COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring. |
University of Cambridge > Talks.cam > Computer Laboratory Security Seminar > Exploiting Online Games
Exploiting Online GamesAdd to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact Andrew Lewis. Note unusual time and room The talk, based on a book of the same title (co-authored by Greg Hoglund), exposes the inner workings of online game security for all to see, drawing illustrations from MMORP Gs such as World of Warcraft to discuss:
But ultimately this talk is about security problems associated with advanced massively distributed software. With hundreds of thousands of interacting users, today’s online games are a bellwether of modern software yet to come. The kinds of attack and defense techniques I describe are tomorrow’s security techniques on display today. BIO Gary McGraw, Ph.D. CTO , Cigital Company Podcast Blog Book Personal Gary McGraw is the CTO of Cigital, Inc., a software security and quality consulting firm with headquarters in the Washington, D.C. area. He is a globally recognized authority on software security and the author of six best selling books on this topic. The latest, Exploiting Online Games was released in 2007. His other titles include Java Security, Building Secure Software, Exploiting Software, and Software Security; and he is editor of the Addison-Wesley Software Security series. Dr. McGraw has also written over 90 peer-reviewed scientific publications, authors a monthly security column for darkreading.com, and is frequently quoted in the press. Besides serving as a strategic counselor for top business and IT executives, Gary is on the Advisory Boards of Fortify Software and Raven White. His dual PhD is in Cognitive Science and Computer Science from Indiana University where he serves on the Dean’s Advisory Council for the School of Informatics. Gary is an IEEE Computer Society Board of Governors member and produces the monthly Silver Bullet Security Podcast for IEEE Security & Privacy magazine. This talk is part of the Computer Laboratory Security Seminar series. This talk is included in these lists:
Note that ex-directory lists are not shown. |
Other listsC.U. Cryptographic Currency Society MacDonald InstituteOther talksKnot Floer homology and algebraic methods Rather more than Thirty-Nine Steps: the life of John Buchan Universality in Active Matter How to write good papers Numerical solution of the radiative transfer equation with a posteriori error bounds Café Synthetique: Graduate Talks! Cambridge - Corporate Finance Theory Symposium September 2017 - Day 1 Speculations about homological mirror symmetry for affine hypersurfaces Inferring the Evolutionary History of Cancers: Statistical Methods and Applications Crowding and the disruptive effect of clutter throughout the visual system TODAY Foster Talk - "Paraspeckles, TDP-43 & alternative polyadenylation: how regulation of a membraneless compartment guides cell fate" |