Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Securing Software by Construction: From Research to Industry - Philly ETE 2016

ChariotSolutions via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive examination of securing software by construction in this 54-minute conference talk from Philly ETE 2016. Delve into technical ideas from research that aid in building secure software from the ground up, addressing the challenges of protecting sensitive data and navigating complex policy requirements. Learn about innovative approaches like the Jeeves language and execution model, which allows programmers to attach policies directly to data. Discover the practical challenges of implementing research prototypes in production environments and the lessons learned from these experiences. Gain insights into the development of Jacqueline, a policy-agnostic web framework, and understand the barriers to industry adoption of long-term security solutions. Examine the unique challenges faced by security startups and learn about the Cybersecurity Factory accelerator's efforts to bridge the gap between academia and industry. Reflect on the broader implications of security in software development and the need for a collective commitment to prioritizing secure practices in the tech industry.

Syllabus

Intro
Our Lives Run on Software
Secondary Goals of Talk
Problem I'm Solving: Protecting Sensitive Data is Hard
Programmers Must Navigate "Policy Spaghetti"
Solution: Allow Programmers to Attach Policies Directly to Data The language and runtime manage policies so the programmer does not need to
Jeeves Language and Execution Model
Semantics of Output
The Pain of Production-Testing a Research Prototype
Lessons Learned
Jacqueline, a Policy-Agnostic Web Framework
Research is Slow
Barriers to Industry Adoption
Security is no Tindog
Unique Challenges for Security Startups • Security is expensive, • Concept is highly technical
Cybersecurity Factory
Summer 2015 Cohort
How Teams Spent the Summer
Fun Discovery: Del Monte Foods is Unexpectedly Hip
The Security "Prisoner's Dilemma"
We Need to Care More
Conclusion: Many Pieces to Securing Software

Taught by

ChariotSolutions

Reviews

Start your review of Securing Software by Construction: From Research to Industry - Philly ETE 2016

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.