🧪 Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Software Composition Analysis

7
Total Entries
9
Contributors

Top Contributors

Gaurav Joshi(3) Hare Krishna Rai(3) Akhil Mahendra(2) Hritik Vijay(2) K v Prashant(2)

All Entries (7 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-04-03TalkBlackhat Determining Exploitability of Vulnerabilities with SBOM and VEX Presentation Anusha Penumacha, Srinija Kammarisbomsupply-chainsca+2
2025-04-03Tool demoBlackhat SCAGoat - Exploiting Damn Vulnerable and Compromised SCA Application Source Code Hare Krishna Rai, Gaurav Joshi, K v Prashantvulnerability-managementsupply-chainsupply-chain-attack+2
2025-04-03Tool demoBlackhat SupplyShield: Protecting your software supply chain Source Code Yadhu Krishna M, Akhil Mahendra, Hritik Vijaysupply-chainsbomsca+2
2024-12-11Tool demoBlackhat SCAGoat - Exploiting Damn Vulnerable SCA Application Source Code Hare Krishna Rai, Gaurav Joshi, K v Prashantvulnerability-managementsupply-chainsca+1
2024-11-15TalkC0c0n [Yodha] SCAGoat - Software Composition Analysis (SCA) Vulnerability Exploration Tool Source Code Gaurav Joshi, Hare Krishna Raivulnerability-managementsupply-chainsca+1
2023-12-06Tool demoBlackhat SupplyShield: Protecting your software supply chain Source Code Akhil Mahendra, Hritik Vijayawssupply-chainsbom+2
2015-09-24TalkApp Sec Usa QARK: Android App Exploit and SCA Tool Video Tushar Dalviandroid-securityscasoftware-composition-analysis