Главная
Study mode:
on
1
Intro
2
What's Being Done to Fix This?
3
A Security Layer for TLS
4
POSIX Socket API Abstraction
5
Secure Socket API
6
Separation of Concerns
7
Configuration Instead of Implementation
8
Centralization
9
No Discernible Overhead
10
No problem...
11
Client Authentication Architecture
12
Client Authentication, Step-by-step
13
Automated Certificates at Registration
14
Let's Authenticate
15
Architecture is the Holy Grail
16
Continue the Quest
Description:
Explore a comprehensive analysis of TLS security architecture and abstractions in this USENIX Enigma Conference talk. Delve into the challenges developers face when implementing TLS correctly and discover a proposed solution through a security layer fitting into the Internet architecture. Learn about the POSIX socket API as a simple abstraction for TLS interface and understand its implications for developers, administrators, and OS vendors. Examine the benefits of centralized, well-tested services for creating secure applications and enforcing best practices through system policies. Gain insights into simplifying complex aspects of TLS, including certificate validation and client authentication. Access code examples for the security layer and application demonstrations to further explore this innovative approach to enhancing TLS implementation and security.

Using Architecture and Abstractions to Design a Security Layer for TLS - USENIX Enigma 2019

USENIX Enigma Conference
Add to list