Главная
Study mode:
on
1
Intro
2
Public Sanitation
3
Mass Exploitation
4
The Software Crisis
5
Software Engineering
6
LangSEC
7
CX
8
Principles
9
Formal Verification
10
Formal Verification Example
11
Formal Verification Still Hard
12
Is Formal Verification Worth It
13
Software Firewalls
14
Micro Kernels
15
Any Kernels
16
Capability Based Systems
17
Hybrid Capability Model
18
Incremental Security
19
Containment Isolation
20
Creating Well Engineered Infrastructure
21
The Engineering Process
22
Remote Execution Vulnerability
23
C vs Rust
24
The idea of ratcheting
25
quark
Description:
Explore a comprehensive conference talk that delves into achieving real security within two decades through slow but steady progress. Learn about the current state of computer security, where even users who follow best practices remain vulnerable due to flawed software. Discover why the speaker believes enough knowledge now exists to dramatically improve this situation. Examine the necessary techniques and adoption plans for enhancing security infrastructure before potential civilization-threatening issues arise. Gain insights into topics such as public sanitation, mass exploitation, the software crisis, software engineering, LangSEC, formal verification, software firewalls, microkernels, capability-based systems, incremental security, and containment isolation. Understand the engineering process required to create well-engineered infrastructure and explore concepts like remote execution vulnerability and the differences between C and Rust programming languages. Grasp the idea of "ratcheting" in security improvements and its potential impact on long-term cybersecurity efforts. Read more

Slow But Steady - Achieving Real Security Within Two Decades

IEEE
Add to list