Fortify Software and Raven White. His dual PhD is in Cognitive Science and Computer Science from Indiana University where he serves on the Dean’s Advisory Council for the School of Informatics. Gary is an IEEE Computer Society Board of Governors member and produces the monthly Silver Bullet Security Podcast for IEEE Security & Privacy magazine.
This talk is part of the Computer Laboratory Security Seminar series.
This talk is included in these lists:
Note that ex-directory lists are not shown.
Other listsICT4D: ICT for Development Modelling Biology Cambridge University Library lunchtime talks
Other talksContested Narratives of the Past: Politics of Regret vs Myths of Self-Pity The Ehrenpreis principle: from ODEs to PDEs MeCP2 in the brain and beyond: from biology to disease Discrete Fourier transform methods in the analysis of nonstationary time series Motor action in semiflexible networks A Heisenberg Miscellany