Securing Software by Construction: From Research to Industry - Philly ETE 2016

Securing Software by Construction: From Research to Industry - Philly ETE 2016

ChariotSolutions via YouTube Direct link

The Security "Prisoner's Dilemma"

20 of 22

20 of 22

The Security "Prisoner's Dilemma"

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Securing Software by Construction: From Research to Industry - Philly ETE 2016

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Our Lives Run on Software
  3. 3 Secondary Goals of Talk
  4. 4 Problem I'm Solving: Protecting Sensitive Data is Hard
  5. 5 Programmers Must Navigate "Policy Spaghetti"
  6. 6 Solution: Allow Programmers to Attach Policies Directly to Data The language and runtime manage policies so the programmer does not need to
  7. 7 Jeeves Language and Execution Model
  8. 8 Semantics of Output
  9. 9 The Pain of Production-Testing a Research Prototype
  10. 10 Lessons Learned
  11. 11 Jacqueline, a Policy-Agnostic Web Framework
  12. 12 Research is Slow
  13. 13 Barriers to Industry Adoption
  14. 14 Security is no Tindog
  15. 15 Unique Challenges for Security Startups • Security is expensive, • Concept is highly technical
  16. 16 Cybersecurity Factory
  17. 17 Summer 2015 Cohort
  18. 18 How Teams Spent the Summer
  19. 19 Fun Discovery: Del Monte Foods is Unexpectedly Hip
  20. 20 The Security "Prisoner's Dilemma"
  21. 21 We Need to Care More
  22. 22 Conclusion: Many Pieces to Securing Software

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.