Abstract
This report will share facts of intentionally introduced security bugs demonstrating how such backdoors go unnoticed or undetectable for years. The speaker will touch upon few advanced techniques that can be used to introduce backdoors invisible to an automated static code vulnerability scanning tool or an experienced code reviewer. Providing an insight to the audience on how to identify and eliminate such sneaky bugs, the speaker will introduce an effective approach to preventing or detecting such backdoors before software is rolled out to end users.