COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring. |
University of Cambridge > Talks.cam > Computer Laboratory Security Seminar > Why Johnny doesn’t write secure software?
Why Johnny doesn’t write secure software?Add to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact Jack Hughes. Software is in the very fabric of the systems we utilise in our daily lives – from online banking to social media through to critical infrastructures that bring water and electricity to our homes and drive systems such as transportation, health and governmental services. Yet vulnerabilities in software continue to be a recurring issue despite major advances in libraries, APIs and tools to help developers write secure software and test the security of their software systems. Almost 20 years ago, Alma Whitten and Doug Tygar wrote about the usability challenges faced by an archetypal user (Johnny) when utilising cryptography to secure communications. Developers face similar challenges when utilising the security libraries, APIs and tools at their disposal. In this talk, I will discuss insights from over 5 years of research on these struggles and their potential impact on the security of the resultant software. I will conclude by discussing ongoing work on exploring developers’ understanding of hardware security advances such as CHERI and how these may shape the way they develop software on future secure hardware architectures. Bio: https://research-information.bris.ac.uk/en/persons/awais-rashid This talk is part of the Computer Laboratory Security Seminar series. This talk is included in these lists:
Note that ex-directory lists are not shown. |
Other listsBiochem dogara ezekiel John Ray SocietyOther talksWhy is the suprachiasmatic nucleus such a brilliant circadian time-keeper? Universal NHS healthcare: has the pandemic changed the promise? Predicting Nonlinear Vibration Response Under Combined Harmonic and Random Excitation From Vulnerable Plaque to Vulnerable Brain: Understanding the Role of Inflammation in Vascular Health, Stroke, and Cerebrovascular Disease The Geometric SMEFT description of curved Higgs Field Space(s) - Michael Trott Does published research influence policy outcomes? The case of regulated electricity networks in Western Europe |