Download presentation
Presentation is loading. Please wait.
1
Software Security David Wagner University of California at Berkeley
2
Critical infrastructure is dependent on computer security
5
Security break-ins are all too prevalent Internet security incidents reported to CERT
6
Typical cause: Security defects in our software Software vulnerabilities reported to CERT
7
Talk Outline Why is our software so buggy? What can we do about software security?
9
What makes simple mechanical systems predictable? Linearity(or, piecewise linearity) Continuity(or, piecewise continuity) Small, low-dimensional statespaces Systems with these properties are (1) easier to analyze, and (2) easier to test. x y
10
Computers enable highly complex systems And today’s software is taking advantage of this –Highly non-linear behavior; large, high-dim. state spaces
11
Problem Summary Complexity breeds bugs and unpredictable behavior Bugs and unpredictability are the bane of security
12
Mitigating the Risks How can we improve software security? 1.Correctness by construction (e.g., K.I.S.S., defensive coding, least privilege) 2.Automated analysis of software, new models of software behavior 3.Formal verification: proving programs free of defects
13
Mitigating the Risks How can we improve software security? 1.Correctness by construction (e.g., K.I.S.S.) 2.Automated analysis of software 3.New models of software behavior 4.Formal verification: proving programs free of defects In this talk
14
Tools for Software Security If secure programming is hard, let’s build tools that make it easier to get security right –MOPS: scanning for bugs using software model checking –CQual: security-typed programming discipline –We’re finding--and fixing--vulnerabilities in open-source applications (Linux kernel, sendmail, Apache, wu-ftpd, …) Buggy, insecure application Warnings about undisciplined code MOPS Hard-working programmer
15
Conclusion Computer security problems are endemic. Our software is a weak spot. Network-layer defenses must make up for software inadequacies. The problem will likely remain with us as long as users value features (complexity) over security (simplicity).
16
And remember to look out for rakes… Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.