Introduction
Securing Java code
()
What you need to know
()
1. Injection Attacks
Injection attacks
()
Prevent SQL injection
()
Other injection attacks
()
Challenge: Refactor Java code susceptible to injection attacks
()
Solution: Refactor Java code susceptible to injection attacks
()
2. Sensitive Data Attacks
Sensitive data leak
()
Log message leaks
()
Exception leaks
()
Challenge: Prevent sensitive data leaks
()
Solution: Prevent sensitive data leaks
()
3. Java Access Attacks
Class and package accessibility
()
Mutability
()
Extensibility
()
4. Additional Topics
Build vulnerabilities
()
Container build: Best practices
()
Input validation
()
Serialization
()