Abstract
While Java offers an efficient framework for developing and deploying enterprise and Web 2.0 server or client-side applications, it also presents many risks. Perhaps chief among those risks with Java, being an interpreted language, is that its bytecode contains highly detailed metadata making compiled applications easy to reverse engineer, tamper and pirate. In our discussion we will consider and demonstrate some of the vulnerabilities and risks along with protection tools to pack when assessing or implementing Java application security.
Bio
Mike Dulaney joined Arxan in 2003 as a Software Security Analyst participating in and managing government-funded research studies to measure the effectiveness of software security. Mr. Dulaney is now part of Arxan’s commercial sales organization as a Security Architect, a role in which he has contributed in a variety of functional areas— Technical Pre-Sales, Technical Support, Management, Rapid Prototyping, Security Forensics, and Threat Modeling. Previously, Mr. Dulaney performed application security research and development throughout all stages of the application security lifecycle. He also helped bootstrap Arxan’s GuardIT product by designing and developing product security features and playing a key role in enabling support for new compilers and languages. Mr. Dulaney earned a B.S. in Computer Science from Purdue University before completing post-graduate coursework at Purdue’s Krannert Graduate School of Management.
|