While Java offers an efficient framework for developing and deploying enterprise and Web 2.0 server or client-side applications, it also presents many risks. Perhaps chief among those risks with Java, being an interpreted language, is that its bytecode contains highly detailed metadata making compiled applications easy to reverse engineer, tamper and pirate. In our discussion we will consider and demonstrate some of the vulnerabilities and risks along with protection tools to pack when assessing or implementing Java application security.
Bryon Gloden is a Senior Sales Engineer at Arxan Technologies Inc and spends much of his time helping customers implement software protection solutions. His past experience includes contribution in a variety of functional areas: Technical Pre-Sales, Support, Rapid Prototyping, Security Forensics, and Threat Modeling. Previously, Mr. Gloden performed application security research and development throughout all stages of the application security lifecycle (Requirements, Risk Assessment, Protection Design, Implementation, and Verification). Mr. Gloden holds a Masters of Science in Computer Science from Purdue University, with emphasis in Information Assurance and Security.
Loading more stuff…
Hmm…it looks like things are taking a while to load. Try again?