|COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring.|
Exploiting Online Games
If you have a question about this talk, please contact Andrew Lewis.
Note unusual time and room
The talk, based on a book of the same title (co-authored by Greg Hoglund), exposes the inner workings of online game security for all to see, drawing illustrations from MMORP Gs such as World of Warcraft to discuss:
But ultimately this talk is about security problems associated with advanced massively distributed software. With hundreds of thousands of interacting users, today’s online games are a bellwether of modern software yet to come. The kinds of attack and defense techniques I describe are tomorrow’s security techniques on display today.
BIO Gary McGraw, Ph.D. CTO , Cigital
Gary McGraw is the CTO of Cigital, Inc., a software security and quality consulting firm with headquarters in the Washington, D.C. area. He is a globally recognized authority on software security and the author of six best selling books on this topic. The latest, Exploiting Online Games was released in 2007. His other titles include Java Security, Building Secure Software, Exploiting Software, and Software Security; and he is editor of the Addison-Wesley Software Security series. Dr. McGraw has also written over 90 peer-reviewed scientific publications, authors a monthly security column for darkreading.com, and is frequently quoted in the press. Besides serving as a strategic counselor for top business and IT executives, Gary is on the Advisory Boards of Fortify Software and Raven White. His dual PhD is in Cognitive Science and Computer Science from Indiana University where he serves on the Dean’s Advisory Council for the School of Informatics. Gary is an IEEE Computer Society Board of Governors member and produces the monthly Silver Bullet Security Podcast for IEEE Security & Privacy magazine.
This talk is part of the Computer Laboratory Security Seminar series.
This talk is included in these lists:
Note that ex-directory lists are not shown.
Other listsThe Emmy Noether Society: Women that Count Israeli Film Club Martin Centre Research Seminar Series - 40th Annual Series of Lunchtime Lectures
Other talksNon-double-couple sources: Real mechanisms or modelling artefacts? Assessment of Positive Emotional States in Companion-Owned Dogs Gradient methods for huge-scale optimization problems Scott Lecture II : Counting and controlling photons non-destructively. Summit diplomacy or top level of the Council? The European Council's role in energy and climate change before and after Lisbon Is Democracy Conspiratorial?: Koselleck, Furet, and the Debate on the French Revolution