2024-09-11 | 16:10 - 16:50

from generativeai import SecureCode

傳統上,個人開發者要進行程式碼安全檢測,通常需要依賴昂貴的工具或專業服務。這對許多個人開發者來說可能是一大挑戰,因為他們的預算有限。然而,現在隨著語言模型技術的發展,我們有了更具成本效益的解決方案。

在本次演講中,我們將分享如何利用語言模型來提高程式碼安全性

首先,我們將介紹如何自己訓練語言模型以進行程式碼漏洞檢測。這意味著各位開發者可以利用自己的資源,無需依賴外部服務,即可建立起自己的安全檢測系統

其次,將示範如何利用現有的語言模型來快速檢測程式碼中的漏洞。這將使各位開發者能夠以更經濟實惠的方式確保程式碼的安全性,同時提高對程式碼安全的認識和能力

此外,還將演示一些常見但不正確的程式寫法,以便大家更深入地了解程式碼安全的重要性

『會在演講當天開源該專案』

聽眾收穫

學習如何利用語言模型進行程式碼安全檢測,無需昂貴的工具或服務

掌握自行訓練語言模型以及利用現有語言模型進行漏洞檢測的技巧和方法

了解如何確保程式碼安全,並提高對程式碼安全性的認識和能力

透過示範不正確的程式寫法,加深對程式碼安全性的理解,並學會避免常見的安全漏洞

講者

廖聖傑(JimmyLiao)

Appier
Senior Software Engineer | GDE (GenAI)

As the Google Developer Expert (GDE) GenAI and with decades of experience as technical lead in large enterprise and startup. Jimmy Liao act as GenAI Solution Architect now. He focus on solution architecture design, PoC, Production with modern solutions. Also for Generative AI/AI Application landing, education, and communities.

In the leisure time, he completed 15 full marathon and still try to target for sub-4

Experience: 

> Appier Enterprise Technical Lead

> Appier / Microsoft / InfuseAI / Appier / KaiOS / IBM

> Blog: https://about.jimmyliao.net

> Newsletter: https://brewbuild.substack.com/

Speech Record:

> Google DevFest、.NET Conf、Build With AI

講者

沈宜婷(Noflag)

Google Developer Group
GDG Taichung Organizer

I have over three years of experience in the cybersecurity industry, focusing primarily on researching network security-related technologies. I frequently participate in various events as a speaker and also organize activities.

Outside of work, I dedicate my time to different research projects and actively discover security vulnerabilities across various platforms, In the past, I also obtained some CVEs by exploiting vulnerabilities.

Currently focusing on V2X Security, ML, Cloud and other security technology research

Speech Record:

Google i/o Extended、DevFest、COSCUP、WordCamp Asia、MOPCON、MWC、WTM | IWD、CYBERSEC、Build With AI

Experience: 

> CHT Security Intern

> Google Developer Group Organizer in TW Taichung

>CTF TEAM: B33F 50μP

> Blog: https://no-flag.com/2024/03/04/hello-world/