Securing Software by Construction: From Research to Industry - Philly ETE 2016

Securing Software by Construction: From Research to Industry - Philly ETE 2016

ChariotSolutions via YouTube Direct link

Problem I'm Solving: Protecting Sensitive Data is Hard

4 of 22

4 of 22

Problem I'm Solving: Protecting Sensitive Data is Hard

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Securing Software by Construction: From Research to Industry - Philly ETE 2016

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Our Lives Run on Software
  3. 3 Secondary Goals of Talk
  4. 4 Problem I'm Solving: Protecting Sensitive Data is Hard
  5. 5 Programmers Must Navigate "Policy Spaghetti"
  6. 6 Solution: Allow Programmers to Attach Policies Directly to Data The language and runtime manage policies so the programmer does not need to
  7. 7 Jeeves Language and Execution Model
  8. 8 Semantics of Output
  9. 9 The Pain of Production-Testing a Research Prototype
  10. 10 Lessons Learned
  11. 11 Jacqueline, a Policy-Agnostic Web Framework
  12. 12 Research is Slow
  13. 13 Barriers to Industry Adoption
  14. 14 Security is no Tindog
  15. 15 Unique Challenges for Security Startups • Security is expensive, • Concept is highly technical
  16. 16 Cybersecurity Factory
  17. 17 Summer 2015 Cohort
  18. 18 How Teams Spent the Summer
  19. 19 Fun Discovery: Del Monte Foods is Unexpectedly Hip
  20. 20 The Security "Prisoner's Dilemma"
  21. 21 We Need to Care More
  22. 22 Conclusion: Many Pieces to Securing Software

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.